| 2000 | A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme. François Grieu |
| 2000 | A Composition Theorem for Universal One-Way Hash Functions. Victor Shoup |
| 2000 | A NICE Cryptanalysis. Éliane Jaulmes, Antoine Joux |
| 2000 | Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. Stanislaw Jarecki, Anna Lysyanskaya |
| 2000 | Advanced Slide Attacks. Alex Biryukov, David A. Wagner |
| 2000 | Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding Bart Preneel |
| 2000 | An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. Pierrick Gaudry |
| 2000 | Analysis and Optimization of the TWINKLE Factoring Device. Arjen K. Lenstra, Adi Shamir |
| 2000 | Authenticated Key Exchange Secure against Dictionary Attacks. Mihir Bellare, David Pointcheval, Phillip Rogaway |
| 2000 | Colossus and the German Lorenz Cipher - Code Breaking in WW II. Anthony E. Sale |
| 2000 | Computing Inverses over a Shared Secret Modulus. Dario Catalano, Rosario Gennaro, Shai Halevi |
| 2000 | Confirmer Signature Schemes Secure against Adaptive Adversaries. Jan Camenisch, Markus Michels |
| 2000 | Construction of Nonlinear Boolean Functions with Important Cryptographic Properties. Palash Sarkar, Subhamoy Maitra |
| 2000 | Cox-Rower Architecture for Fast Parallel Montgomery Multiplication. Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano, Atsushi Shimbo |
| 2000 | Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1. Marc Girault, Jean-François Misarsky |
| 2000 | Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). Eli Biham |
| 2000 | Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir |
| 2000 | Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. Ivan Damgård |
| 2000 | Efficient Proofs that a Committed Number Lies in an Interval. Fabrice Boudot |
| 2000 | Efficient Receipt-Free Voting Based on Homomorphic Encryption. Martin Hirt, Kazue Sako |
| 2000 | Exposure-Resilient Functions and All-or-Nothing Transforms. Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai |
| 2000 | Factorization of a 512-Bit RSA Modulus. Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Karen I. Aardal, Jeff Gilchrist, Gérard Guillerm, Paul C. Leyland, Joël Marchand, François Morain, Alec Muffett, Chris Putnam, Craig Putnam, Paul Zimmermann |
| 2000 | Fair Encryption of RSA Keys. Guillaume Poupard, Jacques Stern |
| 2000 | General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. Ronald Cramer, Ivan Damgård, Ueli M. Maurer |
| 2000 | How to Break a Practical MIX and Design a New One. Yvo Desmedt, Kaoru Kurosawa |
| 2000 | Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. Anne Canteaut, Michaël Trabbia |
| 2000 | Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. Ueli M. Maurer, Stefan Wolf |
| 2000 | Minimal-Latency Secure Function Evaluation. Donald Beaver |
| 2000 | New Attacks on PKCS#1 v1.5 Encryption. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
| 2000 | Noisy Polynomial Interpolation and Noisy Chinese Remaindering. Daniel Bleichenbacher, Phong Q. Nguyen |
| 2000 | On the Security of 3GPP Networks. Michael Walker |
| 2000 | One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. Eyal Kushilevitz, Rafail Ostrovsky |
| 2000 | Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation. Paul Dumais, Dominic Mayers, Louis Salvail |
| 2000 | Practical Threshold Signatures. Victor Shoup |
| 2000 | Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions. Anne Canteaut, Claude Carlet, Pascale Charpin, Caroline Fontaine |
| 2000 | Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Victor Boyko, Philip D. MacKenzie, Sarvar Patel |
| 2000 | Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Mihir Bellare, Alexandra Boldyreva, Silvio Micali |
| 2000 | Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. Jean-Sébastien Coron, David Naccache |
| 2000 | Security Aspects of Practical Quantum Cryptography. Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders |
| 2000 | Single Database Private Information Retrieval Implies Oblivious Transfer. Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky |
| 2000 | The Sum of PRPs Is a Secure PRF. Stefan Lucks |
| 2000 | Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Victor Shoup |