| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 1998 | Private Information Retrieval by Keywords | eprint | online |
| 2 | 1995 | Secret Sharing with Public Reconstruction (Extended Abstract) | crypto | 353-366 |
| 3 | 1994 | On the Structure of the Privacy Hierarchy | jofc | 53-60 |
| 4 | 1994 | Tracing Traitors | crypto | 257-270 |
| 5 | 1993 | Interaction in Key Distribution Schemes (Extended Abstract) | crypto | 444-455 |
| 6 | 1993 | Secret Sharing Over Infinite Domains | jofc | 87-95 |
| 7 | 1992 | Universally Ideal Secret Sharing Schemes (Preliminary Version) | crypto | 183-195 |
| 8 | 1989 | Secret Sharing Over Infinite Domains (Extended Abstract) | crypto | 299-306 |
| 9 | 1985 | The Bit Security of Modular Squaring Given Partial Factorization of the Modulos | crypto | 448-457 |
| 10 | 1984 | RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure | crypto | 303-313 |
| 11 | 1984 | A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields | crypto | 54-65 |
Coauthors of Benny Chor |