| 2006 | A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. Michel Abdalla, David Pointcheval |
| 2006 | A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. Ellen Jochemsz, Alexander May |
| 2006 | A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. Ventzislav Nikov, Svetla Nikova, Bart Preneel |
| 2006 | Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings Xuejia Lai, Kefei Chen |
| 2006 | Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. Satoshi Obana, Toshinori Araki |
| 2006 | Analysis of One Popular Group Signature Scheme. Zhengjun Cao |
| 2006 | Combining Compression Functions and Block Cipher-Based Hash Functions. Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw |
| 2006 | Construction and Analysis of Boolean Functions of 2 Na Li, Wen-Feng Qi |
| 2006 | Extending Scalar Multiplication Using Double Bases. Roberto Maria Avanzi, Vassil S. Dimitrov, Christophe Doche, Francesco Sica |
| 2006 | Finding SHA-1 Characteristics: General Results and Applications. Christophe De Cannière, Christian Rechberger |
| 2006 | Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Scott Contini, Yiqun Lisa Yin |
| 2006 | Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. Nuttapong Attrapadung, Jun Furukawa, Hideki Imai |
| 2006 | Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Jacques Patarin, Valérie Nachef, Côme Berbain |
| 2006 | HIBE With Short Public Parameters Without Random Oracle. Sanjit Chatterjee, Palash Sarkar |
| 2006 | Improved Collision Search for SHA-0. Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta |
| 2006 | Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung |
| 2006 | KFC - The Krazy Feistel Cipher. Thomas Baignères, Matthieu Finiasz |
| 2006 | Multi-Property-Preserving Hash Domain Extension and the EMD Transform. Mihir Bellare, Thomas Ristenpart |
| 2006 | New Approach for Selectively Convertible Undeniable Signature Schemes. Kaoru Kurosawa, Tsuyoshi Takagi |
| 2006 | New Cryptanalytic Results on IDEA. Eli Biham, Orr Dunkelman, Nathan Keller |
| 2006 | New Guess-and-Determine Attack on the Self-Shrinking Generator. Bin Zhang, Dengguo Feng |
| 2006 | On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Souradyuti Paul, Bart Preneel |
| 2006 | On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. Gregor Leander, Andy Rupp |
| 2006 | On the Generic Construction of Identity-Based Signatures with Additional Properties. David Galindo, Javier Herranz, Eike Kiltz |
| 2006 | On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
| 2006 | On the Security of OAEP. Alexandra Boldyreva, Marc Fischlin |
| 2006 | Relationship Between Standard Model Plaintext Awareness and Message Hiding. Isamu Teranishi, Wakaha Ogata |
| 2006 | Secure Sketch for Biometric Templates. Qiming Li, Yagiz Sutcu, Nasir D. Memon |
| 2006 | Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. Jens Groth |
| 2006 | The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography. Pierrick Gaudry, T. Houtmann, David R. Kohel, Christophe Ritzenthaler, A. Weng |
| 2006 | Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. Pascal Paillier, Jorge Luis Villar |