FERMAT'S LIBRARY
Journal Club
Librarian
Margins
Log in
Join our newsletter to receive a new paper every week
Comments
Ask a question or post a comment about the paper
Join the discussion! Ask questions and share your comments.
Sign in with Google
Sign in with Facebook
Sign in with email
Since this paper was published in 2014 this number has grown signif...
There are a number of very interesting *End-to-end* auditable votin...
The feasibility of internet voting has been a topic of discussion f...
Fun fact: a flaw was later found in the smart card library that gen...
You can think of these smartcards as very small computers which can...
You can find the I-voting code as published by the Estonian entitie...
Here is a quick overview/review of some basic topics in cryptograph...
Overall this section is a nice example of Carl Ellison's [Ceremony ...
Trusting HTTPS means trusting the remote server. In some sense it i...
This is especially worrying since there have been multiple recent h...
Printed wifi password proves the opposite of weakness, they intenti...
It can be hard to get a true sense of the price of zero-day exploit...
Assumption. Most people do not leave cards, because it is needed in...