| 1 | 2008 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Saving Private Randomness in One-Way Functions and Pseudorandom Generators | tcc | 607-625 |
| 2 | 2008 | OT-Combiners via Secure Computation | tcc | 393-411 |
| 3 | 2007 | How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? | crypto | 284-302 |
| 4 | 2007 | Saving Private Randomness in One-Way Functions and Pseudorandom Generators | eprint | online |
| 5 | 2007 | Constant-Round Oblivious Transfer in the Bounded Storage Model | jofc | 165-202 |
| 6 | 2006 | On the Power of the Randomized Iterate | crypto | online |
| 7 | 2006 | Completeness in Two-Party Secure Computation: A Computational View | jofc | 521-552 |
| 8 | 2005 | On Robust Combiners for Oblivious Transfer and Other Primitives | eurocrypt | online |
| 9 | 2004 | Constant-Round Oblivious Transfer in the Bounded Storage Model | tcc | 446-472 |
Coauthors of Danny Harnik |