| 1 | 2003 | FSE | general chair |
| 2 | 1994 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2000 | A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers | fse | 181-195 |
| 2 | 1997 | Fast Message Authentication Using Efficient Polynomial Evaluation | fse | 190-204 |
| 3 | 1994 | On A²-Codes Including Arbiter's Attacks | eurocrypt | 456-460 |
| 4 | 1993 | On the Relation between A-Codes and Codes Correcting Independent Errors | eurocrypt | 1-11 |
| 5 | 1993 | On Families of Hash Functions via Geometric Codes and Concatenation | crypto | 331-342 |
| 6 | 1991 | On A Fast Correlation Attack on Certain Stream Ciphers | eurocrypt | 176-185 |
| 7 | 1990 | On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2 | eurocrypt | 306-312 |
| 8 | 1988 | Windmill Generators: A Generalization and an Observation of How Many There Are | eurocrypt | 325-330 |
| 9 | 1984 | On the Use of the Binary Multiplying Channel in a Private Communication System | eurocrypt | 339-348 |
Coauthors of Ben J. M. Smeets |