The following features have been added.
| Year | Title | Venue |
| 2007 | Tackling Adaptive Corruptions in Multicast Encryption Protocols | tcc |
| 2008 | Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency | tcc |
| 2010 | Parallel Repetition Theorems for Interactive Arguments | tcc |
| 2011 | Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma | tcc |
| 2012 | Compiler Assisted Masking | ches |
| 2012 | Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents | ches |
| 2012 | NEON Crypto | ches |
| 2012 | Efficient Implementations of MQPKS on Constrained Devices | ches |
| 2012 | Practical Leakage-Resilient Symmetric Cryptography | ches |
| 2012 | Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes | ches |
| 2012 | Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems | ches |
| 2012 | Low-Latency Encryption - Is "Lightweight = Light + Wait"? | ches |
| 2012 | Breakthrough Silicon Scanning Discovers Backdoor in Military Chip | ches |
| 2012 | Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication | ches |
| 2012 | 3D Hardware Canaries | ches |
| 2012 | How Far Should Theory Be from Practice? - Evaluation of a Countermeasure | ches |
| 2012 | Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment | ches |
| 2012 | Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA | ches |
| 2012 | Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting | ches |
| 2012 | PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator | ches |
| 2012 | A Differential Fault Attack on the Grain Family of Stream Ciphers | ches |
| 2012 | Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs | ches |
| 2012 | PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon | ches |
| 2012 | Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation | ches |
| 2012 | Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model | ches |
| 2012 | Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings | ches |
| 2012 | Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware | ches |
| 2012 | Practical Security Analysis of PUF-Based Two-Player Protocols | ches |
| 2012 | A Statistical Model for DPA with Novel Algorithmic Confusion Analysis | ches |
| 2012 | Selecting Time Samples for Multivariate DPA Attacks | ches |
| 2012 | Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us | ches |
| 2012 | Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint | ches |
| 2012 | An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor | ches |
| 2012 | On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes | ches |
| 2012 | Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking | ches |
| 2012 | Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs | ches |
| 2012 | Solving Quadratic Equations with XL on Parallel Architectures | ches |
| 2005 | Successfully Attacking Masked AES Hardware Implementations | ches |
| 2012 | Lower Bounds in Differential Privacy | tcc |
| 2012 | Homomorphic Evaluation of the AES Circuit | crypto |
| 2012 | Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves | crypto |
| 2012 | Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP | crypto |
| 2012 | Differential Privacy with Imperfect Randomness | crypto |
| 2012 | Securing Circuits against Constant-Rate Tampering | crypto |
| 2012 | New Preimage Attacks against Reduced SHA-1 | crypto |
| 2012 | Must You Know the Code of f to Securely Compute f? | crypto |
| 2012 | On the Distribution of Linear Biases: Three Instructive Examples | crypto |
| 2012 | Tweakable Blockciphers with Beyond Birthday-Bound Security | crypto |
| 2012 | Secret Sharing Schemes for Very Dense Graphs | crypto |
| 2012 | Black-Box Constructions of Composable Protocols without Set-Up | crypto |
| 2012 | Group Signatures with Almost-for-Free Revocation | crypto |
| 2012 | Crowd-Blending Privacy | crypto |
| 2012 | How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware | crypto |
| 2012 | Tamper and Leakage Resilience in the Split-State Model | crypto |
| 2012 | Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority | crypto |
| 2012 | Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | crypto |
| 2012 | New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation | crypto |
| 2012 | Public Keys | crypto |
| 2012 | Hash Functions Based on Three Permutations: A Generic Security Analysis | crypto |
| 2012 | Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs | crypto |
| 2012 | Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption | crypto |
| 2012 | A New Approach to Practical Active-Secure Two-Party Computation | crypto |
| 2012 | Semantic Security for the Wiretap Channel | crypto |
| 2012 | On the Security of TLS-DHE in the Standard Model | crypto |
| 2012 | Universal Composability from Essentially Any Trusted Setup | crypto |
| 2012 | Quantum to Classical Randomness Extractors | crypto |
| 2012 | Breaking and Repairing GCM Security Proofs | crypto |
| 2012 | To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC | crypto |
| 2012 | Secure Identity-Based Encryption in the Quantum Random Oracle Model | crypto |
| 2012 | Functional Encryption for Regular Languages | crypto |
| 2012 | An Enciphering Scheme Based on a Card Shuffle | crypto |
| 2012 | Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits | crypto |
| 2012 | Actively Secure Two-Party Evaluation of Any Quantum Operation | crypto |
| 2012 | Functional Encryption with Bounded Collusions via Multi-party Computation | crypto |
| 2012 | Secure Database Commitments and Universal Arguments of Quasi Knowledge | crypto |
| 2012 | Resistance against Iterated Attacks by Decorrelation Revisited, | crypto |
| 2012 | Adaptively Secure Multi-Party Computation with Dishonest Majority | crypto |
| 2012 | On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups | crypto |
| 2012 | Impossibility Results for Static Input Secure Computation | crypto |
| 2012 | Collusion-Preserving Computation | crypto |
| 2012 | Multiparty Computation from Somewhat Homomorphic Encryption | crypto |
| 2012 | Efficient Padding Oracle Attacks on Cryptographic Hardware | crypto |
| 2012 | Tightly Secure Signatures and Public-Key Encryption | crypto |
| 2012 | The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives | crypto |
| 2012 | Multi-instance Security and Its Application to Password-Based Cryptography | crypto |
| 2012 | Stam's Conjecture and Threshold Phenomena in Collision Resistance | crypto |
| 2012 | New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques | crypto |
| 2004 | How to Disembed a Program? | ches |
| 1999 | Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding | eurocrypt |
| 2006 | Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings | eurocrypt |
| 2006 | Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings | asiacrypt |
| 2006 | Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings | tcc |
| 2006 | Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings | pkc |
| 2006 | Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers | fse |
| 2006 | Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings | ches |
| 2006 | Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings | crypto |
| 1992 | Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings | auscrypt |
| 2012 | The End of Crypto | crypto |
| 2010 | A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over $F_p$ | ches |
| 2012 | Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $F_(p^6)$ | eurocrypt |