| 1 | 2009 | PKC | pc |
| 2 | 2006 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | Efficient Two-Party Secure Computation on Committed Inputs | eurocrypt | 97-114 |
| 2 | 2006 | Security Analysis of Voice-over-IP Protocols | eprint | online |
| 3 | 2006 | Key confirmation and adaptive corruptions in the protocol security logic | eprint | online |
| 4 | 2006 | On the Limits of Point Function Obfuscation | eprint | online |
| 5 | 2005 | Privacy-Preserving Graph Algorithms in the Semi-honest Model | asiacrypt | online |
| 6 | 2005 | Towards computationally sound symbolic analysis of key exchange protocols | eprint | online |
| 7 | 2004 | Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme | eurocrypt | online |
Coauthors of Vitaly Shmatikov |