| 2016 | Constrained PRFs for Unbounded Inputs. Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak |
| 2016 | Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. Johannes Blömer, Gennadij Liske |
| 2016 | Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014. Yanbin Pan |
| 2016 | Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption. Sebastian Gajek |
| 2016 | ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
| 2016 | Efficient Concurrent Covert Computation of String Equality and Set Intersection. Chongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki |
| 2016 | Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles. Prastudy Fauzi, Helger Lipmaa |
| 2016 | Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability. Peter Pessl, Stefan Mangard |
| 2016 | Factoring N=p^rq^s for Large r and s. Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun |
| 2016 | From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila |
| 2016 | Hybrid Publicly Verifiable Computation. James Alderman, Christian Janson, Carlos Cid, Jason Crampton |
| 2016 | INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes. Avik Chakraborti, Nilanjan Datta, Mridul Nandi |
| 2016 | Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions. Olivier Blazy, Céline Chevalier, Damien Vergnaud |
| 2016 | NFLlib: NTT-Based Fast Lattice Library. Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint |
| 2016 | New Observations on Piccolo Block Cipher. Yanfeng Wang, Wenling Wu |
| 2016 | Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer |
| 2016 | Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling. Zhen Li |
| 2016 | Private Large-Scale Databases with Distributed Searchable Symmetric Encryption. Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky |
| 2016 | Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. Yusuke Naito, Lei Wang |
| 2016 | Secure Audit Logs with Verifiable Excerpts. Gunnar Hartung |
| 2016 | Short Randomizable Signatures. David Pointcheval, Olivier Sanders |
| 2016 | Short Structure-Preserving Signatures. Essam Ghadafi |
| 2016 | Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi |
| 2016 | Strongly Leakage-Resilient Authenticated Key Exchange. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo |
| 2016 | Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings Kazue Sako |
| 2016 | Towards a Unified Security Model for Physically Unclonable Functions. Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung |
| 2016 | Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? Ana Costache, Nigel P. Smart |