| 1 | 2006 | PKC | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2005 | Distributed Phishing Attacks | eprint | online |
| 2 | 2001 | Bandwidth-Optimal Kleptographic Attacks | ches | 235-250 |
| 3 | 2001 | A PVSS as Hard as Discrete Log and Shareholder Separability | pkc | 287-299 |
| 4 | 2000 | Towards Signature-Only Signature Schemes | asiacrypt | 97-115 |
| 5 | 2000 | RSA-Based Auto-recoverable Cryptosystems | pkc | 326-341 |
| 6 | 1999 | Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy | pkc | 306-314 |
| 7 | 1998 | Auto-Recoverable Auto-Certifiable Cryptosystems | eurocrypt | 17-31 |
| 8 | 1998 | Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs | fse | 122-133 |
| 9 | 1997 | The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems | crypto | 264-276 |
| 10 | 1997 | Kleptography: Using Cryptography Against Cryptography | eurocrypt | 62-74 |
| 11 | 1997 | Sliding Encryption: A Cryptographic Tool for Mobile Agents | fse | 230-241 |
| 12 | 1996 | The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? | crypto | 89-103 |
Coauthors of Adam Young |