| 2001 | Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings Douglas R. Stinson, Stafford E. Tavares |
| 2000 | A Global PMI for Electronic Content Distribution. Carlisle M. Adams, Robert J. Zuccherato |
| 2000 | A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. John O. Pliam |
| 2000 | Analysis of IS-95 CDMA Voice Privacy. Muxiang Zhang, Christopher Carroll, Agnes Hui Chan |
| 2000 | Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. David A. McGrew, Scott R. Fluhrer |
| 2000 | Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita |
| 2000 | Chained Stream Authentication. Francesco Bergadano, Davide Cavagnino, Bruno Crispo |
| 2000 | Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. Amr M. Youssef |
| 2000 | DFCv2. Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay |
| 2000 | Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. Serge Vaudenay |
| 2000 | Differential Cryptanalysis of Reduced Rounds of GOST. Haruki Seki, Toshinobu Kaneko |
| 2000 | Dynamic Multi-threshold Metering Schemes. Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
| 2000 | HAS-V: A New Hash Function with Variable Output Length. Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee |
| 2000 | Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. Yuliang Zheng, Xian-Mo Zhang |
| 2000 | LILI Keystream Generator. Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan |
| 2000 | Modes of Operation of Stream Ciphers. Jovan Dj. Golic |
| 2000 | On Complexity of Polynomial Basis Squaring in F Huapeng Wu |
| 2000 | On Welch-Gong Transformation Sequence Generators. Guang Gong, Amr M. Youssef |
| 2000 | On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. Detlef Hühnlein, Sachar Paulus |
| 2000 | Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. Masayuki Kanda |
| 2000 | Root Finding Interpolation Attack. Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong |
| 2000 | Speeding up the Arithmetic on Koblitz Curves of Genus Two. Christian Günther, Tanja Lange, Andreas Stein |
| 2000 | Symmetric Block Ciphers Based on Group Bases. Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth |
| 2000 | The Block Cipher Hierocrypt. Kenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shin-ichi Kawamura |
| 2000 | Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber |