| 2007 |
| 14 | EE | Gregory G. Rose,
Philip Hawkes,
Michael Paddon,
Cameron McDonald,
Miriam Wiggers de Vries:
Design and Primitive Specification for Shannon.
Symmetric Cryptography 2007 |
| 2005 |
| 13 | | Gregory G. Rose:
Security/Cryptography.
LISA 2005 |
| 2004 |
| 12 | EE | Philip Hawkes,
Gregory G. Rose:
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers.
CRYPTO 2004: 390-406 |
| 2003 |
| 11 | EE | Gregory G. Rose,
Philip Hawkes:
Turing: A Fast Stream Cipher.
FSE 2003: 290-306 |
| 10 | | Gregory G. Rose:
PKI/Cryptography.
LISA 2003 |
| 2002 |
| 9 | EE | Philip Hawkes,
Gregory G. Rose:
Guess-and-Determine Attacks on SNOW.
Selected Areas in Cryptography 2002: 37-46 |
| 2001 |
| 8 | | Gregory G. Rose:
PKI/Cryptography.
LISA 2001 |
| 7 | EE | Gregory G. Rose:
Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk.
LISA 2001 |
| 6 | EE | Philip Hawkes,
Frank Quick,
Gregory G. Rose:
A Practical Cryptanalysis of SSC2.
Selected Areas in Cryptography 2001: 25-37 |
| 2000 |
| 5 | EE | Philip Hawkes,
Gregory G. Rose:
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.
ASIACRYPT 2000: 303-316 |
| 1999 |
| 4 | EE | Damian Bentley,
Gregory G. Rose,
Tara Whalen:
ssmail: Opportunistic Encryption in sendmail.
LISA 1999: 1-8 |
| 1998 |
| 3 | EE | Gregory G. Rose:
A Stream Cipher Based on Linear Feedback over GF(28).
ACISP 1998: 135-146 |
| 1996 |
| 2 | EE | Gregory G. Rose:
The PGP Moose - Implementation and Experience.
LISA 1996: 155-160 |
| 1978 |
| 1 | | Gregory G. Rose:
Performance Evaluation under Unix and a Study of PDP-11 Instruction Usage.
Operating Systems Review 12(3): 28-45 (1978) |