Follow
Kristjan Krips
Kristjan Krips
Cybernetica, University of Tartu
Verified email at ut.ee
Title
Cited by
Cited by
Year
On practical aspects of coercion-resistant remote voting systems
K Krips, J Willemson
Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019
232019
Planning the next steps for Estonian Internet voting
S Heiberg, K Krips, J Willemson
E-Vote-ID 2020, 2020
92020
Developing a Personal Voting Machine for the Estonian Internet Voting System
V Farzaliyev, K Krips, J Willemson
SAC '21, 2021
82021
Is your vote overheard? A new scalable side-channel attack against paper voting
K Krips, J Willemson, S Värv
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 621-634, 2019
62019
Facial Recognition for Remote Electronic Voting–Missing Piece of the Puzzle or Yet Another Liability?
S Heiberg, K Krips, J Willemson, P Vinkel
Emerging Technologies for Authorization and Authentication: 4th …, 2022
42022
Mobile voting–still too risky?
S Heiberg, K Krips, J Willemson
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
32021
Implementing an audio side channel for paper voting
K Krips, J Willemson, S Värv
Electronic Voting: Third International Joint Conference, E-Vote-ID 2018 …, 2018
32018
An Internet Voting Protocol with Distributed Verification Receipt Generation
K Krips, I Kubjas, J Willemson
Proceedings of the E-Vote-ID, 128, 2018
22018
Estimating Carbon Footprint of Paper and Internet Voting
J Willemson, K Krips
International Joint Conference on Electronic Voting, 140-155, 2023
12023
Trust assumptions in voting systems
K Krips, N Snetkov, J Vakarjuk, J Willemson
arXiv preprint arXiv:2309.10391, 2023
12023
Formal Verification of an Internet Voting Protocol
K Krips
Second In, 408, 2017
2017
Creating a 3D model from a video by a single camera MTAT. 03.260
K Krips, T Petmanson
2011
Detecting constellations in night sky images Project report Advanced Algorithmics (MTAT. 03.238)
K Krips, T Petmanson
2011
Security of Symmetric Encryption against Mass Surveillance
K Krips
Overview of EasyCrypt tool and its possible applications for ProveIt
K Krips
An overview of Fast Hash Table Lookup Using Extended Bloom Filter
K Krips
Verified Proofs of Higher-Order Masking
K Krips
Tools for analysing the security of symmetric primitives
K Krips
The system can't perform the operation now. Try again later.
Articles 1–18