Johannes Müller

Orcid: 0000-0003-2134-3099

Affiliations:
  • University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg
  • University of Trier, Germany


According to our database1, Johannes Müller authored at least 25 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

2024
Post-quantum XML and SAML Single Sign-On.
IACR Cryptol. ePrint Arch., 2024

A Comprehensive Survey on Post-Quantum TLS.
IACR Commun. Cryptol., 2024

2023
SoK: Secure E-Voting with Everlasting Privacy.
Proc. Priv. Enhancing Technol., January, 2023

DeVoS: Deniable Yet Verifiable Vote Updating.
IACR Cryptol. ePrint Arch., 2023

SoK: Post-Quantum TLS Handshake.
IACR Cryptol. ePrint Arch., 2023

A Protocol for Cast-as-Intended Verifiability with a Second Device.
CoRR, 2023

Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device.
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023

2022
Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Kryvos: Publicly Tally-Hiding Verifiable E-Voting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Verifiable Decryption in the Head.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Optimal Randomized Partial Checking for Decryption Mix Nets.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Anonymous Veto Networks.
IACR Cryptol. ePrint Arch., 2020

Ordinos: A Verifiable Tally-Hiding E-Voting System.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing.
Proceedings of the Computer Security - ESORICS 2020, 2020

SoK: Techniques for Verifiable Mix Nets.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2017
Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

2016
Verifiability Notions for E-Voting Protocols.
IACR Cryptol. ePrint Arch., 2016

SoK: Verifiability Notions for E-Voting Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

sElect: A Lightweight Verifiable Remote Voting System.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016


  Loading...