| 2006 | A Provable-Security Treatment of the Key-Wrap Problem. Phillip Rogaway, Thomas Shrimpton |
| 2006 | Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings Serge Vaudenay |
| 2006 | Alien Vanessa Gratzer, David Naccache |
| 2006 | Compact Group Signatures Without Random Oracles. Xavier Boyen, Brent Waters |
| 2006 | Composition Implies Adaptive Security in Minicrypt. Krzysztof Pietrzak |
| 2006 | Cryptography in Theory and Practice: The Case of Encryption in IPsec. Kenneth G. Paterson, Arnold K. L. Yau |
| 2006 | Efficient Binary Conversion for Paillier Encrypted Values. Berry Schoenmakers, Pim Tuyls |
| 2006 | Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli, Willi Meier, Olivier Ruatta |
| 2006 | Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Dan Boneh, Amit Sahai, Brent Waters |
| 2006 | Herding Hash Functions and the Nostradamus Attack. John Kelsey, Tadayoshi Kohno |
| 2006 | Hiding Secret Points Amidst Chaff. Ee-Chien Chang, Qiming Li |
| 2006 | How to Strengthen Pseudo-random Generators by Using Compression. Aline Gouget, Hervé Sibert |
| 2006 | Information-Theoretic Conditions for Two-Party Secure Function Evaluation. Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger |
| 2006 | Language Modeling and Encryption on Packet Switched Networks. Kevin S. McCurley |
| 2006 | Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. Phong Q. Nguyen, Oded Regev |
| 2006 | Luby-Rackoff Ciphers from Weak Round Functions? Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin |
| 2006 | Oblivious Transfer Is Symmetric. Stefan Wolf, Jürg Wullschleger |
| 2006 | On the (Im-)Possibility of Extending Coin Toss. Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
| 2006 | Optimal Reductions Between Oblivious Transfers Using Interactive Hashing. Claude Crépeau, George Savvides |
| 2006 | Our Data, Ourselves: Privacy Via Distributed Noise Generation. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor |
| 2006 | Parallel and Concurrent Security of the HB and HB Jonathan Katz, Ji Sun Shin |
| 2006 | Perfect Non-interactive Zero Knowledge for NP. Jens Groth, Rafail Ostrovsky, Amit Sahai |
| 2006 | Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol. Tal Moran, Moni Naor |
| 2006 | Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. Jean-Charles Faugère, Ludovic Perret |
| 2006 | Practical Identity-Based Encryption Without Random Oracles. Craig Gentry |
| 2006 | Private Circuits II: Keeping Secrets in Tamperable Circuits. Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David A. Wagner |
| 2006 | QUAD: A Practical Stream Cipher with Provable Security. Côme Berbain, Henri Gilbert, Jacques Patarin |
| 2006 | Security Analysis of the Strong Diffie-Hellman Problem. Jung Hee Cheon |
| 2006 | Sequential Aggregate Signatures and Multisignatures Without Random Oracles. Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters |
| 2006 | Simplified Threshold RSA with Adaptive and Proactive Security. Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen |
| 2006 | Symplectic Lattice Reduction and NTRU. Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen |
| 2006 | The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. Alexander W. Dent |
| 2006 | The Function Field Sieve in the Medium Prime Case. Antoine Joux, Reynald Lercier |
| 2006 | The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. Mihir Bellare, Phillip Rogaway |
| 2006 | Unclonable Group Identification. Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen |
| 2006 | VSH, an Efficient and Provable Collision-Resistant Hash Function. Scott Contini, Arjen K. Lenstra, Ron Steinfeld |