1. Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 2009, p. 10. USENIX (2009)
2. Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: 22nd Conference on Computer and Communications Security, ACM CCS 2015, pp. 5–17. ACM Press (2015)
3. Buterin, V.: Ethereum white paper (2013). GitHub repository.
https://github.com/ethereum/wiki/wiki/White-Paper
4. Cannon, J., Bosma, W., Fieker, C., Steel, A.: Handbook of MAGMA functions (2006).
http://magma.maths.usyd.edu.au/magma/handbook/
5. Cortier, V., Galindo, D., Küsters, R., Mueller, J., Truderung, T.: SoK: verifiability notions for e-voting protocols. In: IEEE Symposium on Security and Privacy (S&P 2016), pp. 779–798. IEEE (2016)