| 1 | 2006 | Asiacrypt | pc |
| 2 | 2005 | Asiacrypt | pc |
| 3 | 2003 | Asiacrypt | pc chair |
| 4 | 2002 | Asiacrypt | pc |
| 5 | 2001 | PKC | pc |
| 6 | 2001 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2005 | Fast Multi-computations with Integer Similarity Strategy | pkc | online |
| 2 | 1999 | On the Design of RSA with Short Secret Exponent | asiacrypt | 150-164 |
| 3 | 1992 | The Fast Cascade Exponentation Algorithm and its Applications on Cryptography | auscrypt | 447-456 |
| 4 | 1992 | Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols | auscrypt | 219-230 |
| 5 | 1992 | On Verifiable Implicit Asking Protocols for RSA Computation | auscrypt | 296-307 |
| 6 | 1991 | Generalized Threshold Cryptosystems | asiacrypt | 159-166 |
| 7 | 1991 | Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence | asiacrypt | 450-459 |
| 8 | 1989 | Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space | crypto | 286-298 |
Coauthors of Chi-Sung Laih |