| 2006 | A Method for Making Password-Based Key Exchange Resilient to Server Compromise. Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
| 2006 | Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings Cynthia Dwork |
| 2006 | Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields. Hao Chen, Ronald Cramer |
| 2006 | Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). Xavier Boyen, Brent Waters |
| 2006 | Asymptotically Optimal Two-Round Perfectly Secure Message Transmission. Saurabh Agarwal, Ronald Cramer, Robbert de Haan |
| 2006 | Automated Security Proofs with Sequences of Games. Bruno Blanchet, David Pointcheval |
| 2006 | Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
| 2006 | Cryptanalysis of 2R Jean-Charles Faugère, Ludovic Perret |
| 2006 | Cryptographic Protocols for Electronic Voting. David A. Wagner |
| 2006 | Fast Algorithms for the Free Riders Problem in Broadcast Encryption. Zulfikar Ramzan, David P. Woodruff |
| 2006 | Inverting HFE Is Quasipolynomial. Louis Granboulan, Antoine Joux, Jacques Stern |
| 2006 | Lattice-Based Cryptography. Oded Regev |
| 2006 | Mitigating Dictionary Attacks on Password-Protected Local Storage. Ran Canetti, Shai Halevi, Michael Steiner |
| 2006 | New Proofs for NMAC and HMAC: Security without collision-resistance. Mihir Bellare |
| 2006 | Non-interactive Zaps and New Techniques for NIZK. Jens Groth, Rafail Ostrovsky, Amit Sahai |
| 2006 | Oblivious Transfer and Linear Functions. Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner |
| 2006 | On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
| 2006 | On Expected Constant-Round Protocols for Byzantine Agreement. Jonathan Katz, Chiu-Yuen Koo |
| 2006 | On Forward-Secure Storage. Stefan Dziembowski |
| 2006 | On Robust Combiners for Private Information Retrieval and Other Primitives. Remo Meier, Bartosz Przydatek |
| 2006 | On Signatures of Knowledge. Melissa Chase, Anna Lysyanskaya |
| 2006 | On the Higher Order Nonlinearities of Algebraic Immune Functions. Claude Carlet |
| 2006 | On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. Dan Boneh, Xavier Boyen |
| 2006 | On the Power of the Randomized Iterate. Iftach Haitner, Danny Harnik, Omer Reingold |
| 2006 | Random Selection with an Adversarial Majority. Ronen Gradwohl, Salil P. Vadhan, David Zuckerman |
| 2006 | Rankin's Constant and Blockwise Lattice Reduction. Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen |
| 2006 | Rationality and Adversarial Behavior in Multi-party Computation. Anna Lysyanskaya, Nikos Triandopoulos |
| 2006 | Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. Tal Moran, Moni Naor |
| 2006 | Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. Elad Barkan, Eli Biham, Adi Shamir |
| 2006 | Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam D. Smith |
| 2006 | Robust Multiparty Computation with Linear Communication Complexity. Martin Hirt, Jesper Buus Nielsen |
| 2006 | Round-Optimal Composable Blind Signatures in the Common Reference String Model. Marc Fischlin |
| 2006 | Scalable Secure Multiparty Computation. Ivan Damgård, Yuval Ishai |
| 2006 | Strengthening Digital Signatures Via Randomized Hashing. Shai Halevi, Hugo Krawczyk |
| 2006 | The Number Field Sieve in the Medium Prime Case. Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren |
| 2006 | Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. Moni Naor, Gil Segev, Adam D. Smith |
| 2006 | When Random Sampling Preserves Privacy. Kamalika Chaudhuri, Nina Mishra |