| 1996 | Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings Neal Koblitz |
| 1996 | Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). Dan Boneh, Richard J. Lipton |
| 1996 | All Bits ax+b mod p are Hard (Extended Abstract). Mats Näslund |
| 1996 | Anonymous Communication and Anonymous Cash. Daniel R. Simon |
| 1996 | Asymmetric Cryptography with a Hidden Monomial. Jacques Patarin |
| 1996 | Diffie-Hellman Oracles. Ueli M. Maurer, Stefan Wolf |
| 1996 | Fast Hashing on the Pentium. Antoon Bosselaers, René Govaerts, Joos Vandewalle |
| 1996 | Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. Paul Camion, Anne Canteaut |
| 1996 | Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. Dan Boneh, Ramarathnam Venkatesan |
| 1996 | Hidden Collisions on DSS. Serge Vaudenay |
| 1996 | How to Protect DES Against Exhaustive Key Search. Joe Kilian, Phillip Rogaway |
| 1996 | Improved Differential Attacks on RC5. Lars R. Knudsen, Willi Meier |
| 1996 | Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. Paul C. van Oorschot, Michael J. Wiener |
| 1996 | Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. John Kelsey, Bruce Schneier, David A. Wagner |
| 1996 | Keying Hash Functions for Message Authentication. Mihir Bellare, Ran Canetti, Hugo Krawczyk |
| 1996 | Linear Complexity of Periodic Sequences: A General Theory. James L. Massey, Shirlei Serconek |
| 1996 | New Generation of Secure and Practical RSA-Based Signatures. Ronald Cramer, Ivan Damgård |
| 1996 | New Results on Visual Cryptography. Stefan Droste |
| 1996 | On Fast and Provably Secure Message Authentication Based on Universal Hashing. Victor Shoup |
| 1996 | Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. Shai Halevi, Silvio Micali |
| 1996 | Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. Markus Jakobsson, Moti Yung |
| 1996 | Quantum Cryptography over Underground Optical Fibers. Richard J. Hughes, Gabriel G. Luther, George L. Morgan, Charles G. Peterson, Charles M. Simmons |
| 1996 | Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. Dominic Mayers |
| 1996 | Robust and Efficient Sharing of RSA Functions. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
| 1996 | Security of 2^t-Root Identification and Signatures. Claus-Peter Schnorr |
| 1996 | The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Adam L. Young, Moti Yung |
| 1996 | Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Paul C. Kocher |
| 1996 | Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson |
| 1996 | Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. Tor Helleseth, Thomas Johansson |
| 1996 | Universal Hashing and Multiple Authentication. Mustafa Atici, Douglas R. Stinson |
| 1996 | Weakness in Some Threshold Cryptosystems. Susan K. Langford |