| 2016 | A Cryptographic Analysis of UMTS/LTE AKA. Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard |
| 2016 | A Lattice-Based Group Signature Scheme with Message-Dependent Opening. Benoît Libert, Fabrice Mouhartem, Khoa Nguyen |
| 2016 | Accelerating Homomorphic Computations on Rational Numbers. Angela Jäschke, Frederik Armknecht |
| 2016 | Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider |
| 2016 | Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing. Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque |
| 2016 | Attribute Based Encryption with Direct Efficiency Tradeoff. Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada |
| 2016 | Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. Yunwen Liu, Qingju Wang, Vincent Rijmen |
| 2016 | Better Preprocessing for Secure Multiparty Computation. Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias |
| 2016 | CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. Mauro Conti, Claudio Guarisco, Riccardo Spolaor |
| 2016 | Constrained PRFs for Unbounded Inputs with Short Keys. Hamza Abusalah, Georg Fuchsbauer |
| 2016 | Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. Alex Biryukov, Daniel Dinu, Johann Großschädl |
| 2016 | Deterministic Public-Key Encryption Under Continual Leakage. Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters |
| 2016 | Foundations of Fully Dynamic Group Signatures. Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth |
| 2016 | Fuzzy Signatures: Relaxing Requirements and a New Construction. Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka |
| 2016 | Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar |
| 2016 | Hash-Based TPM Signatures for the Quantum World. Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire |
| 2016 | Legally Fair Contract Signing Without Keystones. Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval |
| 2016 | Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. Ian Goldberg, Graeme Jenkinson, Frank Stajano |
| 2016 | Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger |
| 2016 | More Efficient Constructions for Inner-Product Encryption. Somindu C. Ramanna |
| 2016 | Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad |
| 2016 | New Techniques for Non-interactive Shuffle and Range Arguments. Alonso González, Carla Ràfols |
| 2016 | Offline Witness Encryption. Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak |
| 2016 | On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. Kota Kondo, Yu Sasaki, Tetsu Iwata |
| 2016 | On the Security of the Algebraic Eraser Tag Authentication Protocol. Simon R. Blackburn, Matthew J. B. Robshaw |
| 2016 | Parallel Implementation of BDD Enumeration for LWE. Elena Kirshanova, Alexander May, Friedrich Wiemer |
| 2016 | Practical Fault-Tolerant Data Aggregation. Krzysztof Grining, Marek Klonowski, Piotr Syga |
| 2016 | Square Attack on 7-Round Kiasu-BC. Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
| 2016 | TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou |
| 2016 | Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. Rosario Gennaro, Steven Goldfeder, Arvind Narayanan |
| 2016 | Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation. Berry Schoenmakers, Meilof Veeningen, Niels de Vreede |
| 2016 | Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions. Xavier Boyen, Qinyi Li |
| 2016 | Two More Efficient Variants of the J-PAKE Protocol. Jean Lancrenon, Marjan Skrobot, Qiang Tang |
| 2016 | Verifiable Multi-party Computation with Perfectly Private Audit Trail. Edouard Cuvelier, Olivier Pereira |
| 2016 | Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou |
| 2016 | Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes. Yosuke Todo, Kazumaro Aoki |