A variety of cryptographic election protocols have been proposed over the past 14 years that have been designed to minimize fraud and maximize privacy. In addition, some have been designed with additional goals in mind, such as making it impossible for voters to prove that they voted in a particular way. Many of the proposed protocols are not practical to implement for a large number of geographically distributed voters; however, they remain of theoretical interest. In this section we provide a brief analysis of several other cryptographic election protocols as well as traditional election protocols, and compare them with Sensus.