| 2010 | A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. Martin Eian |
| 2010 | An Algorithm Based Concurrent Error Detection Scheme for AES. Chang N. Zhang, Qian Yu, Xiao Wei Liu |
| 2010 | Analysis of the MQQ Public Key Cryptosystem. Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski |
| 2010 | Anonymous Credential Schemes with Encrypted Attributes. Jorge Guajardo, Bart Mennink, Berry Schoenmakers |
| 2010 | Cryptanalysis of Reduced-Round MIBS Block Cipher. Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay |
| 2010 | Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). Ahmad-Reza Sadeghi |
| 2010 | Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). Kaoru Kurosawa |
| 2010 | Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi |
| 2010 | Dynamic Group Key Exchange Revisited. Guomin Yang, Chik How Tan |
| 2010 | Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations. Roghaie Mahdavi, Abolghasem Saiadian |
| 2010 | Generating Parameters for Algebraic Torus-Based Cryptosystems. Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani |
| 2010 | Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. Chenghang Du, Jiazhe Chen |
| 2010 | Integral Distinguishers of Some SHA-3 Candidates. Marine Minier, Raphael C.-W. Phan, Benjamin Pousse |
| 2010 | Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. Bozhan Su, Wenling Wu, Shuang Wu, Le Dong |
| 2010 | On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen |
| 2010 | One Time Anonymous Certificate: X.509 Supporting Anonymity. Aymen Abed, Sébastien Canard |
| 2010 | Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. Johann Großschädl, Ilya Kizhvatov |
| 2010 | Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner |
| 2010 | Predicate Encryption with Partial Public Keys. Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
| 2010 | STE3D-CAP: Stereoscopic 3D CAPTCHA. Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou |
| 2010 | TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism. Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu |
| 2010 | Towards Practical and Secure Coercion-Resistant Electronic Elections. Roberto Araújo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi |
| 2010 | Towards a Cryptographic Treatment of Publish/Subscribe Systems. Tsz Hon Yuen, Willy Susilo, Yi Mu |
| 2010 | User Tracking Based on Behavioral Fingerprints. Günther Lackner, Peter Teufl, Roman Weinberger |