| 1996 | A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring. Bernd Meyer, Volker Müller |
| 1996 | Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding Ueli M. Maurer |
| 1996 | An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding. Jean-Bernard Fischer, Jacques Stern |
| 1996 | Asymmetric Fingerprinting (Extended Abstract). Birgit Pfitzmann, Matthias Schunter |
| 1996 | Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. Xian-Mo Zhang, Yuliang Zheng |
| 1996 | Construction of t-Resilient Functions over a Finite Alphabet. Paul Camion, Anne Canteaut |
| 1996 | Designated Verifier Proofs and Their Applications. Markus Jakobsson, Kazue Sako, Russell Impagliazzo |
| 1996 | Efficient Multiplicative Sharing Schemes. Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild |
| 1996 | Equivocable Oblivious Transfer. Donald Beaver |
| 1996 | Fast Low Order Approximation of Cryptographic Functions. Jovan Dj. Golic |
| 1996 | Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known. Don Coppersmith |
| 1996 | Finding a Small Root of a Univariate Modular Equation. Don Coppersmith |
| 1996 | Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. William Aiello, Ramarathnam Venkatesan |
| 1996 | Generating EIGamal Signatures Without Knowing the Secret Key. Daniel Bleichenbacher |
| 1996 | Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. Jacques Patarin |
| 1996 | Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. Mike Burmester |
| 1996 | Low-Exponent RSA with Related Messages. Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter |
| 1996 | Multi-Autority Secret-Ballot Elections with Linear Work. Ronald Cramer, Matthew K. Franklin, Berry Schoenmakers, Moti Yung |
| 1996 | New Convertible Undeniable Signature Schemes. Ivan Damgård, Torben P. Pedersen |
| 1996 | New Modular Multiplication Algorithms for Fast Modular Exponentiation. Seong-Min Hong, Sang-Yeop Oh, Hyunsoo Yoon |
| 1996 | Non-Linear Approximations in Linear Cryptanalysis. Lars R. Knudsen, Matthew J. B. Robshaw |
| 1996 | On Diffie-Hellman Key Agreement with Short Exponents. Paul C. van Oorschot, Michael J. Wiener |
| 1996 | On the Difficulty of Software Key Escrow. Lars R. Knudsen, Torben P. Pedersen |
| 1996 | On the Existence of Secure Feedback Registers (Extended Abstract). Andrew Klapper |
| 1996 | On the Security of Two MAC Algorithms. Bart Preneel, Paul C. van Oorschot |
| 1996 | On the Security of a Practical Identification Scheme. Victor Shoup |
| 1996 | Optimum Secret Sharing Scheme Secure against Cheating. Wakaha Ogata, Kaoru Kurosawa |
| 1996 | Public Key Encryption and Signature Schemes Based on Polynomials over Zn. Jörg Schwenk, Jörg Eisfeld |
| 1996 | Publicly Verifiable Secret Sharing. Markus Stadler |
| 1996 | Robust Threshold DSS Signatures. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
| 1996 | Security Proofs for Signature Schemes. David Pointcheval, Jacques Stern |
| 1996 | Session Key Distribution Using Smart Cards. Victor Shoup, Aviel D. Rubin |
| 1996 | Short Discrete Proofs. Joan Boyar, René Peralta |
| 1996 | The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. Mihir Bellare, Phillip Rogaway |
| 1996 | The Security of the Gabidulin Public Key Cryptosystem. Keith Gibson |