| 1 | 2009 | Asiacrypt | pc |
| 2 | 2008 | Asiacrypt | pc |
| 3 | 2002 | Eurocrypt | pc |
| 4 | 2002 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2009 | Key Predistribution Techniques for Grid-Based Wireless Sensor Networks | eprint | online |
| 2 | 2004 | Updating the Parameters of a Threshold Scheme by Minimal Broadcast | eprint | online |
| 3 | 2004 | Optimal Updating of Ideal Threshold Schemes | eprint | online |
| 4 | 2003 | Distributing the Encryption and Decryption of a Block Cipher | eprint | online |
| 5 | 1997 | Mutually Trusted Authority-Free Secret Sharing Schemes | jofc | 261-289 |
| 6 | 1996 | Ideal Secret Sharing Schemes with Multiple Secrets | jofc | 233-250 |
| 7 | 1995 | Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract) | eurocrypt | 183-193 |
| 8 | 1994 | On Sharing Many Secrets (Extended Abstract) | asiacrypt | 42-54 |
| 9 | 1993 | Multisecret Threshold Schemes | crypto | 126-135 |
| 10 | 1992 | Cumulative Arrays and Geometric Secret Sharing Schemes | auscrypt | 48-55 |
| 11 | 1990 | Some Remarks on Authentication Systems | auscrypt | 122-139 |
Coauthors of Keith M. Martin |