| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Communication Complexity in Algebraic Two-Party Protocols | crypto | 379-396 |
| 2 | 2008 | Public-Key Encryption with Efficient Amortized Updates | eprint | online |
| 3 | 2007 | A Survey of Single Database PIR: Techniques and Applications | eprint | online |
| 4 | 2007 | Algebraic Lower Bounds for Computing on Encrypted Data | eprint | online |
| 5 | 2007 | Public Key Encryption that Allows PIR Queries | eprint | online |
| 6 | 2007 | Public Key Encryption That Allows PIR Queries | crypto | 50-67 |
| 7 | 2007 | A Survey of Single-Database Private Information Retrieval: Techniques and Applications | pkc | 393-411 |
| 8 | 2005 | Private Searching on Streaming Data | crypto | online |
Coauthors of William E. Skeith III |