| 2010 | Anonymity from Asymmetry: New Constructions for Anonymous HIBE. Léo Ducas |
| 2010 | Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited. Miia Hermelin, Kaisa Nyberg |
| 2010 | Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, Malte Wienecke |
| 2010 | Efficient CCA-Secure PKE from Identity-Based Techniques. Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou |
| 2010 | Efficient CRT-RSA Decryption for Small Encryption Exponents. Subhamoy Maitra, Santanu Sarkar |
| 2010 | Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. Nigel P. Smart |
| 2010 | Fault Attacks Against emv Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi |
| 2010 | Hash Function Combiners in TLS and SSL. Marc Fischlin, Anja Lehmann, Daniel Wagner |
| 2010 | High-Speed Parallel Software Implementation of the ηT Pairing. Diego F. Aranha, Julio López, Darrel Hankerson |
| 2010 | Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka |
| 2010 | Linear Cryptanalysis of Reduced-Round PRESENT. Joo Yeon Cho |
| 2010 | Making the Diffie-Hellman Protocol Identity-Based. Dario Fiore, Rosario Gennaro |
| 2010 | On Extended Sanitizable Signature Schemes. Sébastien Canard, Amandine Jambert |
| 2010 | On Fast Verification of Hash Chains. Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong |
| 2010 | Plaintext-Awareness of Hybrid Encryption. Shaoquan Jiang, Huaxiong Wang |
| 2010 | Practical Key Recovery Attack against Secret-IV Edon-. Gaëtan Leurent |
| 2010 | Probabilistic Public Key Encryption with Equality Test. Guomin Yang, Chik How Tan, Qiong Huang, Duncan S. Wong |
| 2010 | Rebound Attacks on the Reduced Grøstl Hash Function. Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
| 2010 | Refinement of Miller's Algorithm Over Edwards Curves. Lei Xu, Dongdai Lin |
| 2010 | Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine. Scott Yilek |
| 2010 | Revisiting Higher-Order DPA Attacks: . Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
| 2010 | Speed Records for NTRU. Jens Hermans, Frederik Vercauteren, Bart Preneel |
| 2010 | The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition. Bart Preneel |
| 2010 | The Sum of CBC MACs Is a Secure PRF. Kan Yasuda |
| 2010 | Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings Josef Pieprzyk |
| 2010 | Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger |
| 2010 | Usable Optimistic Fair Exchange. Alptekin Küpçü, Anna Lysyanskaya |