1. and A secure voting protocol using threshold schemes, Proc 11th IEEE Ann Computer Security Application Conf, 1995, pp. 143-148.
2. Some applications of multiple keys ciphers, Proc Advances in Cryptology?EUROCRYPT 88, 1988, pp. 455-467.
3. A new multiple keys cipher and an improved voting scheme, Proc Advances in Cryptology?EUROCRYPT 89, 1989, pp. 617-625.
4. and Blind signatures based on the discrete logarithm problem, Proc Advances in Cryptology?EUROCRYPT 94, 1994, pp. 428-432.
5. A secure voting system on a public network