| 2010 | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. Orr Dunkelman, Nathan Keller, Adi Shamir |
| 2010 | A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security. Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek |
| 2010 | Additively Homomorphic Encryption with Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz |
| 2010 | Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings Tal Rabin |
| 2010 | An Efficient and Parallel Gaussian Sampler for Lattices. Chris Peikert |
| 2010 | Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back). Zvika Brakerski, Shafi Goldwasser |
| 2010 | Concurrent Non-Malleable Zero Knowledge Proofs. Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
| 2010 | Correcting Errors in RSA Private Keys. Wilko Henecka, Alexander May, Alexander Meurer |
| 2010 | Credential Authenticated Identification and Key Exchange. Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup |
| 2010 | Cryptographic Extraction and Key Derivation: The HKDF Scheme. Hugo Krawczyk |
| 2010 | Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. Hoeteck Wee |
| 2010 | Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi |
| 2010 | Equivalence of Uniform Key Agreement and Composition Insecurity. Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky |
| 2010 | Factorization of a 768-Bit RSA Modulus. Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann |
| 2010 | Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. Tatsuaki Okamoto, Katsuyuki Takashima |
| 2010 | Improved Delegation of Computation Using Fully Homomorphic Encryption. Kai-Min Chung, Yael Tauman Kalai, Salil P. Vadhan |
| 2010 | Improved Differential Attacks for ECHO and Grøstl. Thomas Peyrin |
| 2010 | Instantiability of RSA-OAEP under Chosen-Plaintext Attack. Eike Kiltz, Adam O'Neill, Adam D. Smith |
| 2010 | Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai |
| 2010 | Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. Shweta Agrawal, Dan Boneh, Xavier Boyen |
| 2010 | Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. Yevgeniy Dodis, Krzysztof Pietrzak |
| 2010 | Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost. Ivan Damgård, Claudio Orlandi |
| 2010 | Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. Rosario Gennaro, Craig Gentry, Bryan Parno |
| 2010 | Oblivious RAM Revisited. Benny Pinkas, Tzachy Reinman |
| 2010 | On Generalized Feistel Networks. Viet Tung Hoang, Phillip Rogaway |
| 2010 | On Strong Simulation and Composable Point Obfuscation. Nir Bitansky, Ran Canetti |
| 2010 | On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. Severin Winkler, Jürg Wullschleger |
| 2010 | Password-Authenticated Session-Key Generation on the Internet in the Plain Model. Vipul Goyal, Abhishek Jain, Rafail Ostrovsky |
| 2010 | Protecting Cryptographic Keys against Continual Leakage. Ali Juma, Yevgeniy Vahlis |
| 2010 | Protocols for Multiparty Coin Toss with Dishonest Majority. Amos Beimel, Eran Omri, Ilan Orlov |
| 2010 | Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. Mihir Bellare, David Cash |
| 2010 | Sampling in a Quantum Population, and Applications. Niek J. Bouman, Serge Fehr |
| 2010 | Secure Multiparty Computation with Minimal Interaction. Yuval Ishai, Eyal Kushilevitz, Anat Paskin |
| 2010 | Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries. Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail |
| 2010 | Securing Computation against Continuous Leakage. Shafi Goldwasser, Guy N. Rothblum |
| 2010 | Structure-Preserving Signatures and Commitments to Group Elements. Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo |
| 2010 | Time Space Tradeoffs for Attacks against One-Way Functions and PRGs. Anindya De, Luca Trevisan, Madhur Tulsiani |
| 2010 | Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness. Craig Gentry |
| 2010 | Universally Composable Incoercibility. Dominique Unruh, Jörn Müller-Quade |