1. [1] B. Adida. Helios: Web-based open-audit voting. In P. C. van Oorschot, editor, USENIX Security 2008, pages 335–348, San Jose, CA, USA, July 28 – Aug. 1, 2008. USENIX Association.
2. [2] A. Asgaonkar and B. Krishnamachari. Token curated registries - a game theoretic approach, 2018. https://arxiv.org/pdf/1809.01756.pdf.
3. [3] F. Bao, R. H. Deng, and H. Zhu. Variations of Diffie-Hellman problem. In S. Qing, D. Gollmann, and J. Zhou, editors, ICICS 03, volume 2836 of LNCS, pages 301–312, Huhehaote, China, Oct. 10–13, 2003. Springer, Heidelberg, Germany.
4. [4] M. Bellare and P. Rogaway. The security of triple encryption and a framework for code-based game-playing proofs. In S. Vaudenay, editor, EUROCRYPT 2006, volume 4004 of LNCS, pages 409–426, St. Petersburg, Russia, May 28 – June 1, 2006. Springer, Heidelberg, Germany.
5. [5] J. D. C. Benaloh. Verifiable Secret-Ballot Elections. PhD thesis, Yale University, 1987.