| 2010 | A Byte-Based Guess and Determine Attack on SOSEMANUK. Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng |
| 2010 | A Closer Look at Anonymity and Robustness in Encryption Schemes. Payman Mohassel |
| 2010 | A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT. Eric Brier, Thomas Peyrin |
| 2010 | A Group Signature Scheme from Lattice Assumptions. S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan |
| 2010 | Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang |
| 2010 | Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings Masayuki Abe |
| 2010 | Collision Attacks against the Knudsen-Preneel Compression Functions. Onur Özen, Martijn Stam |
| 2010 | Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. Carmit Hazay, Tomas Toft |
| 2010 | Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Simon Knellwolf, Willi Meier, María Naya-Plasencia |
| 2010 | Constant-Size Commitments to Polynomials and Their Applications. Aniket Kate, Gregory M. Zaverucha, Ian Goldberg |
| 2010 | Efficient Public-Key Cryptography in the Presence of Key Leakage. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs |
| 2010 | Efficient String-Commitment from Weak Bit-Commitment. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang |
| 2010 | Faster Fully Homomorphic Encryption. Damien Stehlé, Ron Steinfeld |
| 2010 | Finding Second Preimages of Short Messages for Hamsi-256. Thomas Fuhr |
| 2010 | General Perfectly Secure Message Transmission Using Linear Codes. Qiushi Yang, Yvo Desmedt |
| 2010 | Generic Compilers for Authenticated Key Exchange. Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk |
| 2010 | Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Emmanuel Volte, Valérie Nachef, Jacques Patarin |
| 2010 | Improved Single-Key Attacks on 8-Round AES-192 and AES-256. Orr Dunkelman, Nathan Keller, Adi Shamir |
| 2010 | Lattice-Based Blind Signatures. Markus Rückert |
| 2010 | Leakage Resilient ElGamal Encryption. Eike Kiltz, Krzysztof Pietrzak |
| 2010 | Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman |
| 2010 | Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. Emiliano De Cristofaro, Jihye Kim, Gene Tsudik |
| 2010 | Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition. Chao Ning, Qiuliang Xu |
| 2010 | Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta |
| 2010 | On Invertible Sampling and Adaptive Security. Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai |
| 2010 | On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields. Robert Granger |
| 2010 | Optimistic Concurrent Zero Knowledge. Alon Rosen, Abhi Shelat |
| 2010 | Random Oracles with(out) Programmability. Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro |
| 2010 | Rotational Rebound Attacks on Reduced Skein. Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger |
| 2010 | Short Non-interactive Zero-Knowledge Proofs. Jens Groth |
| 2010 | Short Pairing-Based Non-interactive Zero-Knowledge Arguments. Jens Groth |
| 2010 | Structured Encryption and Controlled Disclosure. Melissa Chase, Seny Kamara |
| 2010 | The Degree of Regularity of HFE Systems. Vivien Dubois, Nicolas Gama |
| 2010 | The Round Complexity of Verifiable Secret Sharing: The Statistical Case. Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan |
| 2010 | The Semi-Generic Group Model and Applications to Pairing-Based Cryptography. Tibor Jager, Andy Rupp |
| 2010 | The World Is Not Enough: Another Look on Second-Order DPA. François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard |