What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Peter Y. A. Ryan
Google Scholar
36
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/esorics
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation.
Aditya Damodaran
Simon Rastikian
Peter B. Rønne
Peter Y. A. Ryan
2024
conf/fc
"You Shall Not Abstain!" A Formal Study of Forced Participation.
Wojciech Jamroga
Peter B. Roenne
Yan Kim
Peter Y. A. Ryan
2024
conf/asiaccs
SweetPAKE: Key exchange with decoy passwords.
Afonso Arriaga
Peter Y. A. Ryan
Marjan Skrobot
2022
journals/tches
Highly Vectorized SIKE for AVX-512.
Hao Cheng
Georgios Fotiadis
Johann Großschädl
Peter Y. A. Ryan
2021
journals/tches
Batching CSIDH Group Actions using AVX-512.
Hao Cheng
Georgios Fotiadis
Johann Großschädl
Peter Y. A. Ryan
Peter B. Rønne
2021
conf/acisp
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer.
Geoffroy Couteau
A. W. Roscoe
Peter Y. A. Ryan
2021
conf/fc
Cast-as-Intended: A Formal Definition and Case Studies.
Peter B. Rønne
Peter Y. A. Ryan
Ben Smyth
2020
conf/fc
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme.
Marie-Laure Zollinger
Peter B. Rønne
Peter Y. A. Ryan
2020
conf/pkc
Verifiable Inner Product Encryption Scheme.
Najmeh Soroush
Vincenzo Iovino
Alfredo Rial
Peter B. Rønne
Peter Y. A. Ryan
2020
conf/sacrypt
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.
Hao Cheng
Johann Großschädl
Jiaqi Tian
Peter B. Rønne
Peter Y. A. Ryan
2019
conf/sec
An Offline Dictionary Attack Against zkPAKE Protocol.
José Becerra
Peter Y. A. Ryan
Petra Sala
Marjan Skrobot
2019
conf/fc
How to Assess the Usability Metrics of E-Voting Schemes.
Karola Marky
Marie-Laure Zollinger
Markus Funk
Peter Y. A. Ryan
Max Mühlhäuser
2019
conf/esorics
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.
Ziya Alper Genç
Gabriele Lenzini
Peter Y. A. Ryan
2018
conf/ccs
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.
Jun Wang
Afonso Arriaga
Qiang Tang
Peter Y. A. Ryan
2018
conf/wisec
An Offline Dictionary Attack against zkPAKE Protocol.
José Becerra
Peter Y. A. Ryan
Petra Sala
Marjan Skrobot
2017
journals/compsec
Trustworthy exams without trusted parties.
Giampaolo Bella
Rosario Giustolisi
Gabriele Lenzini
Peter Y. A. Ryan
2017
conf/fc
Using Selene to Verify Your Vote in JCJ.
Vincenzo Iovino
Alfredo Rial
Peter B. Rønne
Peter Y. A. Ryan
2016
conf/fc
Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
Peter Y. A. Ryan
Peter B. Rønne
Vincenzo Iovino
2015
conf/sec
A Secure Exam Protocol Without Trusted Parties.
Giampaolo Bella
Rosario Giustolisi
Gabriele Lenzini
Peter Y. A. Ryan
2014
conf/uss
Faster Print on Demand for Prêt à Voter.
Chris Culnane
James Heather
Rui Joaquim
Peter Y. A. Ryan
Steve A. Schneider
Vanessa Teague
2014
conf/africacrypt
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
Afonso Arriaga
Qiang Tang
Peter Y. A. Ryan
2013
conf/uss
Proving Prêt à Voter Receipt Free Using Computational Security Models.
Dalia Khader
Qiang Tang
Peter Y. A. Ryan
2013
conf/uss
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Morgan Llewellyn
Steve A. Schneider
Zhe Xia
Chris Culnane
James Heather
Peter Y. A. Ryan
Sriramkrishnan Srinivasan
2013
conf/sp
Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Gurchetan S. Grewal
Mark Dermot Ryan
Sergiu Bursuc
Peter Y. A. Ryan
2012
conf/uss
Using Prêt à Voter in Victoria State Elections.
Craig Burton
Chris Culnane
James Heather
Thea Peacock
Peter Y. A. Ryan
Steve A. Schneider
Vanessa Teague
Roland Wen
Zhe Xia
Sriramkrishnan Srinivasan
2011
conf/uss
Prêt à Voter with Confirmation Codes.
Peter Y. A. Ryan
2010
journals/tifs
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
David Chaum
Richard Carback
Jeremy Clark
Aleksander Essex
Stefan Popoveniuc
Ronald L. Rivest
Peter Y. A. Ryan
Emily Shen
Alan T. Sherman
Poorvi L. Vora
2010
conf/esorics
Pretty Good Democracy for More Expressive Voting Schemes.
James Heather
Peter Y. A. Ryan
Vanessa Teague
2009
journals/tifs
Prêt à voter: a voter-verifiable voting system.
Peter Y. A. Ryan
David Bismark
James Heather
Steve A. Schneider
Zhe Xia
2009
journals/tifs
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
David Chaum
Richard Carback
Jeremy Clark
Aleksander Essex
Stefan Popoveniuc
Ronald L. Rivest
Peter Y. A. Ryan
Emily Shen
Alan T. Sherman
Poorvi L. Vora
2009
conf/uss
Permutations in Prêt à Voter.
Peter Y. A. Ryan
Vanessa Teague
2008
conf/uss
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
David Chaum
Richard Carback
Jeremy Clark
Aleksander Essex
Stefan Popoveniuc
Ronald L. Rivest
Peter Y. A. Ryan
Emily Shen
Alan T. Sherman
2008
conf/esorics
Human Readable Paper Verification of Prêt à Voter.
David Lundin
Peter Y. A. Ryan
2006
conf/esorics
Prêt à Voter with Re-encryption Mixes.
Peter Y. A. Ryan
Steve A. Schneider
2005
conf/esorics
A Practical Voter-Verifiable Election Scheme.
David Chaum
Peter Y. A. Ryan
Steve A. Schneider
2004
conf/dsn
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Robert J. Stroud
Ian S. Welch
John P. Warne
Peter Y. A. Ryan
Coauthors
A. W. Roscoe
(1)
Aditya Damodaran
(1)
Afonso Arriaga
(3)
Alan T. Sherman
(3)
Aleksander Essex
(3)
Alfredo Rial
(2)
Ben Smyth
(1)
Chris Culnane
(3)
Craig Burton
(1)
Dalia Khader
(1)
David Bismark
(1)
David Chaum
(4)
David Lundin
(1)
Emily Shen
(3)
Gabriele Lenzini
(3)
Geoffroy Couteau
(1)
Georgios Fotiadis
(2)
Giampaolo Bella
(2)
Gurchetan S. Grewal
(1)
Hao Cheng
(3)
Ian S. Welch
(1)
James Heather
(5)
Jeremy Clark
(3)
Jiaqi Tian
(1)
Johann Großschädl
(3)
John P. Warne
(1)
José Becerra
(2)
Jun Wang
(1)
Karola Marky
(1)
Marie-Laure Zollinger
(2)
Marjan Skrobot
(3)
Mark Dermot Ryan
(1)
Markus Funk
(1)
Max Mühlhäuser
(1)
Morgan Llewellyn
(1)
Najmeh Soroush
(1)
Peter B. Roenne
(1)
Peter B. Rønne
(8)
Peter Y. A. Ryan
(36)
Petra Sala
(2)
Poorvi L. Vora
(2)
Qiang Tang
(3)
Richard Carback
(3)
Robert J. Stroud
(1)
Roland Wen
(1)
Ronald L. Rivest
(3)
Rosario Giustolisi
(2)
Rui Joaquim
(1)
Sergiu Bursuc
(1)
Simon Rastikian
(1)
Sriramkrishnan Srinivasan
(2)
Stefan Popoveniuc
(3)
Steve A. Schneider
(6)
Thea Peacock
(1)
Vanessa Teague
(4)
Vincenzo Iovino
(3)
Wojciech Jamroga
(1)
Yan Kim
(1)
Zhe Xia
(3)
Ziya Alper Genç
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to