| 2010 | A Domain Extender for the Ideal Cipher. Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin |
| 2010 | A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch. Ueli M. Maurer, Stefano Tessaro |
| 2010 | A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. Ronald Cramer, Dennis Hofheinz, Eike Kiltz |
| 2010 | Almost Optimal Bounds for Direct Product Threshold Theorem. Charanjit S. Jutla |
| 2010 | An Efficient Parallel Repetition Theorem. Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak |
| 2010 | Bounds on the Sample Complexity for Private Learning and Private Data Release. Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi Nissim |
| 2010 | Composition of Zero-Knowledge Proofs with Efficient Provers. Eleanor Birrell, Salil P. Vadhan |
| 2010 | Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs. Benoît Libert, Moti Yung |
| 2010 | Delayed-Key Message Authentication for Streams. Marc Fischlin, Anja Lehmann |
| 2010 | Efficiency Limitations for Σ-Protocols for Group Homomorphisms. Endre Bangerter, Jan Camenisch, Stephan Krenn |
| 2010 | Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge. Rafail Ostrovsky, Omkant Pandey, Ivan Visconti |
| 2010 | Efficient Rational Secret Sharing in Standard Communication Networks. Georg Fuchsbauer, Jonathan Katz, David Naccache |
| 2010 | Efficient, Robust and Constant-Round Distributed RSA Key Generation. Ivan Damgård, Gert Læssøe Mikkelsen |
| 2010 | Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model. Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
| 2010 | Founding Cryptography on Tamper-Proof Hardware Tokens. Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia |
| 2010 | From Passive to Covert Security at Low Cost. Ivan Damgård, Martin Geisler, Jesper Buus Nielsen |
| 2010 | Ideal Hierarchical Secret Sharing Schemes. Oriol Farràs, Carles Padró |
| 2010 | Leakage-Resilient Signatures. Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum |
| 2010 | New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. Allison B. Lewko, Brent Waters |
| 2010 | Obfuscation of Hyperplane Membership. Ran Canetti, Guy N. Rothblum, Mayank Varia |
| 2010 | On Complete Primitives for Fairness. S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai |
| 2010 | On Related-Secret Pseudorandomness. David Goldenberg, Moses D. Liskov |
| 2010 | On Symmetric Encryption and Point Obfuscation. Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs |
| 2010 | On the Necessary and Sufficient Assumptions for UC Computation. Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi |
| 2010 | Parallel Repetition Theorems for Interactive Arguments. Kai-Min Chung, Feng-Hao Liu |
| 2010 | Privacy-Enhancing Cryptography: From Theory into Practice. Jan Camenisch |
| 2010 | Private Coins versus Public Coins in Zero-Knowledge Proof Systems. Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
| 2010 | Public-Key Cryptographic Primitives Provably as Secure as Subset Sum. Vadim Lyubashevsky, Adriana Palacio, Gil Segev |
| 2010 | Public-Key Encryption Schemes with Auxiliary Inputs. Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan |
| 2010 | Rationality in the Full-Information Model. Ronen Gradwohl |
| 2010 | Robust Encryption. Michel Abdalla, Mihir Bellare, Gregory Neven |
| 2010 | Secure Computation and Its Diverse Applications. Yuval Ishai |
| 2010 | Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings Daniele Micciancio |
| 2010 | Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. Rikke Bendlin, Ivan Damgård |
| 2010 | Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens. Vladimir Kolesnikov |
| 2010 | Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs. Yevgeniy Vahlis |