| year | title | booktitle | pages |
|---|
| 1 | 2011 | Perfectly-Secure Multiplication for any $t | crypto | 237 |
| 2 | 2011 | Secure Computation Without Authentication | jofc | 720-760 |
| 3 | 2010 | Secure Network Coding over the Integers | pkc | 142-160 |
| 4 | 2010 | Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings | crypto | |
| 5 | 2010 | Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead | eprint | online |
| 6 | 2010 | Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | eurocrypt | 135-156 |
| 7 | 2009 | The Round Complexity of Verifiable Secret Sharing Revisited | crypto | 487-504 |
| 8 | 2008 | Degradation and Amplification of Computational Hardness | tcc | 626-643 |
| 9 | 2008 | Threshold RSA for Dynamic and Ad-Hoc Groups | eprint | online |
| 10 | 2008 | Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs | eprint | online |
| 11 | 2008 | Degradation and Amplification of Computational Hardness | eprint | online |
| 12 | 2008 | Threshold RSA for Dynamic and Ad-Hoc Groups | eurocrypt | 88-107 |
| 13 | 2007 | Secure Computation Without Authentication | eprint | online |
| 14 | 2007 | Secure Distributed Key Generation for Discrete-Log Based Cryptosystems | jofc | 51-83 |
| 15 | 2007 | Robust and Efficient Sharing of RSA Functions | jofc | 393 |
| 16 | 2007 | RSA-Based Undeniable Signatures | jofc | 394 |
| 17 | 2006 | Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings | tcc | |
| 18 | 2005 | Secure Computation Without Authentication | crypto | online |
| 19 | 2004 | Secure Hashed Diffie-Hellman over Non-DDH Groups | eurocrypt | online |
| 20 | 2004 | Secure Hashed Diffie-Hellman over Non-DDH Groups | eprint | online |
| 21 | 2004 | Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering | tcc | 258-277 |
| 22 | 2004 | On the Composition of Authenticated Byzantine Agreement | eprint | online |
| 23 | 2004 | Protocol Initialization for the Framework of Universal Composability | eprint | online |
| 24 | 2004 | Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes | crypto | online |
| 25 | 2003 | Universal Composition with Joint State | crypto | online |
| 26 | 2002 | On 2-Round Secure Multiparty Computation | crypto | online |
| 27 | 2002 | On the Security of Joint Signature and Encryption | eprint | online |
| 28 | 2002 | Universal Composition with Joint State | eprint | online |
| 29 | 2002 | On the Security of Joint Signature and Encryption | eurocrypt | online |
| 30 | 2000 | Robust and Efficient Sharing of RSA Functions | jofc | 273-300 |
| 31 | 2000 | RSA-Based Undeniable Signatures | jofc | 397-416 |
| 32 | 2000 | A Cryptographic Solution to a Game Theoretic Problem | crypto | 112-130 |
| 33 | 1999 | Secure Hash-and-Sign Signatures Without the Random Oracle | eurocrypt | 123-139 |
| 34 | 1999 | Secure Distributed Key Generation for Discrete-Log Based Cryptosystems | eurocrypt | 295-310 |
| 35 | 1999 | Adaptive Security for Threshold Cryptosystems | crypto | 98-115 |
| 36 | 1999 | Secure Hash-and-Sign Signatures without the Random Oracle | eprint | online |
| 37 | 1999 | Efficient Multiparty Computations Secure Against an Adaptive Adversary | eurocrypt | 311-326 |
| 38 | 1998 | Fast Batch Verification for Modular Exponentiation and Digital Signatures | eurocrypt | 236-250 |
| 39 | 1998 | Fast Batch Verification for Modular Exponentiation and Digital Signatures | eprint | online |
| 40 | 1998 | An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products | eprint | online |
| 41 | 1998 | Chameleon Hashing and Signatures | eprint | online |
| 42 | 1998 | Secure Distributed Storage and Retrieval | eprint | online |
| 43 | 1998 | A Simplified Approach to Threshold and Proactive RSA | crypto | 89-104 |
| 44 | 1997 | RSA-Based Undeniable Signatures | crypto | 132-149 |
| 45 | 1996 | Robust Threshold DSS Signatures | eurocrypt | 354-371 |
| 46 | 1996 | Robust and Efficient Sharing of RSA Functions | crypto | 157-172 |
| 47 | 1990 | Collective Coin Tossing Without Assumptions nor Broadcasting | crypto | 253-266 |