| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2009 | Upper and Lower Bounds on Black-Box Steganography | jofc | 365-394 |
| 2 | 2005 | Upper and Lower Bounds on Black-Box Steganography | tcc | online |
| 3 | 2005 | Intrusion-Resilient Secure Channels | eprint | online |
| 4 | 2004 | Upper and Lower Bounds on Black-Box Steganography | eprint | online |
| 5 | 2003 | Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary | eprint | online |
| 6 | 2003 | Cryptographic Tamper Evidence | eprint | online |
| 7 | 2002 | SiBIR: Signer-Base Intrusion-Resilient Signatures | eprint | online |
| 8 | 2002 | SiBIR: Signer-Base Intrusion-Resilient Signatures | crypto | online |
| 9 | 2001 | Forward-Secure Signatures with Optimal Signing and Verifying | crypto | 332-354 |
| 10 | 2001 | Forward-Secure Signatures with Optimal Signing and Verifying | eprint | online |
Coauthors of Gene Itkis |