| year | title | booktitle | pages |
|---|
| 1 | 2010 | Skew-Frobenius map on twisted Edwards curve | eprint | online |
| 2 | 2007 | Formal Proofs for the Security of Signcryption | jofc | 203-235 |
| 3 | 2005 | Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms | eprint | online |
| 4 | 2004 | Identity-Based Threshold Decryption | pkc | online |
| 5 | 2003 | Identity-Based Threshold Decryption | eprint | online |
| 6 | 2002 | Formal Proofs for the Security of Signcryption | pkc | 80-98 |
| 7 | 2002 | Content Extraction Signatures | eprint | online |
| 8 | 2002 | Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code | pkc | 64-79 |
| 9 | 2002 | Security Notions for Unconditionally Secure Signature Schemes | eurocrypt | online |
| 10 | 2001 | Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite | pkc | 48-63 |
| 11 | 2000 | Unconditionally Secure Digital Signature Schemes Admitting Transferability | asiacrypt | 130-142 |
| 12 | 2000 | On Relationships among Avalanche, Nonlinearity, and Correlation Immunity | asiacrypt | 470-482 |
| 13 | 1999 | An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks | asiacrypt | 348-362 |
| 14 | 1999 | Encrypted Message Authentication by Firewalls | pkc | 69-81 |
| 15 | 1999 | Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves | asiacrypt | 86-102 |
| 16 | 1998 | A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation | pkc | 217-233 |
| 17 | 1997 | Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) | crypto | 165-179 |
| 18 | 1996 | Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions | eurocrypt | 294-306 |
| 19 | 1995 | On Nonlinear Resilient Functions (Extended Abstract) | eurocrypt | 274-288 |
| 20 | 1994 | Comments on Soviet Encryption Algorithm | eurocrypt | 433-438 |
| 21 | 1994 | How to Break and Repair Leighton and Micali's Key Agreement Protocol | eurocrypt | 299-305 |
| 22 | 1994 | Relationships Among Nonlinear Criteria (Extended Abstract) | eurocrypt | 376-388 |
| 23 | 1994 | Pitfalls in Designing Substitution Boxes (Extended Abstract) | crypto | 383-396 |
| 24 | 1994 | Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract) | asiacrypt | 119-132 |
| 25 | 1993 | On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract) | eurocrypt | 181-199 |
| 26 | 1993 | Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract) | crypto | 49-60 |
| 27 | 1992 | HAVAL - A One-Way Hashing Algorithm with Variable Length of Output | auscrypt | 83-104 |
| 28 | 1992 | A Practical Digital Multisignature Scheme Based on Discrete Logarithms | auscrypt | 122-132 |
| 29 | 1992 | Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract) | crypto | 292-304 |
| 30 | 1992 | Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings | auscrypt | |
| 31 | 1991 | How to Construct A Family of Strong One Way Permutations | asiacrypt | 97-110 |
| 32 | 1991 | Sibling Intractable Function Families and Their Applications (Extended Abstract) | asiacrypt | 124-138 |
| 33 | 1990 | Structural Properties of One-way Hash Functions | crypto | 285-302 |
| 34 | 1989 | On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses | crypto | 461-480 |
| 35 | 1989 | Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract) | eurocrypt | 412-422 |