| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model | ches | 140-154 |
| 2 | 2010 | Algebraic Side-Channel Analysis in the Presence of Errors | ches | 428-442 |
| 3 | 2007 | CRUST: Cryptographic Remote Untrusted Storage without Public Keys | eprint | online |
| 4 | 2006 | How to Build a Low-Cost, Extended-Range RFID Skimmer | eprint | online |
| 5 | 2006 | Cryptanalysis of the Bluetooth E0 Cipher using OBDD's | eprint | online |
| 6 | 2005 | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | eprint | online |
| 7 | 2005 | A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher | eprint | online |
| 8 | 2005 | One-Time Signatures Revisited: Have They Become Practical? | eprint | online |
| 9 | 2000 | Long-Lived Broadcast Encryption | crypto | 333-352 |
| 10 | 1998 | Quorum-Based Secure Multi-party Computation | eurocrypt | 375-390 |
Coauthors of Avishai Wool |