| 1 | 1988 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | On Seed-Incompressible Functions | tcc | 19-36 |
| 2 | 2008 | Password Mistyping in Two-Factor-Authenticated Key Exchange | eprint | online |
| 3 | 2006 | Key Exchange Using Passwords and Long Keys | eprint | online |
| 4 | 2006 | Key Exchange Using Passwords and Long Keys | tcc | online |
| 5 | 2004 | Efficient Consistency Proofs for Generalized Queries on a Committed Database | eprint | online |
| 6 | 2000 | CBC MAC for Real-Time Data Sources | jofc | 315-338 |
| 7 | 1997 | CBC MAC for Real-Time Data Sources | eprint | online |
| 8 | 1996 | A Secure Protocol for the Oblivious Transfer (Extended Abstract) | jofc | 191-195 |
| 9 | 1991 | Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack | crypto | 433-444 |
| 10 | 1989 | A Study of Password Security | jofc | 151-158 |
| 11 | 1988 | A Basic Theory of Public and Private Cryptosystems | crypto | 249-255 |
| 12 | 1987 | A Study of Password Security | crypto | 392-397 |
| 13 | 1986 | The Notion of Security for Probabilistic Cryptosystems | crypto | 381-392 |
| 14 | 1985 | How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) | crypto | 447 |
Coauthors of Charles Rackoff |