| 1 | 2011 | PKC | pc |
| 2 | 2008 | PKC | pc |
| 3 | 2006 | Crypto | pc |
| 4 | 2006 | PKC | pc |
| 5 | 2005 | PKC | pc |
| 6 | 2004 | Eurocrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2010 | A Taxonomy of Pairing-Friendly Elliptic Curves | jofc | 224-280 |
| 2 | 2007 | On prime-order elliptic curves with embedding degrees k=3,4 and 6 | eprint | online |
| 3 | 2006 | An Elliptic Curve Trapdoor System | jofc | 115-133 |
| 4 | 2006 | A taxonomy of pairing-friendly elliptic curves | eprint | online |
| 5 | 2004 | Cryptographic Implications of Hess' Generalized GHS Attack | eprint | online |
| 6 | 2003 | Weak Fields for ECC | eprint | online |
| 7 | 2003 | An Elliptic Curve Trapdoor System | eprint | online |
| 8 | 2002 | On some Attacks on Multi-prime RSA | eprint | online |
| 9 | 2001 | Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree | eprint | online |
Coauthors of Edlyn Teske |