| 1 | 2002 | Crypto | pc |
| 2 | 2001 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | Long-lived digital integrity using short-lived hash functions | eprint | online |
| 2 | 1998 | New Constructions for Secure Hash Functions | fse | 150-167 |
| 3 | 1996 | Joint Encryption and Message-Efficient Secure Computation | jofc | 217-232 |
| 4 | 1993 | Joint Encryption and Message-Efficient Secure Computation | crypto | 266-277 |
| 5 | 1992 | Cryptographic Protocols Provably Secure Against Dynamic Adversaries | eurocrypt | 307-323 |
| 6 | 1991 | How to Time-Stamp a Digital Document | jofc | 99-111 |
| 7 | 1990 | How to Time-Stamp a Digital Document | crypto | 437-455 |
| 8 | 1989 | A Secure Public-key Authentication Scheme | eurocrypt | 3-15 |
| 9 | 1987 | Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model | crypto | 135-155 |
| 10 | 1985 | Symmetric Public-Key Encryption | crypto | 128-137 |
Coauthors of Stuart Haber |