[go: up one dir, main page]

Follow
David Galindo
David Galindo
CTO, Valory AG
Verified email at valory.xyz - Homepage
Title
Cited by
Cited by
Year
SoK: A comprehensive analysis of game-based ballot privacy definitions
D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi
2015 IEEE Symposium on Security and Privacy, 499-516, 2015
1942015
Sok: Verifiability notions for e-voting protocols
V Cortier, D Galindo, R Küsters, J Müller, T Truderung
2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016
1862016
Election verifiability for helios under weaker trust assumptions
V Cortier, D Galindo, S Glondu, M Izabachene
European Symposium on Research in Computer Security, 327-344, 2014
1752014
BeleniosRF: A non-interactive receipt-free electronic voting scheme
P Chaidos, V Cortier, G Fuchsbauer, D Galindo
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
167*2016
A schnorr-like lightweight identity-based signature scheme
D Galindo, F Garcia
Progress in Cryptology–AFRICACRYPT 2009, 135-148, 2009
1612009
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
International Conference on the Theory and Application of Cryptology and …, 2006
1582006
Boneh-Franklin identity based encryption revisited
D Galindo
International Colloquium on Automata, Languages, and Programming, 791-802, 2005
1202005
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
E Kiltz, D Galindo
Australasian conference on information security and privacy, 336-347, 2006
1072006
Fully distributed verifiable random functions and their application to decentralised random beacons
D Galindo, J Liu, M Ordean, JM Wong
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 88-102, 2021
942021
Improved certificate-based encryption in the standard model
D Galindo, P Morillo, C Ràfols
Journal of Systems and Software 81 (7), 1218-1226, 2008
742008
2015 Neuchâtel’s cast-as-intended verification mechanism
D Galindo, S Guasch, J Puiggali
International Conference on E-Voting and Identity, 3-18, 2015
732015
Distributed elgamal á la pedersen: application to helios
V Cortier, D Galindo, S Glondu, M Izabachene
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
692013
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
D Galindo, P Morillo, C Ràfols
European Public Key Infrastructure Workshop, 81-91, 2006
682006
SoK: TEE-assisted confidential smart contract
R Li, Q Wang, Q Wang, D Galindo, M Ryan
arXiv preprint arXiv:2203.08548, 2022
602022
A practical leakage-resilient signature scheme in the generic group model
D Galindo, S Vivek
International Conference on Selected Areas in Cryptography, 50-65, 2012
582012
Extended security arguments for signature schemes
Ö Dagdelen, D Galindo, P Véron, SM El Yousfi Alaoui, PL Cayrel
Designs, Codes and Cryptography 78 (2), 441-461, 2016
51*2016
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
D Galindo, R Roman, J Lopez
International Conference on Cryptology and Network Security, 120-132, 2008
512008
A formal analysis of the neuchâtel e-voting protocol
V Cortier, D Galindo, M Turuani
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 430-442, 2018
492018
Identity-based encryption with master key-dependent message security and leakage-resilience
D Galindo, J Herranz, J Villar
European Symposium on Research in Computer Security, 627-642, 2012
472012
An overview of the iVote 2015 voting system
I Brightwell, J Cucurull, D Galindo, S Guasch
New South Wales Electoral Commission, Australia, Scytl Secure Electronic …, 2015
402015
The system can't perform the operation now. Try again later.
Articles 1–20