| 1996 | "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. Yair Frankel, Yiannis Tsiounis, Moti Yung |
| 1996 | A Fast Software Implementation for Arithmetic Operations in GF(2 Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle |
| 1996 | A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. Kouichi Sakurai |
| 1996 | A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. Atsuko Miyaji |
| 1996 | A Multi-Recastable Ticket Scheme for Electronic Elections. Chun-I Fan, Chin-Laung Lei |
| 1996 | A World Wide Number Field Sieve Factoring Record: On to 512 Bits. James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer |
| 1996 | Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings Kwangjo Kim, Tsutomu Matsumoto |
| 1996 | Authenticated Multi-Party Key Agreement. Mike Just, Serge Vaudenay |
| 1996 | Conditional Correlation Attack on Nonlinear Filter Generators. Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park |
| 1996 | Convertible Group Signatures. Seungjoo Kim, Sungjun Park, Dongho Won |
| 1996 | Correlation Attacks on Cascades of Clock Controlled Shift Registers. Willi Geiselmann, Dieter Gollmann |
| 1996 | Cost-Effective Payment Schemes with Privacy Regulation. David M'Raïhi |
| 1996 | Cryptographic Protocols Based on Real-Quadratic A-fields. Ingrid Biehl, Bernd Meyer, Christoph Thiel |
| 1996 | Cryptography and the Internet: Lessons and Challenges. Kevin S. McCurley |
| 1996 | Electronic Money and Key Management from Global and Regional Points of View. Shigeo Tsujii |
| 1996 | Generalization of Higher Order SAC to Vector Output Boolean Functions. Kaoru Kurosawa, Takashi Satoh |
| 1996 | Generalized Feistel Networks. Kaisa Nyberg |
| 1996 | Generating Standard DSA Signatures Without Long Inversion. Arjen K. Lenstra |
| 1996 | Hash Functions Based on Block Ciphers and Quaternary Codes. Lars R. Knudsen, Bart Preneel |
| 1996 | How to Date Blind Signatures. Masayuki Abe, Eiichiro Fujisaki |
| 1996 | How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto |
| 1996 | Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel. Valeri Korjik, D. Kushnir |
| 1996 | Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. Kazukuni Kobara, Hideki Imai |
| 1996 | Minding your p's and q's. Ross J. Anderson, Serge Vaudenay |
| 1996 | Mis-representation of Identities in E-cash Schemes and how to Prevent it. Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis |
| 1996 | Observations on Non-repudiation. Jianying Zhou, Dieter Gollmann |
| 1996 | On Applying Linear Cryptanalysis to IDEA. Philip Hawkes, Luke O'Connor |
| 1996 | On the Correlation Immune Functions and Their Nonlinearity. Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung |
| 1996 | On the Efficiency of One-Time Digital Signatures. Daniel Bleichenbacher, Ueli M. Maurer |
| 1996 | On the Risk of Disruption in Several Multiparty Signature Schemes. Markus Michels, Patrick Horster |
| 1996 | Provably Secure Blind Signature Schemes. David Pointcheval, Jacques Stern |
| 1996 | Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme. Markus Michels, Patrick Horster |
| 1996 | The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. Florent Chabaud, Jacques Stern |
| 1996 | The Validation of Cryptographic Algorithms. Jacques Stern |
| 1996 | Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. Ueli M. Maurer, Stefan Wolf |