1. C. Wolf, and B. Preneel, "Equivalent keys in Multivariate quadratic public key systems," Journal of Mathematical Cryptology 4(4), pp. 375-415, 2011.
2. "Advances in Cryptology - EUROCRYPT 2009 Poster Session", V. Immler, and C. Wolf (eds.), 2009.
3. A. Bogdanov, T. Eisenbarth, A. Rupp, and C. Wolf, "Time-Area Optimized Public-Key Engines: MQ -Cryptosystems as Replacement for Elliptic Curves?," In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 45-61, 2008.
4. "Research in Cryptology - 2nd Western European Workshop, WEWoRC 2007", Lecture Notes in Computer Science 4945, S. Lucks, A. Sadeghi, and C. Wolf (eds.), Springer-Verlag, 2007.
5. M. Hansen, M. Meints, I. Angell, D. De Cock, P. De Hert, D. Demetis, C. Diaz, S. Freh, M. Gasson, X. Huysmans, M. Jacomet, G. Karjoth, E. Kindt, E. Kosta, A. Pfitzmann, B. Preneel, W. Scheurs, S. Steinbrecher, R. Thomas, and C. Wolf, "Study on ID Documents," FIDIS Deliverable 3.6, 160 pages, 2006.
6. C. Wolf, A. Braeken, and B. Preneel, " On the security of stepwise triangular systems," Designs, Codes and Cryptography 40(3), pp. 285-302, 2006.
7. D. De Cock, C. Wolf, and B. Preneel, "The Belgian Electronic Identity Card (Overview)," In Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3rd Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), Lecture Notes in Informatics (LNI) LNI P-77, J. Dittmann (ed.), Bonner Köllen Verlag, pp. 298--301, 2006.
8. K. Kursawe, and C. Wolf, "Trusted Computing or The Gatekeeper," In Proceedings of Landscapes of ICT and Social Accountability, P. Duquenoy, K. Kimppa, and C. Zielinski (eds.), pp. 339--354, 2005.
9. J. Ding, J. E. Gower, D. Schmidt, C. Wolf, and Z. Yin, "Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem," In Cryptography and Coding, 10th IMA International Conference, Lecture Notes in Computer Science 3796, N. Smart (ed.), Springer-Verlag, pp. 262-277, 2005.
10. A. Braeken, B. Preneel, and C. Wolf, "Normality of Vectorial Boolean Functions," In Cryptography and Coding, 10th IMA International Conference, Lecture Notes in Computer Science 3796, N. Smart (ed.), Springer-Verlag, pp. 186-200, 2005.
11. C. Wolf, "Multivariate Quadratic Polynomials in Public Key Cryptography," PhD thesis, Katholieke Universiteit Leuven, B. Preneel (promotor), 156+xxiv pages, 2005.
12. C. Wolf, and B. Preneel, "Equivalent Keys in HFE, C$^*$, and variations," In International Conference on Cryptology in Malaysia 2005, Lecture Notes in Computer Science 3715, E. Dawson, and S. Vaudenay (eds.), Springer-Verlag, pp. 33-49, 2005.
13. C. Wolf, S. Lucks, and P. Yau, "WEWoRC 2005 - Conference Record," COSIC technical report, 2005-CW-2, 155 pages, 2005.
14. C. Wolf, and B. Preneel, "Applications of Multivariate Quadratic Public Key Systems," In Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2nd Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), Lecture Notes in Informatics (LNI) 62, H. Federrath (ed.), Bonner Köllen Verlag, pp. 413-424, 2005.
15. W. Lindner, and C. Wolf, "2. Kryptotag -- Workshop "uber Kryptographie," COSIC technical report, 2005-CW-1, 12 pages, 2005.
16. A. Braeken, C. Wolf, and B. Preneel, "A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes," In Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 3376, A. Menezes (ed.), Springer-Verlag, pp. 29-43, 2005.
17. A. Braeken, C. Wolf, and B. Preneel, "Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC," In Security in Communication Networks, 4th International Conference, SCN 2004, Lecture Notes in Computer Science 3352, C. Blundo, and S. Cimato (eds.), Springer-Verlag, pp. 294-307, 2005.
18. C. Wolf, and B. Preneel, "Superfluous Keys in Multivariate Quadratic Asymmetric Systems," In Public Key Cryptography, 8th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2005, Lecture Notes in Computer Science 3386, S. Vaudenay (ed.), Springer-Verlag, pp. 275-287, 2005.
19. P. Fitzpatrick , and C. Wolf, "Direct Division in Factor Rings," COSIC internal report, 7 pages, 2004.
20. S. Lucks, and C. Wolf, "1. Kryptotag -- Workshop "uber Kryptographie ," Technical Report 2004-CW-1, 17 pages, 2004.
21. C. Wolf, ""Aquivalente Private Schl"ussel in Systemen mit Multivariaten Quadratischen "Offentlichen Polynomgleichungen," In 1st Kryptotag -- Workshop "uber Kryptographie, S. Lucks, and C. Wolf (eds.), 1 pages, 2004.
22. "1st Kryptotag -- Workshop "uber Kryptographie", S. Lucks, and C. Wolf (eds.), 2004.
23. A. Braeken, C. Wolf, and B. Preneel, "A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions," In 3rd International Conference on Theoretical Computer Science 2004, J. Levy, E. W. Mayr, and J. C. Mitchell (eds.), Kluwer, pp. 51-66, 2004.
24. C. Wolf, and B. Preneel, "Asymmetric Cryptography: Hidden Field Equations," In European Congress on Computational Methods in Applied Sciences and Engineering, Jyvaskyla University Press, 20 pages, 2004.
25. C. Wolf, "Efficient Public Key Generation for HFE and Variations," In Cryptographic Algorithms and their Uses - 2004, E. Dawson, and W. Klemm (eds.), QUT Publications, pp. 78-93, 2004.
26. C. Wolf, and B. Preneel, "Efficient Public Key Generation for Multivariate Cryptosystems," IACR ePrint report, 12 pages, 2003.