| 2010 | A Timing Attack against the Secret Permutation in the McEliece PKC. Falko Strenzke |
| 2010 | Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding |
| 2010 | Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes. Christian Wieschebrink |
| 2010 | Designing a Rank Metric Based McEliece Cryptosystem. Pierre Loidreau |
| 2010 | Grover vs. McEliece. Daniel J. Bernstein |
| 2010 | Growth of the Ideal Generated by a Quadratic Boolean Function. Jintai Ding, Timothy J. Hodges, Victoria Kruglov |
| 2010 | Information-Set Decoding for Linear Codes over F Christiane Peters |
| 2010 | Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials. Delphine Boucher, Philippe Gaborit, Willi Geiselmann, Olivier Ruatta, Felix Ulmer |
| 2010 | Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers. Stefan Heyse |
| 2010 | Mutant Zhuang-Zi Algorithm. Jintai Ding, Dieter Schmidt |
| 2010 | Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings Nicolas Sendrier |
| 2010 | Practical Power Analysis Attacks on Software Implementations of McEliece. Stefan Heyse, Amir Moradi, Christof Paar |
| 2010 | Properties of the Discrete Differential with Cryptographic Applications. Daniel Smith-Tone |
| 2010 | Proposal of a Signature Scheme Based on STS Trapdoor. Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita |
| 2010 | Secure Variants of the Square Encryption Scheme. Crystal Lee Clough, Jintai Ding |
| 2010 | Selecting Parameters for the Rainbow Signature Scheme. Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann |
| 2010 | Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles. Markus Rückert |