| 1 | 2003 | Eurocrypt | pc |
| 2 | 2002 | Eurocrypt | pc |
| 3 | 2000 | Eurocrypt | pc |
| 4 | 2000 | Crypto | pc |
| 5 | 1999 | Eurocrypt | pc |
| 6 | 1997 | Eurocrypt | pc |
| 7 | 1996 | Crypto | pc |
| 8 | 1996 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2005 | Pass-thoughts: Authenticating With Our Minds | eprint | online |
| 2 | 1999 | Parallel Collision Search with Cryptanalytic Applications | jofc | 1-28 |
| 3 | 1996 | On Diffie-Hellman Key Agreement with Short Exponents | eurocrypt | 332-343 |
| 4 | 1996 | Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude | crypto | 229-236 |
| 5 | 1996 | On the Security of Two MAC Algorithms | eurocrypt | 19-32 |
| 6 | 1995 | MDx-MAC and Building Fast MACs from Hash Functions | crypto | 1-14 |
| 7 | 1993 | An Alternate Explanation of two BAN-logic "failures" | eurocrypt | 443-447 |
| 8 | 1990 | A Known Plaintext Attack on Two-Key Triple Encryption | eurocrypt | 318-325 |
| 9 | 1990 | A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms | crypto | 576-581 |
Coauthors of Paul C. van Oorschot |