Ximix is drawing on the work presented in a number of publications. This is the current list of those available: * {{:rpc.pdf|"Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking"}} Markus Jakobsson, Ari Juels, Ronald L. Rivest, 11th USENIX Security Symposium, 2002. * {{:pedersen.pdf|"A Threhold Cryptosystem without a Trusted Party (Extended Abstract)"}} T. P. Perdersen, Springer-Verlag, 1998. * {{:cramer_etal_1997.pdf|"A Secure and Optimally Efficient Multi-Authority Election Scheme"}} R. Cramer, R. Gennaro, B. Schoenmakers, CGS Journal, October, 1997. * [[https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.67.9913.pdf|"A Robust Threshold Elliptic Curve Digital Signature Providing a New Verifiable Secret Sharing Scheme"]] M. H. Ibrahim, I. A. Ali, I. I. Ibrahim, A. H. El-sawi. * [[https://www.iacr.org/archive/asiacrypt2001/22480516.pdf|"Short signatures from the Weil pairing"]] D. Boneh, B. Lynn, and H. Shacham, AsiaCrypt 2001. * [[https://eprint.iacr.org/2012/063.pdf|"Randomized Partial Checking Revisited"]] S. Khazaei, D. Wikstrom, Cryptology ePrint Archive, Report 2012/063, 2012. * [[https://www.uclouvain.be/crypto/services/download/publications.pdf.87e67d05ee05000b.6d61696e2e706466.pdf|"How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios"]] D. Bernhard, O. Pereira, B, Warinschi, volume 7658 of Lecture Notes in Computer Science, pages 626-643. 2012. * [[https://dss.in.tum.de/files/brandt-research/millionaire.pdf|"Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption"]] F. Brandt, Proceeding ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology, Pages 32-47 Springer-Verlag. 2006. * [[https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.44.6345&rep=rep1&type=pdf|“Secure Distributed Key Generation for Discrete-Log Based Cryptosystems”]] R. Gennaro, S Jarecki, H. Krawczyk, T. Rabin, Journal of Cryptology, 2007. Further reading: * {{:IntroToCrypto.ppt|"Introducing Cryptography for Voting"}} V. Teague, 617 Crytpography and Security Lecture Notes, University of Melbourne. Please note the content on this page is provided for research purposes and remains the property of the respective copyright holders.