| 2000 | A Length-Invariant Hybrid Mix. Miyako Ohkubo, Masayuki Abe |
| 2000 | A New Forward-Secure Digital Signature Scheme. Michel Abdalla, Leonid Reyzin |
| 2000 | A Note on Security Proofs in the Generic Model. Marc Fischlin |
| 2000 | Addition of ElGamal Plaintexts. Markus Jakobsson, Ari Juels |
| 2000 | Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings Tatsuaki Okamoto |
| 2000 | Anonymous Fingerprinting with Direct Non-repudiation. Birgit Pfitzmann, Ahmad-Reza Sadeghi |
| 2000 | Attack for Flash MIX. Masashi Mitomo, Kaoru Kurosawa |
| 2000 | Attacking and Repairing Batch Verification Schemes. Colin Boyd, Chris Pavlovski |
| 2000 | Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Mihir Bellare, Chanathip Namprempre |
| 2000 | CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. Hideki Imai, Atsuhiro Yamagishi |
| 2000 | Commital Deniable Proofs and Electronic Campaign Finance. Matthew K. Franklin, Tomas Sander |
| 2000 | Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications. Anand Desai, Sara K. Miner |
| 2000 | Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii |
| 2000 | Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. Glenn Durfee, Phong Q. Nguyen |
| 2000 | Cryptanalysis of the TTM Cryptosystem. Louis Goubin, Nicolas T. Courtois |
| 2000 | Cryptanalysis of the Yi-Lam Hash. David A. Wagner |
| 2000 | Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Alex Biryukov, Adi Shamir |
| 2000 | Cryptography Everywhere. Thomas A. Berson |
| 2000 | Distributed Oblivious Transfer. Moni Naor, Benny Pinkas |
| 2000 | Efficient Anonymous Fingerprinting with Group Signatures. Jan Camenisch |
| 2000 | Efficient Secure Multi-party Computation. Martin Hirt, Ueli M. Maurer, Bartosz Przydatek |
| 2000 | Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. Mihir Bellare, Phillip Rogaway |
| 2000 | Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. Philip Hawkes, Gregory G. Rose |
| 2000 | From Fixed-Length to Arbitrary-Length RSA Padding Schemes. Jean-Sébastien Coron, François Koeune, David Naccache |
| 2000 | Improved Methods to Perform Threshold RSA. Brian King |
| 2000 | Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. Michel Abdalla, Mihir Bellare |
| 2000 | Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems. Danny Gutfreund, Michael Ben-Or |
| 2000 | Key Improvements to XTR. Arjen K. Lenstra, Eric R. Verheul |
| 2000 | Mix and Match: Secure Function Evaluation via Ciphertexts. Markus Jakobsson, Ari Juels |
| 2000 | On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. Yuliang Zheng, Xian-Mo Zhang |
| 2000 | On the Pseudorandomness of Top-Level Schemes of Block Ciphers. Shiho Moriai, Serge Vaudenay |
| 2000 | Password-Authenticated Key Exchange Based on RSA. Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan |
| 2000 | Power Analysis, What Is Now Possible.... Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart |
| 2000 | Proofs of Security for the Unix Password Hashing Algorithm. David A. Wagner, Ian Goldberg |
| 2000 | Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park |
| 2000 | Provably Secure Metering Scheme. Wakaha Ogata, Kaoru Kurosawa |
| 2000 | Round-Efficient Conference Key Agreement Protocols with Provable Security. Wen-Guey Tzeng, Zhi-Jia Tzeng |
| 2000 | Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. Safuat Hamdy, Bodo Möller |
| 2000 | Security of Signed ElGamal Encryption. Claus-Peter Schnorr, Markus Jakobsson |
| 2000 | Strengthening McEliece Cryptosystem. Pierre Loidreau |
| 2000 | The Security of Chaffing and Winnowing. Mihir Bellare, Alexandra Boldyreva |
| 2000 | Towards Signature-Only Signature Schemes. Adam L. Young, Moti Yung |
| 2000 | Trapdooring Discrete Logarithms on Elliptic Curves over Rings. Pascal Paillier |
| 2000 | Unconditionally Secure Digital Signature Schemes Admitting Transferability. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai |
| 2000 | Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. Jan Camenisch, Ivan Damgård |
| 2000 | Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three. Seigo Arita |
| 2000 | Why Textbook ElGamal and RSA Encryption Are Insecure. Dan Boneh, Antoine Joux, Phong Q. Nguyen |
| 2000 | Zero-Knowledge and Code Obfuscation. Satoshi Hada |