1. Leakage-resilient signatures;Theory of Cryptography,2010
2. Analysis of key-exchange protocols and their use for building secure channels;Advances in Cryptology – EUROCRYPT 2001,2001
3. Strongly secure authenticated key exchange without NAXOS’ approach;Advances in Information and Computer Security – IWSEC 2009,2009
4. More efficient password-authenticated key exchange;Topics in Cryptology – CT-RSA 2001,2001
5. Strongly secure authenticated key exchange without NAXOS’ approach;Advances in Information and Computer Security – IWSEC 2009,2009