| 1 | 2011 | FSE | pc |
| 2 | 2011 | CHES | pc |
| 3 | 2010 | FSE | pc |
| 4 | 2010 | Eurocrypt | pc |
| 5 | 2009 | FSE | pc |
| 6 | 2009 | Eurocrypt | pc |
| 7 | 2009 | Asiacrypt | pc |
| 8 | 2009 | CHES | pc |
| 9 | 2008 | FSE | pc |
| 10 | 2007 | CHES | pc |
| 11 | 2007 | Asiacrypt | pc |
| 12 | 2007 | FSE | pc |
| 13 | 2006 | CHES | pc |
| 14 | 2006 | FSE | pc |
| 15 | 2005 | FSE | general chair |
| 16 | 2005 | FSE | pc chair |
| 17 | 2004 | FSE | pc |
| 18 | 2003 | Eurocrypt | pc |
| 19 | 2002 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2010 | Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions | eprint | online |
| 2 | 2008 | Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms | crypto | 144-161 |
| 3 | 2004 | Mobile Terminal Security | eprint | online |
| 4 | 2002 | Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages | eprint | online |
| 5 | 2002 | Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages | pkc | 17-33 |
| 6 | 2001 | Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware | ches | 16-27 |
| 7 | 2000 | A Statistical Attack on RC6 | fse | 64-74 |
| 8 | 1999 | On the Security of Double and 2-Key Triple Modes of Operation | fse | 215-230 |
| 9 | 1999 | ECC: Do We Need to Count? | asiacrypt | 122-134 |
| 10 | 1999 | Decision Oracles are Equivalent to Matching Oracles | pkc | 276-289 |
| 11 | 1999 | Probing Attacks on Tamper-Resistant Devices | ches | 303-315 |
| 12 | 1997 | x2 Cryptanalysis of the SEAL Encryption Algorithm | fse | 1-12 |