| 2011 | Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers Alex Biryukov, Guang Gong, Douglas R. Stinson |
| 2010 | A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. Andrey Bogdanov, Christian Rechberger |
| 2010 | A Low-Area Yet Performant FPGA Implementation of Shabal. Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah |
| 2010 | A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. Pierre-Louis Cayrel, Pascal Véron, Sidi Mohamed El Yousfi Alaoui |
| 2010 | Affine Masking against Higher-Order Side Channel Analysis. Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain |
| 2010 | Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque |
| 2010 | Batch Computations Revisited: Combining Key Computations and Batch Verifications. René Struik |
| 2010 | Cryptanalysis of Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer |
| 2010 | Deterministic Differential Properties of the Compression Function of BMW. Jian Guo, Søren S. Thomsen |
| 2010 | Discovery and Exploitation of New Biases in RC4. Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux |
| 2010 | Hill Climbing Algorithms and Trivium. Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz |
| 2010 | Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags. Thomas Plos, Hannes Groß, Martin Feldhofer |
| 2010 | Improving DPA by Peak Distribution Analysis. Jing Pan, Jasper G. J. van Woudenberg, Jerry den Hartog, Marc F. Witteman |
| 2010 | On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis. Kyoji Shibutani |
| 2010 | On the Minimum Communication Effort for Secure Group Key Exchange. Frederik Armknecht, Jun Furukawa |
| 2010 | One-Time Signatures and Chameleon Hash Functions. Payman Mohassel |
| 2010 | Optimal Covering Codes for Finding Near-Collisions. Mario Lamberger, Vincent Rijmen |
| 2010 | Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme. Matthieu Finiasz |
| 2010 | Preimages for the Tillich-Zémor Hash Function. Christophe Petit, Jean-Jacques Quisquater |
| 2010 | Search on Encrypted Data in the Symmetric-Key Setting. Alexandra Boldyreva |
| 2010 | Security Analysis of SIMD. Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent |
| 2010 | Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function. Martin Schläffer |
| 2010 | The Differential Analysis of S-Functions. Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel |
| 2010 | The Rise and Fall and Rise of Combinatorial Key Predistribution. Keith M. Martin |
| 2010 | Tweaking AES. Ivica Nikolic |
| 2010 | Wild McEliece. Daniel J. Bernstein, Tanja Lange, Christiane Peters |
| 2010 | Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak- Christina Boura, Anne Canteaut |