| 2010 | A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. Mridul Nandi |
| 2010 | Another Look at Complementation Properties. Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque |
| 2010 | Attacking the Knudsen-Preneel Compression Functions. Onur Özen, Thomas Shrimpton, Martijn Stam |
| 2010 | Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, Bo Liang |
| 2010 | Cryptanalysis of ESSENCE. María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin |
| 2010 | Cryptanalysis of the DECT Standard Cipher. Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann |
| 2010 | Differential and Invertibility Properties of BLAKE. Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier |
| 2010 | Domain Extension for Enhanced Target Collision-Resistant Hash Functions. Ilya Mironov |
| 2010 | Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu |
| 2010 | Fast Software AES Encryption. Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright |
| 2010 | Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers Seokhie Hong, Tetsu Iwata |
| 2010 | Finding Preimages of Tiger Up to 23 Steps. Lei Wang, Yu Sasaki |
| 2010 | Higher Order Differential Attack on Step-Reduced Variants of Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko |
| 2010 | How to Thwart Birthday Attacks against MACs via Small Randomness. Kazuhiko Minematsu |
| 2010 | Improving the Generalized Feistel. Tomoyasu Suzaki, Kazuhiko Minematsu |
| 2010 | Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. Olivier Billet, Jonathan Etrog, Henri Gilbert |
| 2010 | Nonlinear Equivalence of Stream Ciphers. Sondre Rønjom, Carlos Cid |
| 2010 | Pseudo-cryptanalysis of the Original Blue Midnight Wish. Søren S. Thomsen |
| 2010 | Rebound Attack on Reduced-Round Versions of JH. Vincent Rijmen, Deniz Toz, Kerem Varici |
| 2010 | Rotational Cryptanalysis of ARX. Dmitry Khovratovich, Ivica Nikolic |
| 2010 | Security Analysis of the Mode of JH Hash Function. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi |
| 2010 | Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. Henri Gilbert, Thomas Peyrin |