Peter B. Rønne

Orcid: 0000-0002-2785-8301

Affiliations:
  • University of Luxembourg, Esch-sur-Alzette, Luxembourg


According to our database1, Peter B. Rønne authored at least 43 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Deniable Public-Key Authenticated Quantum Key Exchange.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2023

On the Auditability of the Estonian IVXV System - And an Attack on Individual Verifiability.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Machine-Checked Proofs of Accountability: How to sElect Who is to Blame.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Estonian Internet voting with anonymous credentials.
Turkish J. Electr. Eng. Comput. Sci., February, 2022

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co.
IACR Cryptol. ePrint Arch., 2022

2021
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes.
ACM Trans. Comput. Hum. Interact., 2021

Batching CSIDH Group Actions using AVX-512.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Taphonomical Security: (DNA) Information with Foreseeable Lifespan.
IACR Cryptol. ePrint Arch., 2021

Preservation of DNA Privacy During the Large Scale Detection of COVID.
IACR Cryptol. ePrint Arch., 2021

New Standards for E-Voting Systems: Reflections on Source Code Examinations.
IACR Cryptol. ePrint Arch., 2021

Verifiable Decryption in the Head.
IACR Cryptol. ePrint Arch., 2021

Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol.
IACR Cryptol. ePrint Arch., 2021

Security Characterization of J-PAKE and its Variants.
IACR Cryptol. ePrint Arch., 2021

User Experience Design for E-Voting: How mental models align with security mechanisms.
CoRR, 2021

Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability.
CoRR, 2021

Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Cast-as-Intended: A Formal Definition and Case Studies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Who Was that Masked Voter? The Tally Won't Tell!
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
Verifiable Inner Product Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips.
CoRR, 2020

Preservation of DNA Privacy During the Large Scale Detection of COVID-19.
CoRR, 2020

High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme.
Proceedings of the Financial Cryptography and Data Security, 2020

Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities.
Proceedings of the Financial Cryptography and Data Security, 2020

Vote Selling Resistant Voting.
Proceedings of the Financial Cryptography and Data Security, 2020

Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
IACR Cryptol. ePrint Arch., 2019

Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
CoRR, 2019

A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things.
Proceedings of the Information Security Theory and Practice, 2019

Risk-Limiting Tallies.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

End-to-End Verifiable Quadratic Voting with Everlasting Privacy.
Proceedings of the Financial Cryptography and Data Security, 2019

Security - Visible, Yet Unseen?
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
HoneyPAKEs.
Proceedings of the Security Protocols XXVI, 2018

Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptol. ePrint Arch., 2016

To Du or Not to Du: A Security Analysis of Du-Vote.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
IACR Cryptol. ePrint Arch., 2015

On the Possibility of Non-Interactive E-Voting in the Public-key Setting.
IACR Cryptol. ePrint Arch., 2015


  Loading...