- Avanzi, R., H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen, F. Vercauteren (2005): The Handbook of Elliptic and Hyperelliptic Curve Cryptography, CRC.
- Chen, Y., A.J. Han Vinck, (2008): Wiretap Channel With Side Information. IEEE Transactions on Information theory, 395–402.
- Dreibholz, T., E.P. Rathgeb, X. Zhou (2008): On Robustness and Countermeasures of Reliable Server Pooling Systems against Denial of Service Attacks. IFIP Networking, Singapore, Mai 2008.
- Koo, T.-L., W. Stein, G. Wiese (2008): On the generation of the coefficient field of a newform by a single Hecke eigenvalue. Journal de Théorie des Nombres de Bordeaux 20), 373–384.
- Korte, U., M. Krawczak, U. Martini, J. Merkle, R. Plagal, M. Niesing, C. Tiemann, H. Vinck (2008): A cryptographic biometric authentication system based on genetic fingerprints (extended version). In: GI-Edition – Lecture Notes in Informatics (LNI) P-128, Bonn: Köllen Verlag, 263–276.
- Lempken, W., T. v. Tran, S. Magliveras, W. Wei (2009): A public key cryptosystem based on non-abelian finite groups. J. Cryptology 22, 62–74.
- Magaard, K., G. Wiesend, H. Völklein (2008): The combinatorics of degenerate covers and an application for generic curves of genus 3. Albanian Journal of Mathematics 2 (3), 145–158.
- Martirosyan, S., T.v. Tran (2008): Explicit constructions for perfect hash families. Designs, Codes and Cryptography 46, 97–112.
- Tüxen, M., I. Rüngeler, R. Stewart, E.P. Rathgeb (2008): Network Address Translation for the Stream Control Transmission Protocol. IEEE Network 22 (5), 26–32.