| 2007 | Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers Eli Biham, Amr M. Youssef |
| 2006 | Advances on Access-Driven Cache Attacks on AES. Michael Neve, Jean-Pierre Seifert |
| 2006 | Blind Differential Cryptanalysis for Enhanced Power Attacks. Helena Handschuh, Bart Preneel |
| 2006 | Changing the Odds Against Masked Logic. Kris Tiri, Patrick Schaumont |
| 2006 | Constructing an Ideal Hash Function from Weak Ideal Compression Functions. Moses D. Liskov |
| 2006 | Crossword Puzzle Attack on NLS. Joo Yeon Cho, Josef Pieprzyk |
| 2006 | Cryptanalysis of Achterbahn-Version 2. Martin Hell, Thomas Johansson |
| 2006 | Cryptanalysis of the Stream Cipher ABC v2. Hongjun Wu, Bart Preneel |
| 2006 | Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems. Roberto Maria Avanzi |
| 2006 | Dial C for Cipher. Thomas Baignères, Matthieu Finiasz |
| 2006 | Efficient Divisor Class Halving on Genus Two Curves. Peter Birkner |
| 2006 | Efficient Implementations of Multivariate Quadratic Systems. Côme Berbain, Olivier Billet, Henri Gilbert |
| 2006 | Extended Hidden Number Problem and Its Cryptanalytic Applications. Martin Hlavác, Tomás Rosa |
| 2006 | Improved DST Cryptanalysis of IDEA. Eyüp Serdar Ayaz, Ali Aydin Selçuk |
| 2006 | Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng |
| 2006 | Improved Security Analysis of XEX and LRW Modes. Kazuhiko Minematsu |
| 2006 | Message Authentication on 64-Bit Architectures. Ted Krovetz |
| 2006 | Multi-pass Fast Correlation Attack on Stream Ciphers. Bin Zhang, Dengguo Feng |
| 2006 | On Redundant Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger |
| 2006 | On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. Martin Hell, Thomas Johansson |
| 2006 | Pairing Calculation on Supersingular Genus 2 Curves. Colm O'hEigeartaigh, Michael Scott |
| 2006 | Provably Good Codes for Hash Function Design. Charanjit S. Jutla, Anindya C. Patthak |
| 2006 | Related-Key Rectangle Attack on the Full SHACAL-1. Orr Dunkelman, Nathan Keller, Jongsung Kim |
| 2006 | Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. Goce Jakimoski |
| 2006 | The Design of a Stream Cipher LEX. Alex Biryukov |
| 2006 | Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
| 2006 | When Stream Cipher Analysis Meets Public-Key Cryptography. Matthieu Finiasz, Serge Vaudenay |