| year | title | booktitle | pages |
|---|
| 1 | 2012 | DDH-Like Assumptions Based on Extension Rings | pkc | 644-661 |
| 2 | 2012 | Identity-Based (Lossy) Trapdoor Functions and Applications | eurocrypt | 228-245 |
| 3 | 2012 | Message Authentication, Revisited | eurocrypt | 355-374 |
| 4 | 2012 | Optimal Security Proofs for Full Domain Hash, Revisited | eurocrypt | 537-553 |
| 5 | 2011 | Efficient Authentication from Hard Learning Problems | eurocrypt  | 7 |
| 6 | 2011 | Short Signatures from Weaker Assumptions | asiacrypt | 647-666 |
| 7 | 2010 | Leakage Resilient ElGamal Encryption | asiacrypt | 595-612 |
| 8 | 2010 | A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems | tcc | 146-164 |
| 9 | 2010 | Leakage-Resilient Signatures | tcc | 343-360 |
| 10 | 2010 | Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model | pkc | 1-18 |
| 11 | 2010 | More Constructions of Lossy and Correlation-Secure Trapdoor Functions | pkc | 279-295 |
| 12 | 2010 | Instantiability of RSA-OAEP under Chosen-Plaintext Attack | crypto | 295-313 |
| 13 | 2010 | Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model | eprint | online |
| 14 | 2010 | Bonsai Trees, or How to Delegate a Lattice Basis | eurocrypt  | 523-552 |
| 15 | 2010 | Adaptive Trapdoor Functions and Chosen-Ciphertext Security | eurocrypt | 673-692 |
| 16 | 2010 | Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks | eurocrypt | 381-402 |
| 17 | 2009 | Practical Chosen Ciphertext Secure Encryption from Factoring | eurocrypt  | 313-332 |
| 18 | 2009 | Compact CCA-Secure Encryption for Messages of Arbitrary Length | pkc | 377-392 |
| 19 | 2009 | The Group of Signed Quadratic Residues and Applications | crypto | 637-653 |
| 20 | 2009 | The Twin Diffie-Hellman Problem and Applications | jofc | 470-504 |
| 21 | 2009 | On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model | eurocrypt | 389-406 |
| 22 | 2009 | A New Randomness Extraction Paradigm for Hybrid Encryption | eurocrypt | 590-609 |
| 23 | 2008 | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | jofc | 350-391 |
| 24 | 2008 | CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption | eprint | online |
| 25 | 2008 | The CCA2-Security of Hybrid Damgård's ElGamal | eprint | online |
| 26 | 2008 | Programmable Hash Functions and Their Applications | crypto | 21-38 |
| 27 | 2008 | The Twin Diffie-Hellman Problem and Applications | eprint | online |
| 28 | 2008 | A New Randomness Extraction Paradigm for Hybrid Encryption | eprint | online |
| 29 | 2008 | Chosen Ciphertext Security with Optimal Ciphertext Overhead | asiacrypt | 355-371 |
| 30 | 2008 | The Twin Diffie-Hellman Problem and Applications | eurocrypt | 127-145 |
| 31 | 2007 | Secure Hybrid Encryption from Weakened Key Encapsulation | eprint | online |
| 32 | 2007 | From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme | eprint | online |
| 33 | 2007 | Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman | eprint | online |
| 34 | 2007 | Bounded CCA2-Secure Encryption | asiacrypt | 502-518 |
| 35 | 2007 | Secure Hybrid Encryption from Weakened Key Encapsulation | crypto | 553-571 |
| 36 | 2007 | Secure Linear Algebra Using Linearly Recurrent Sequences | tcc | 291-310 |
| 37 | 2007 | A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra | crypto | 613-630 |
| 38 | 2007 | Generalized Key Delegation for Hierarchical Identity-Based Encryption | eprint | online |
| 39 | 2007 | Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman | pkc | 282-297 |
| 40 | 2007 | Efficient Hybrid Encryption from ID-Based Encryption | eprint | online |
| 41 | 2006 | Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles | eprint | online |
| 42 | 2006 | Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation | tcc | online |
| 43 | 2006 | Chosen-Ciphertext Security from Tag-Based Encryption | tcc | online |
| 44 | 2006 | Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts | eprint | online |
| 45 | 2006 | A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security | eprint | online |
| 46 | 2006 | The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure | eprint | online |
| 47 | 2006 | On the Generic Construction of Identity-Based Signatures with Additional Properties | asiacrypt | online |
| 48 | 2006 | On the Limitations of the Spread of an IBE-to-PKE Transformation | pkc | online |
| 49 | 2006 | KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption | eprint | online |
| 50 | 2005 | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | eprint | online |
| 51 | 2005 | Secure Computation of the Mean and Related Statistics | tcc | online |
| 52 | 2005 | Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation | eprint | online |
| 53 | 2005 | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | crypto | online |
| 54 | 2005 | Append-Only Signatures | eprint | online |
| 55 | 2004 | Secure Computation of the Mean and Related Statistics | eprint | online |