| 1 | 2008 | TCC | pc |
| 2 | 1994 | Crypto | pc |
| 3 | 1993 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2009 | Chernoff-Type Direct Product Theorems | jofc | 75-92 |
| 2 | 2009 | Security Amplification for InteractiveCryptographic Primitives | tcc | 128-145 |
| 3 | 2007 | Chernoff-Type Direct Product Theorems | crypto | 500-516 |
| 4 | 2001 | On the (Im)possibility of Obfuscating Programs | eprint | online |
| 5 | 2001 | On the (Im)possibility of Obfuscating Programs | crypto | 1-18 |
| 6 | 1999 | A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion | eprint | online |
| 7 | 1996 | Efficient Cryptographic Schemes Provably as Secure as Subset Sum | jofc | 199-216 |
| 8 | 1996 | Designated Verifier Proofs and Their Applications | eurocrypt | 143-154 |
| 9 | 1988 | Limits on the Provable Consequences of One-way Permutations | crypto | 8-26 |
| 10 | 1987 | Direct Minimum-Knowledge Computations | crypto | 40-51 |
Coauthors of Russell Impagliazzo |