| 2009 |
| 10 | EE | Karl Rubin,
Alice Silverberg:
Using Abelian Varieties to Improve Pairing-Based Cryptography.
J. Cryptology 22(3): 330-364 (2009) |
| 2008 |
| 9 | EE | Alice Silverberg:
Applications to cryptography of twisting commutative algebraic groups.
Discrete Applied Mathematics 156(16): 3122-3138 (2008) |
| 8 | EE | Karl Rubin,
Alice Silverberg:
Compression in Finite Fields and Torus-Based Cryptography.
SIAM J. Comput. 37(5): 1401-1428 (2008) |
| 2005 |
| 7 | EE | Marten van Dijk,
Robert Granger,
Dan Page,
Karl Rubin,
Alice Silverberg,
Martijn Stam,
David P. Woodruff:
Practical Cryptography in High Dimensional Tori.
EUROCRYPT 2005: 234-250 |
| 2004 |
| 6 | EE | Karl Rubin,
Alice Silverberg:
Using Primitive Subgroups to Do More with Fewer Bits.
ANTS 2004: 18-41 |
| 2003 |
| 5 | EE | Karl Rubin,
Alice Silverberg:
Torus-Based Cryptography.
CRYPTO 2003: 349-365 |
| 4 | | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Applications of list decoding to tracing traitors.
IEEE Transactions on Information Theory 49(5): 1312-1318 (2003) |
| 2002 |
| 3 | EE | Craig Gentry,
Alice Silverberg:
Hierarchical ID-Based Cryptography.
ASIACRYPT 2002: 548-566 |
| 2 | EE | Karl Rubin,
Alice Silverberg:
Supersingular Abelian Varieties in Cryptology.
CRYPTO 2002: 336-353 |
| 2001 |
| 1 | EE | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Efficient Traitor Tracing Algorithms Using List Decoding.
ASIACRYPT 2001: 175-192 |