| 1 | 2012 | CHES | pc |
| 2 | 2011 | CHES | pc |
| 3 | 2010 | CHES | pc |
| 4 | 2009 | CHES | pc |
| 5 | 2008 | CHES | pc |
| 6 | 2007 | CHES | pc |
| 7 | 2006 | CHES | pc |
| 8 | 2005 | CHES | general chair |
| 9 | 2005 | CHES | pc |
| 10 | 2004 | CHES | pc |
| 11 | 2003 | CHES | pc chair |
| 12 | 2002 | CHES | pc |
| 13 | 2001 | CHES | pc |
| 14 | 2000 | CHES | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths | ches | 214-227 |
| 2 | 2004 | Simple Power Analysis of Unified Code for ECC Double and Add | ches | 191-204 |
| 3 | 2003 | Security Constraints on the Oswald-Aigner Exponentiation Algorithm | eprint | online |
| 4 | 2002 | Some Security Aspects of the M IST Randomized Exponentiation Algorithm | ches | 276-290 |
| 5 | 2001 | Sliding Windows Succumbs to Big Mac Attack | ches | 286-299 |
| 6 | 2000 | Data Integrity in Hardware for Modular Arithmetic | ches | 204-215 |
| 7 | 1999 | Montgomery's Multiplication Technique: How to Make It Smaller and Faster | ches | 80-93 |
| 8 | 1991 | Faster Modular Multiplication by Operand Scaling | crypto | 313-323 |
Coauthors of Colin D. Walter |