| 1 | 2011 | Crypto | pc |
| 2 | 2010 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | A Mix-Net from Any CCA2 Secure Cryptosystem | asiacrypt | 607-625 |
| 2 | 2012 | Counterexamples to Hardness Amplification beyond Negligible | tcc | 476-493 |
| 3 | 2011 | Time-Lock Puzzles in the Random Oracle Model | crypto | 39 |
| 4 | 2010 | On Complete Primitives for Fairness | tcc | 91-108 |
| 5 | 2009 | Non-interactive Timestamping in the Bounded-Storage Model | jofc | 189-226 |
| 6 | 2009 | An Optimally Fair Coin Toss | tcc | 1-18 |
| 7 | 2008 | David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware | eprint | online |
| 8 | 2008 | David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware | eurocrypt | 527-544 |
| 9 | 2007 | Deterministic History-Independent Strategies for Storing Information on Write-Once Memories | eprint | online |
| 10 | 2006 | Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol | eurocrypt | online |
| 11 | 2006 | Receipt-Free Universally-Verifiable Voting with Everlasting Privacy | crypto | online |
| 12 | 2004 | Non-interactive Timestamping in the Bounded Storage Model | crypto | online |
Coauthors of Tal Moran |