| 2016 | A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption. Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh |
| 2016 | A Privacy-Preserving Model for Biometric Fusion. Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel |
| 2016 | AAL and Static Conflict Detection in Policy. Jean-Claude Royer, Anderson Santana de Oliveira |
| 2016 | An Automatic Cryptanalysis of Transposition Ciphers Using Compression. Noor R. Al-Kazaz, Sean A. Irvine, William John Teahan |
| 2016 | An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems. Faustin Mbol, Jean-Marc Robert, Alireza Sadighian |
| 2016 | An Efficient Construction of Non-Interactive Secure Multiparty Computation. Satoshi Obana, Maki Yoshida |
| 2016 | An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel |
| 2016 | An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins. Rachid El Bansarkhani, Jan Sturm |
| 2016 | An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization. Gérald Gavin |
| 2016 | An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa |
| 2016 | Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case. Radim Ostádal, Petr Svenda, Vashek Matyás |
| 2016 | Breaking PPTP VPNs via RADIUS Encryption. Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk |
| 2016 | Compact Representation for Division Property. Yosuke Todo, Masakatu Morii |
| 2016 | Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. Kirill Belyaev, Indrakshi Ray |
| 2016 | Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings Sara Foresti, Giuseppe Persiano |
| 2016 | DNSSEC Misconfigurations in Popular Domains. Tianxiang Dai, Haya Schulmann, Michael Waidner |
| 2016 | Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. Tassos Dimitriou, Naser Al-Ibrahim |
| 2016 | Detecting Malware Through Anti-analysis Signals - A Preliminary Study. Joash W. J. Tan, Roland H. C. Yap |
| 2016 | Distance Bounding Based on PUF. Mathilde Igier, Serge Vaudenay |
| 2016 | Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis. Merrielle Spain, Mayank Varia |
| 2016 | Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta |
| 2016 | Efficient Verifiable Computation of XOR for Biometric Authentication. Aysajan Abidin, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa |
| 2016 | Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards. Takaaki Mizuki |
| 2016 | Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. Liqun Chen, Thalia M. Laing, Keith M. Martin |
| 2016 | Evaluation on Malware Classification by Session Sequence of Common Protocols. Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama |
| 2016 | FHE Over the Integers and Modular Arithmetic Circuits. Eunkyung Kim, Mehdi Tibouchi |
| 2016 | Generic Access Control System for Ad Hoc MCC and Fog Computing. Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi |
| 2016 | Group Signature with Deniability: How to Disavow a Signature. Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka |
| 2016 | Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg |
| 2016 | Implementation State of HSTS and HPKP in Both Browsers and Servers. Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo |
| 2016 | Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. Luca Ferretti, Michele Colajanni, Mirco Marchetti |
| 2016 | Improved Attacks on Extended Generalized Feistel Networks. Valérie Nachef, Nicolas Marrière, Emmanuel Volte |
| 2016 | Improving the Sphinx Mix Network. Filipe Beato, Kimmo Halunen, Bart Mennink |
| 2016 | Integral Privacy. Vicenç Torra, Guillermo Navarro-Arribas |
| 2016 | Internet Censorship in Italy: A First Look at 3G/4G Networks. Giuseppe Aceto, Antonio Montieri, Antonio Pescapè |
| 2016 | LEAP: A Next-Generation Client VPN and Encrypted Email Provider. Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan |
| 2016 | Language-Based Hypervisors. Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool |
| 2016 | Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma |
| 2016 | Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia |
| 2016 | Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang |
| 2016 | NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM. Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani |
| 2016 | On the Power of Public-key Function-Private Functional Encryption. Vincenzo Iovino, Qiang Tang, Karol Zebrowski |
| 2016 | Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto |
| 2016 | Range Query Integrity in Cloud Data Streams with Efficient Insertion. Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
| 2016 | Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries. Yusuke Naito |
| 2016 | SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang |
| 2016 | Secure Error-Tolerant Graph Matching Protocols. Kalikinkar Mandal, Basel Alomair, Radha Poovendran |
| 2016 | Security of Online AE Schemes in RUP Setting. Jian Zhang, Wen-Ling Wu |
| 2016 | Server-Aided Revocable Identity-Based Encryption from Lattices. Khoa Nguyen, Huaxiong Wang, Juanyang Zhang |
| 2016 | Sharing Is Caring, or Callous? Yu Pu, Jens Grossklags |
| 2016 | Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. Serge Vaudenay |
| 2016 | Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. David Derler, Stephan Krenn, Daniel Slamanig |
| 2016 | Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. Patrick Longa, Michael Naehrig |
| 2016 | User Authentication from Mouse Movement Data Using SVM Classifier. Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman |
| 2016 | Verifiable Message-Locked Encryption. Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine |
| 2016 | Vulnerability Analysis Using Google and Shodan. Kai Simon |
| 2016 | When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas |