| 1 | 1999 | Eurocrypt | pc |
| 2 | 1996 | Crypto | pc |
| 3 | 1993 | Crypto | pc |
| 4 | 1992 | Eurocrypt | pc |
| 5 | 1991 | Crypto | pc chair |
| 6 | 1989 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2001 | Secure Multiparty Computation of Approximations | eprint | online |
| 2 | 2000 | Secure Multiparty Computation of Approximations | eprint | online |
| 3 | 1998 | A Formal Treatment of Remotely Keyed Encryption | eurocrypt | 251-265 |
| 4 | 1997 | Locally Random Reductions: Improvements and Applications | jofc | 17-36 |
| 5 | 1991 | A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems | asiacrypt | 352-359 |
| 6 | 1990 | Secure Circuit Evaluation | jofc | 1-12 |
| 7 | 1990 | Security with Low Communication Overhead | crypto | 62-76 |
| 8 | 1990 | Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract) | crypto | 326-338 |
| 9 | 1988 | On Generating Solved Instances of Computational Problems | crypto | 297-310 |
| 10 | 1985 | Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him? | crypto | 477-488 |
Coauthors of Joan Feigenbaum |