| 2010 | A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. Xuhua Ding |
| 2010 | A Message Recognition Protocol Based on Standard Assumptions. Atefeh Mashatan, Serge Vaudenay |
| 2010 | A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang |
| 2010 | Adaptive Chosen-Message Side-Channel Attacks. Nicolas Veyrat-Charvillon, François-Xavier Standaert |
| 2010 | Affiliation-Hiding Key Exchange with Untrusted Group Authorities. Mark Manulis, Bertram Poettering, Gene Tsudik |
| 2010 | Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings Jianying Zhou, Moti Yung |
| 2010 | Batch Groth-Sahai. Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud |
| 2010 | COP: A Step toward Children Online Privacy. Wei Xu, Sencun Zhu, Heng Xu |
| 2010 | Deniable Internet Key Exchange. Andrew Chi-Chih Yao, Yunlei Zhao |
| 2010 | Efficient Implementation of the Orlandi Protocol. Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen |
| 2010 | Efficient and Secure Evaluation of Multivariate Polynomials and Applications. Matthew K. Franklin, Payman Mohassel |
| 2010 | Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. Markus Rückert, Michael Schneider, Dominique Schröder |
| 2010 | High Performance GHASH Function for Long Messages. Nicolas Méloni, Christophe Nègre, M. Anwar Hasan |
| 2010 | How to Construct Interval Encryption from Binary Tree Encryption. Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing |
| 2010 | Impossible Differential Cryptanalysis on Feistel Ciphers with Yuechuan Wei, Ping Li, Bing Sun, Chao Li |
| 2010 | Improving the Round Complexity of Traitor Tracing Schemes. Aggelos Kiayias, Serdar Pehlivanoglu |
| 2010 | Multi-trail Statistical Saturation Attacks. Baudoin Collard, François-Xavier Standaert |
| 2010 | Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang |
| 2010 | Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
| 2010 | On RFID Privacy with Mutual Authentication and Tag Corruption. Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
| 2010 | On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud |
| 2010 | Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. Julien Bringer, Hervé Chabanne, Thomas Icart |
| 2010 | Principles on the Security of AES against First and Second-Order Differential Power Analysis. Jiqiang Lu, Jing Pan, Jerry den Hartog |
| 2010 | Privacy-Preserving Group Discovery with Linear Complexity. Mark Manulis, Benny Pinkas, Bertram Poettering |
| 2010 | Redactable Signatures for Tree-Structured Data: Definitions and Constructions. Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder |
| 2010 | Regulatory Compliant Oblivious RAM. Bogdan Carbunar, Radu Sion |
| 2010 | Revisiting Unpredictability-Based RFID Privacy Models. Junzuo Lai, Robert H. Deng, Yingjiu Li |
| 2010 | Secure Multiplicative Masking of Power Functions. Laurie Genelle, Emmanuel Prouff, Michaël Quisquater |
| 2010 | Secure Sketch for Multiple Secrets. Chengfang Fang, Qiming Li, Ee-Chien Chang |
| 2010 | Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. Xavier Boyen, Brent Waters |
| 2010 | Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu |
| 2010 | Trapdoor Sanitizable Signatures Made Easy. Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee |
| 2010 | Two New Efficient PIR-Writing Protocols. Helger Lipmaa, Bingsheng Zhang |