| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | Intrusion-Resilient Key Exchange in the Bounded Retrieval Model | tcc | 479-498 |
| 2 | 2006 | Perfectly Secure Password Protocols in the Bounded Retrieval Model | tcc | online |
| 3 | 2005 | Intrusion-Resilient Authentication in the Limited Communication Model | eprint | online |
| 4 | 2001 | On the Importance of Eliminating Errors in Cryptographic Computations | jofc | 101-119 |
| 5 | 1997 | On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) | eurocrypt | 37-51 |
| 6 | 1996 | Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract) | crypto | 283-297 |
| 7 | 1995 | Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract) | crypto | 424-437 |
| 8 | 1993 | Cryptographic Primitives Based on Hard Learning Problems | crypto | 278-291 |
Coauthors of Richard J. Lipton |