| 2011 | A Specification Based Intrusion Detection Framework for Mobile Phones. Ashwin Chaugule, Zhi Xu, Sencun Zhu |
| 2011 | Analysis of Message Injection in Stream Cipher-Based Hash Functions. Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto |
| 2011 | Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings Javier López, Gene Tsudik |
| 2011 | Cache Timing Analysis of RC4. Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux |
| 2011 | Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Martin R. Albrecht, Carlos Cid |
| 2011 | Composable Security Analysis of OS Services. Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema |
| 2011 | Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. Alex Biryukov, Ilya Kizhvatov, Bin Zhang |
| 2011 | Double-Trapdoor Anonymous Tags for Traceable Signatures. Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo |
| 2011 | Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura |
| 2011 | Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security. Werner Schindler, Kouichi Itoh |
| 2011 | Fighting Pirates 2.0. Paolo D'Arco, Angel L. Pérez del Pozo |
| 2011 | Fully Non-interactive Onion Routing with Forward-Secrecy. Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi |
| 2011 | Generic Fully Simulatable Adaptive Oblivious Transfer. Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong |
| 2011 | Hierarchical Identity-Based Chameleon Hash and Its Applications. Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao |
| 2011 | Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo |
| 2011 | LBlock: A Lightweight Block Cipher. Wenling Wu, Lei Zhang |
| 2011 | Linear Analysis of Reduced-Round CubeHash. Tomer Ashur, Orr Dunkelman |
| 2011 | Misuse Detection in Consent-Based Networks. Mansoor Alicherry, Angelos D. Keromytis |
| 2011 | Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks. Jacob C. N. Schuldt, Goichiro Hanaoka |
| 2011 | On Hiding a Plaintext Length by Preencryption. Cihangir Tezcan, Serge Vaudenay |
| 2011 | On the Indifferentiability of Fugue and Luffa. Rishiraj Bhattacharyya, Avradip Mandal |
| 2011 | Practical Attacks on the Maelstrom-0 Compression Function. Stefan Kölbl, Florian Mendel |
| 2011 | Private Discovery of Common Social Contacts. Emiliano De Cristofaro, Mark Manulis, Bertram Poettering |
| 2011 | Public-Key Encryption with Delegated Search. Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker |
| 2011 | Quantitatively Analyzing Stealthy Communication Channels. Patrick Butler, Kui Xu, Danfeng (Daphne) Yao |
| 2011 | Relaxed Security Notions for Signatures of Knowledge. Marc Fischlin, Cristina Onete |
| 2011 | Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga |
| 2011 | Secure Authenticated Comparisons. Keith B. Frikken, Hao Yuan, Mikhail J. Atallah |
| 2011 | Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung |
| 2011 | Security Notions for Broadcast Encryption. Duong Hieu Phan, David Pointcheval, Mario Strefler |
| 2011 | Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. Ashish Choudhury, Kaoru Kurosawa, Arpita Patra |
| 2011 | Towards User-Friendly Credential Transfer on Open Credential Platforms. Kari Kostiainen, N. Asokan, Alexandra Afanasyeva |