| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2018 | Misc | conf |
SCN
|
| 2017 | J | jnl |
Commun. ACM
|
| 2017 | J | jnl |
Computer
|
| 2017 | — | conf |
CSCML
|
| 2016 | — | conf |
The New Codebreakers
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
CNS
|
| 2010 | Misc | conf |
SCN
|
| 2007 | Misc | conf |
Inscrypt
|
| 2007 | — | conf |
Information Hiding
|
| 2006 | — | conf |
Information Hiding
|
| 2006 | J | jnl |
Int. J. Inf. Sec.
|
| 2006 | — | conf |
Information Hiding
|
| 2006 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2005 | B | conf |
Selected Areas in Cryptography
|
| 2005 | C | conf |
ISC
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | B | conf |
CT-RSA
|
| 2005 | — | conf |
Mycrypt
|
| 2004 | B | conf |
CT-RSA
|
| 2004 | B | conf |
Selected Areas in Cryptography
|
| 2004 | — | book |
Malicious cryptography - exposing cryptovirology.
|
| 2004 | Misc | conf |
SCN
|
| 2003 | — | conf |
IAW
|
| 2003 | Misc | conf |
ACISP
|
| 2003 | — | conf |
IAW
|
| 2001 | — | conf |
Public Key Cryptography
|
| 2001 | A | conf |
CHES
|
| 2001 | B | conf |
CT-RSA
|
| 2000 | Misc | conf |
ICISC
|
| 2000 | — | conf |
Public Key Cryptography
|
| 2000 | A | conf |
ASIACRYPT
|
| 1999 | — | conf |
Public Key Cryptography
|
| 1999 | — | conf |
CQRE
|
| 1999 | A* | conf |
FOCS
|
| 1998 | A* | conf |
EUROCRYPT
|
| 1998 | — | conf |
ANTS
|
| 1998 | A* | conf |
FSE
|
| 1997 | — | conf |
S&P
|
| 1997 | A* | conf |
EUROCRYPT
|
| 1997 | A* | conf |
FSE
|
| 1997 | A* | conf |
CRYPTO
|
| 1996 | — | conf |
S&P
|
| 1996 | A* | conf |
CRYPTO
|