| 1 | 2005 | CHES | pc |
| 2 | 2003 | CHES | pc |
| 3 | 2003 | FSE | pc |
| 4 | 2002 | FSE | pc |
| 5 | 2001 | CHES | pc |
| 6 | 2001 | FSE | pc |
| 7 | 2000 | Asiacrypt | pc |
| 8 | 2000 | FSE | pc |
| 9 | 1999 | FSE | pc |
| 10 | 1998 | FSE | pc |
| 11 | 1997 | FSE | pc |
| 12 | 1996 | FSE | general chair |
| 13 | 1996 | FSE | pc |
| 14 | 1996 | Asiacrypt | pc |
| 15 | 1995 | Crypto | pc |
| 16 | 1994 | FSE | pc |
| 17 | 1993 | FSE | general chair |
| 18 | 1993 | FSE | pc chair |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | Information Security Economics - and Beyond | crypto | 68-91 |
| 2 | 2005 | The topology of covert conflict | eprint | online |
| 3 | 2002 | Optical Fault Induction Attacks | ches | 2-12 |
| 4 | 2001 | Protecting Embedded Systems - The Next Ten Years | ches | 1-2 |
| 5 | 1998 | Serpent: A New Block Cipher Proposal | fse | 222-238 |
| 6 | 1997 | Chameleon - A New Kind of Stream Cipher | fse | 107-113 |
| 7 | 1997 | Advanced Encryption Standard | fse | 83-87 |
| 8 | 1997 | The GCHQ Protocol and Its Problems | eurocrypt | 134-148 |
| 9 | 1996 | Minding your p's and q`s | asiacrypt | 26-35 |
| 10 | 1996 | TIGER: A Fast New Hash Function | fse | 89-97 |
| 11 | 1996 | Two Practical and Provably Secure Block Ciphers: BEARS and LION | fse | 113-120 |
| 12 | 1995 | Robustness Principles for Public Key Protocols | crypto | 236-247 |
| 13 | 1994 | Searching for the Optimum Correlation Attack | fse | 137-143 |
| 14 | 1994 | On Fibonacci Keystream Generators | fse | 346-352 |
| 15 | 1993 | A Modern Rotor Machine | fse | 47-50 |
Coauthors of Ross J. Anderson |