| 1 | 2011 | Asiacrypt | pc |
| 2 | 2010 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2010 | A Closer Look at Anonymity and Robustness in Encryption Schemes | asiacrypt | 501-518 |
| 2 | 2010 | Adaptive Trapdoor Functions and Chosen-Ciphertext Security | eurocrypt | 673-692 |
| 3 | 2009 | Communication-Efficient Private Protocols for Longest Common Subsequence | eprint | online |
| 4 | 2008 | Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries | crypto | 481-496 |
| 5 | 2008 | Efficient Two Party and Multi Party Computation Against Covert Adversaries | eurocrypt | 289-306 |
| 6 | 2007 | Multi-party Indirect Indexing and Applications | asiacrypt | 283-297 |
| 7 | 2007 | Multi-Party Indirect Indexing and Applications | eprint | online |
| 8 | 2007 | Secure Linear Algebra Using Linearly Recurrent Sequences | tcc | 291-310 |
| 9 | 2006 | Computational Soundness of Formal Indistinguishability and Static Equivalence | eprint | online |
| 10 | 2006 | Improved Efficiency for Private Stable Matching | eprint | online |
| 11 | 2006 | Efficient Polynomial Operations in the Shared-Coefficients Setting | pkc | online |
| 12 | 2006 | Efficiency Tradeoffs for Malicious Two-Party Computation | pkc | online |
Coauthors of Payman Mohassel |