| 2016 | A MAC Mode for Lightweight Block Ciphers. Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda |
| 2016 | Algebraic Insights into the Secret Feistel Network. Léo Perrin, Aleksei Udovenko |
| 2016 | Analysis of the Kupyna-256 Hash Function. Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
| 2016 | Attacks Against Filter Generators Exploiting Monomial Mappings. Anne Canteaut, Yann Rotella |
| 2016 | Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. Li Lin, Wenling Wu, Yafei Zheng |
| 2016 | Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. Alex Biryukov, Vesselin Velichkov, Yann Le Corre |
| 2016 | Bit-Based Division Property and Application to Simon Family. Yosuke Todo, Masakatu Morii |
| 2016 | Cryptanalysis of Reduced NORX. Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki |
| 2016 | Cryptanalysis of the Full Spritz Stream Cipher. Subhadeep Banik, Takanori Isobe |
| 2016 | Detecting Flawed Masking Schemes with Leakage Detection Tests. Oscar Reparaz |
| 2016 | Efficient Design Strategies Based on the AES Round Function. Jérémy Jean, Ivica Nikolic |
| 2016 | Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers Thomas Peyrin |
| 2016 | Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. Huaifeng Chen, Xiaoyun Wang |
| 2016 | Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov |
| 2016 | Key Recovery Attack Against 2.5-Round \pi -Cipher. Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder |
| 2016 | Lightweight MDS Generalized Circulant Matrices. Meicheng Liu, Siang Meng Sim |
| 2016 | MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu |
| 2016 | Modeling Random Oracles Under Unpredictable Queries. Pooya Farshim, Arno Mittelbach |
| 2016 | New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length. Yusuke Naito, Kan Yasuda |
| 2016 | Note on Impossible Differential Attacks. Patrick Derbez |
| 2016 | On the Construction of Lightweight Circulant Involutory MDS Matrices. Yongqiang Li, Mingsheng Wang |
| 2016 | Optimizing S-Box Implementations for Several Criteria Using SAT Solvers. Ko Stoffelen |
| 2016 | Practical Order-Revealing Encryption with Limited Leakage. Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu |
| 2016 | RIV for Robust Authenticated Encryption. Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel |
| 2016 | Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng |
| 2016 | Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey |
| 2016 | Strengthening the Known-Key Security Notion for Block Ciphers. Benoît Cogliati, Yannick Seurin |
| 2016 | There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks. Houssem Maghrebi, Victor Servant, Julien Bringer |
| 2016 | Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir |
| 2016 | White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. Pascal Sasdrich, Amir Moradi, Tim Güneysu |