| 1 | 2009 | TCC | pc |
| 2 | 2008 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | From Weak to Strong Watermarking | tcc | 362-382 |
| 2 | 2006 | From Weak to Strong Watermarking | eprint | online |
| 3 | 2004 | Timed-Release and Key-Insulated Public Key Encryption | eprint | online |
| 4 | 2004 | Public-Key Steganography | eurocrypt | online |
| 5 | 2003 | Public Key Steganography | eprint | online |
| 6 | 2003 | CAPTCHA: Using Hard AI Problems for Security | eurocrypt | online |
| 7 | 2002 | Provably Secure Steganography | crypto | online |
| 8 | 2002 | Provably Secure Steganography | eprint | online |
| 9 | 2001 | Secure Human Identification Protocols | asiacrypt | 52-66 |
Coauthors of Nicholas J. Hopper |