| 1 | 2002 | Crypto | pc |
| 2 | 1998 | Asiacrypt | pc |
| 3 | 1996 | Asiacrypt | pc |
| 4 | 1994 | Crypto | pc |
| 5 | 1991 | Asiacrypt | pc |
| 6 | 1990 | Crypto | pc |
| 7 | 1988 | Crypto | pc |
| 8 | 1987 | Crypto | pc |
| 9 | 1986 | Crypto | pc |
| 10 | 1985 | Crypto | pc |
| 11 | 1983 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2000 | Cryptography Everywhere | asiacrypt | 72 |
| 2 | 1997 | Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack | crypto | 213-220 |
| 3 | 1996 | Truncated Differentials of SAFER | fse | 15-26 |
| 4 | 1992 | Differential Cryptanalysis Mod $2^32$ with Applications to MD5 | eurocrypt | 71-80 |
| 5 | 1989 | How to Explain Zero-Knowledge Protocols to Your Children | crypto | 628-631 |
| 6 | 1982 | Local Network Cryptosystem Architecture: Access Control | crypto | 251-258 |
| 7 | 1982 | Long Key Variants of DES | crypto | 311-313 |
| 8 | 1981 | Local Network Cryptosystem Architecture | crypto | 73-78 |
Coauthors of Thomas A. Berson |