| Cryptographic distinguishability measures for quantum-mechanical states CA Fuchs, J Van De Graaf IEEE Transactions on Information Theory 45 (4), 1216-1227, 2002 | 1064 | 2002 |
| An improved protocol for demonstrating possession of discrete logarithms and some generalizations D Chaum, JH Evertse, J Van De Graaf Workshop on the Theory and Application of of Cryptographic Techniques, 127-141, 1987 | 436 | 1987 |
| Multiparty computations ensuring privacy of each party’s input and correctness of the result D Chaum, IB Damgård, J Van de Graaf Conference on the Theory and Application of Cryptographic Techniques, 87-119, 1987 | 390 | 1987 |
| Committed oblivious transfer and private multi-party computation C Crépeau, J van de Graaf, A Tapp Annual international cryptology conference, 110-123, 1995 | 224 | 1995 |
| Gradual and verifiable release of a secret EF Brickell, D Chaum, IB Damgård, J van de Graaf Conference on the Theory and Application of Cryptographic Techniques, 156-166, 1987 | 222 | 1987 |
| Demonstrating possession of a discrete logarithm without revealing it D Chaum, JH Evertse, J van de Graaf, R Peralta Conference on the Theory and Application of Cryptographic Techniques, 200-212, 1986 | 185 | 1986 |
| Security of quantum key distribution against all collective attacks Biham, Boyer, Brassard, Mor Algorithmica 34 (4), 372-388, 2002 | 148 | 2002 |
| A simple and secure way to show the validity of your public key J Van De Graaf, R Peralta Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987 | 118 | 1987 |
| Towards a formal definition of security for quantum protocols J Van De Graaf Université de Montréal, 1997 | 76 | 1997 |
| Improving Helios with Everlasting Privacy Towards the Public. D Demirel, J Van De Graaf, RS dos Santos Araújo Evt/wote 12, 2012 | 64 | 2012 |
| Oblivious transfer based on the McEliece assumptions R Dowsley, J Van De Graaf, J Müller-Quade, ACA Nascimento International Conference on Information Theoretic Security, 107-117, 2008 | 51 | 2008 |
| A verifiable voting protocol based on Farnel R Araújo, RF Custódio, J van de Graaf Towards Trustworthy Elections: New Directions in Electronic Voting, 274-288, 2010 | 49 | 2010 |
| Towards a publicly-verifiable mix-net providing everlasting privacy J Buchmann, D Demirel, J Van De Graaf International Conference on Financial Cryptography and Data Security, 197-204, 2013 | 38 | 2013 |
| A two-party protocol with trusted initializer for computing the inner product R Dowsley, J Van De Graaf, D Marques, ACA Nascimento International Workshop on Information Security Applications, 337-350, 2010 | 32 | 2010 |
| The Good, the Bad, and the Ugly: Two decades of E-voting in Brazil DF Aranha, J van de Graaf IEEE Security & Privacy 16 (6), 22-30, 2018 | 31 | 2018 |
| Unconditionally secure, universally composable privacy preserving linear algebra B David, R Dowsley, J van de Graaf, D Marques, ACA Nascimento, ... IEEE Transactions on Information Forensics and Security 11 (1), 59-73, 2015 | 26 | 2015 |
| Prêt à voter providing everlasting privacy D Demirel, M Henning, J van de Graaf, PYA Ryan, J Buchmann International Conference on E-Voting and Identity, 156-175, 2013 | 25 | 2013 |
| Secret ballot elections with unconditional integrity D Chaum, J Van De Graaf, PYA Ryan, PL Vora Cryptology ePrint Archive, 2007 | 24 | 2007 |
| Anonymous one-time broadcast using non-interactive dining cryptographer nets with applications to voting J van de Graaf Towards Trustworthy Elections: New Directions in Electronic Voting, 231-241, 2010 | 21 | 2010 |
| Voting With Unconditional Privacy by Merging PrÊt À Voter and PunchScan J Van De Graaf IEEE Transactions on Information Forensics and Security 4 (4), 674-684, 2009 | 21 | 2009 |