Poorvi L. Vora

Affiliations:
  • George Washington University, Washington, D.C., USA


According to our database1, Poorvi L. Vora authored at least 58 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds.
Cryptogr., March, 2023

PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Simulations of Ballot Polling Risk-Limiting Audits.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

2021
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck.
Cryptogr., 2021

Minerva- An Efficient Risk-Limiting Ballot Polling Audit.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
IACR Cryptol. ePrint Arch., 2020

Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds.
Cryptogr., 2020

The Athena Class of Risk-Limiting Ballot Polling Audits.
CoRR, 2020

A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Risk-Limiting Bayesian Polling Audits for Two Candidate Elections.
CoRR, 2019

PrivApollo - Secret Ballot E2E-V Internet Voting.
Proceedings of the Financial Cryptography and Data Security, 2019

2017
Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

2016
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation.
IACR Cryptol. ePrint Arch., 2016

2015
End-to-end verifiability.
CoRR, 2015

2014
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion.
IACR Cryptol. ePrint Arch., 2014

2013
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System.
IACR Cryptol. ePrint Arch., 2013

Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

2011
Price Discrimination and Privacy: a Note.
IGTR, 2011

Paperless Independently-Verifiable Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010

Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish.
IACR Cryptol. ePrint Arch., 2010

Secure Electronic Voting - A Framework.
Cryptologia, 2010

Performance Requirements for End-to-End Verifiable Elections.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010

Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems.
Proceedings of the Information Systems Security - 6th International Conference, 2010


2009
Guest editorial: special issue on electronic voting.
IEEE Trans. Inf. Forensics Secur., 2009

Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009

Accessible Voter-Verifiability.
Cryptologia, 2009

From eBay's second chance offer to B2B service pricing: Similarity and challenges.
Proceedings of the 2009 IEEE/INFORMS International Conference on Service Operations, 2009

2008
An information-theoretic model of voting systems.
Math. Comput. Model., 2008

Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting.
IEEE Secur. Priv., 2008

2007
An Information-Theoretic Approach to Inference Attacks on Random Data Perturbation and a Related Privacy Measure.
IEEE Trans. Inf. Theory, 2007

Related-Key Statistical Cryptanalysis.
IACR Cryptol. ePrint Arch., 2007

Secret Ballot Elections with Unconditional Integrity.
IACR Cryptol. ePrint Arch., 2007

2006
Randomization as a strategy for sellers during price discrimination, and impact on bidders' privacy.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Related-Key Linear Cryptanalysis.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

A performance ratings framework for the evaluation of electronic voting systems: project highlights: exploratory research.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

2005
David Chaum's Voter Verification using Encrypted Paper Receipts.
IACR Cryptol. ePrint Arch., 2005

The privacy cost of the second-chance offer.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Towards a privacy measurement criterion for voting systems.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

2004
Evaluation of voting systems.
Commun. ACM, 2004

Information Theory and the Security of Binary Data Perturbation.
Proceedings of the Progress in Cryptology, 2004

Detection and deterrence of counterfeiting of valuable documents.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
User Profiling with Privacy: A Framework for Adaptive Information Agents.
Proceedings of the Intelligent Information Agents - The AgentLink Perspective, 2003

2001
Image capture: simulation of sensor responses from hyperspectral images.
IEEE Trans. Image Process., 2001

Inner products and orthogonality in color recording filter design.
IEEE Trans. Image Process., 2001

Protocols for Watermark Verification.
IEEE Multim., 2001

2000
Distortion-bounded authentication techniques.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

1999
Robust Watermarking Using Argument Modulation.
Proceedings of the PICS 1999: Proceedings of the Conference on Image Processing, 1999

1998
Trade-offs between Color Saturation and Noise Sensitivity in Image Sensors.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

1997
Mathematical methods for the analysis of color scanning filters.
IEEE Trans. Image Process., 1997

Mathematical methods for the design of color scanning filters.
IEEE Trans. Image Process., 1997

Image capture: synthesis of sensor responses from multispectral images.
Proceedings of the Color Imaging: Device-Independent Color, 1997

1996
A set theoretic approach to image reconstruction from projections.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

1995
Design results for a set of thin film color-scanning filters.
Proceedings of the Device-Independent Color Imaging II, 1995

1992
On the accuracy of scanning colour images.
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992

1988
Bounds on restoration quality using a priori information.
Proceedings of the IEEE International Conference on Acoustics, 1988


  Loading...