Resources
From high-level illustrations to formal specifications — everything you need to understand secure internet voting.
Presented at the academic conference E-Vote-ID, this poster details the specific security properties of the SIV protocol, and more.
Answers to common questions about digital voting, security, privacy, and how SIV compares to traditional methods.
An interactive, step-by-step walkthrough of how SIV works.
The detailed technical specification defining a SIV election, covering cryptographic primitives, data structures, and network endpoints.
The cryptographic building blocks that make authenticated, private, and verifiable digital voting possible.
Learn about the SIV Protocol, authentication, privacy, verifiability, how attacks are mitigated, and more.