| 1 | 2006 | PKC | pc |
| 2 | 2005 | Crypto | pc |
| 3 | 2004 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2009 | Using Abelian Varieties to Improve Pairing-Based Cryptography | jofc | 330-364 |
| 2 | 2007 | Choosing the correct elliptic curve in the CM method | eprint | online |
| 3 | 2005 | Practical Cryptography in High Dimensional Tori | eurocrypt | online |
| 4 | 2004 | Practical Cryptography in High Dimensional Tori | eprint | online |
| 5 | 2004 | Using primitive subgroups to do more with fewer bits | eprint | online |
| 6 | 2003 | Torus-Based Cryptography | crypto | online |
| 7 | 2003 | Torus-based cryptography | eprint | online |
| 8 | 2002 | Hierarchical ID-Based Cryptography | eprint | online |
| 9 | 2002 | Applications of Multilinear Forms to Cryptography | eprint | online |
| 10 | 2002 | Supersingular Abelian Varieties in Cryptology | crypto | online |
| 11 | 2002 | Hierarchical ID-Based Cryptography | asiacrypt | online |
| 12 | 2001 | Efficient Traitor Tracing Algorithms using List Decoding | eprint | online |
| 13 | 2001 | Efficient Traitor Tracing Algorithms Using List Decoding | asiacrypt | 175-192 |
Coauthors of Alice Silverberg |