| 2006 | A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal |
| 2006 | A Handy Multi-coupon System. Sébastien Canard, Aline Gouget, Emeline Hufschmitt |
| 2006 | Adaptive Detection of Local Scanners. Ahren Studer, Chenxi Wang |
| 2006 | An AES Smart Card Implementation Resistant to Power Analysis Attacks. Christoph Herbst, Elisabeth Oswald, Stefan Mangard |
| 2006 | An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. Dongvu Tonien, Reihaneh Safavi-Naini |
| 2006 | An Improved Poly1305 MAC. Dayin Wang, Dongdai Lin, Wenling Wu |
| 2006 | Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings Jianying Zhou, Moti Yung, Feng Bao |
| 2006 | Authentication for Paranoids: Multi-party Secret Handshakes. Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
| 2006 | Breaking a New Instance of TTM Cryptosystems. Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding |
| 2006 | Certificateless Public-Key Signature: Security Model and Efficient Construction. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng |
| 2006 | Combinatorial Structures for Design of Wireless Sensor Networks. Dibyendu Chakrabarti, Jennifer Seberry |
| 2006 | Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Raphael C.-W. Phan, Bok-Min Goi |
| 2006 | DSO: Dependable Signing Overlay. Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough |
| 2006 | Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Ahto Buldas, Sven Laur |
| 2006 | Effect of Malicious Synchronization. Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam |
| 2006 | Efficient Memory Bound Puzzles Using Pattern Databases. Sujata Doshi, Fabian Monrose, Aviel D. Rubin |
| 2006 | Flexible Exponentiation with Resistance to Side Channel Attacks. Camille Vuillaume, Katsuyuki Okeya |
| 2006 | High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi |
| 2006 | Improving the Randomized Initial Point Countermeasure Against DPA. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
| 2006 | Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. Jonghyup Lee, Taekyoung Kwon, JooSeok Song |
| 2006 | Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos |
| 2006 | On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi |
| 2006 | On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. Xinghua Li, Sang-Jae Moon, Jianfeng Ma |
| 2006 | Password Based Server Aided Key Exchange . Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd |
| 2006 | Physical Security Bounds Against Tampering. Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi |
| 2006 | Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. Jianhua Yang, Yongzhong Zhang |
| 2006 | Public Key Cryptography Sans Certificates in Ad Hoc Networks. Nitesh Saxena |
| 2006 | Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen |
| 2006 | Results on Almost Resilient Functions. Pinhui Ke, Jie Zhang, Qiaoyan Wen |
| 2006 | Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. Qiang Tang, Kim-Kwang Raymond Choo |
| 2006 | Stateful Subset Cover. Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm |
| 2006 | Syntax-Driven Private Evaluation of Quantified Membership Queries. Aggelos Kiayias, Antonina Mitrofanova |
| 2006 | The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. Khoongming Khoo, Guang Gong, Hian-Kiat Lee |
| 2006 | W3Bcrypt: Encryption as a Stylesheet. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis |