| 2006 | A New Dedicated 256-Bit Hash Function: FORK-256. Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee |
| 2006 | A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. Debrup Chakraborty, Palash Sarkar |
| 2006 | A Study of the MD5 Attacks: Insights and Improvements. John Black, Martin Cochran, Trevor Highland |
| 2006 | A Zero-Dimensional Gröbner Basis for AES-128. Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann |
| 2006 | Analysis of Step-Reduced SHA-256. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2006 | Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. Jonathan J. Hoch, Adi Shamir |
| 2006 | Chosen-Ciphertext Attacks Against MOSQUITO. Antoine Joux, Frédéric Muller |
| 2006 | Collisions and Near-Collisions for Reduced-Round Tiger. John Kelsey, Stefan Lucks |
| 2006 | Computing the Algebraic Immunity Efficiently. Frédéric Didier, Jean-Pierre Tillich |
| 2006 | Cryptanalysis of Achterbahn. Thomas Johansson, Willi Meier, Frédéric Muller |
| 2006 | Cryptanalysis of Grain. Côme Berbain, Henri Gilbert, Alexander Maximov |
| 2006 | Cryptanalysis of the Full HAVAL with 4 and 5 Passes. Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park |
| 2006 | Cryptanalysis of the Stream Cipher DECIM. Hongjun Wu, Bart Preneel |
| 2006 | Distinguishing Attacks on the Stream Cipher Py. Souradyuti Paul, Bart Preneel, Gautham Sekar |
| 2006 | Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers Matthew J. B. Robshaw |
| 2006 | How Far Can We Go on the x64 Processors? Mitsuru Matsui |
| 2006 | Improved Linear Distinguishers for SNOW 2.0. Kaisa Nyberg, Johan Wallén |
| 2006 | New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. Tetsu Iwata |
| 2006 | On Feistel Structures Using a Diffusion Switching Mechanism. Taizo Shirai, Kyoji Shibutani |
| 2006 | Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Kazuhiko Minematsu, Yukiyasu Tsunoo |
| 2006 | Pseudorandom Permutation Families over Abelian Groups. Louis Granboulan, Éric Levieil, Gilles Piret |
| 2006 | Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. Matthias Krause, Dirk Stegemann |
| 2006 | Resynchronization Attacks on WG and LEX. Hongjun Wu, Bart Preneel |
| 2006 | Searching for Differential Paths in MD4. Martin Schläffer, Elisabeth Oswald |
| 2006 | Some Plausible Constructions of Double-Block-Length Hash Functions. Shoichi Hirose |
| 2006 | The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. John Black |
| 2006 | The Impact of Carries on the Complexity of Collision Attacks on SHA-1. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2006 | Upper Bounds on Algebraic Immunity of Boolean Power Functions. Yassir Nawaz, Guang Gong, Kishan Chand Gupta |