| 2001 | A Compact Rijndael Hardware Architecture with S-Box Optimization. Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh |
| 2001 | A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. Siguna Müller |
| 2001 | Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. Anna Lysyanskaya, Chris Peikert |
| 2001 | Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings Colin Boyd |
| 2001 | An Efficient Implementation of Braid Groups. Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon |
| 2001 | An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. Pierrick Gaudry, Nicolas Gürel |
| 2001 | Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. Yuriy V. Tarannikov, Peter Korolev, Anton Botev |
| 2001 | Computation of Discrete Logarithms in F Emmanuel Thomé |
| 2001 | Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
| 2001 | Efficient Traitor Tracing Algorithms Using List Decoding. Alice Silverberg, Jessica Staddon, Judy L. Walker |
| 2001 | Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. Nicolas T. Courtois |
| 2001 | Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. Duncan S. Wong, Agnes Hui Chan |
| 2001 | Fully Distributed Threshold RSA under Standard Assumptions. Pierre-Alain Fouque, Jacques Stern |
| 2001 | Generic Attacks on Feistel Schemes. Jacques Patarin |
| 2001 | How to Achieve a McEliece-Based Digital Signature Scheme. Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier |
| 2001 | How to Leak a Secret. Ronald L. Rivest, Adi Shamir, Yael Tauman |
| 2001 | Key-Privacy in Public-Key Encryption. Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
| 2001 | Known-IV Attacks on Triple Modes of Operation of Block Ciphers. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi |
| 2001 | Mutually Independent Commitments. Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith |
| 2001 | Oblivious Polynomial Evaluation and Oblivious Neural Learning. Yan-Cheng Chang, Chi-Jen Lu |
| 2001 | On the Insecurity of a Server-Aided RSA Protocol. Phong Q. Nguyen, Igor E. Shparlinski |
| 2001 | Practical Construction and Analysis of Pseudo-Randomness Primitives. Johan Håstad, Mats Näslund |
| 2001 | Provable Security of KASUMI and 3GPP Encryption Mode f8. Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi |
| 2001 | Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
| 2001 | Provably Secure Fair Blind Signatures with Tight Revocation. Masayuki Abe, Miyako Ohkubo |
| 2001 | Responsive Round Complexity and Concurrent Zero-Knowledge. Tzafrir Cohen, Joe Kilian, Erez Petrank |
| 2001 | Secure Human Identification Protocols. Nicholas J. Hopper, Manuel Blum |
| 2001 | Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. Makoto Sugita, Kazukuni Kobara, Hideki Imai |
| 2001 | Self-Blindable Credential Certificates from the Weil Pairing. Eric R. Verheul |
| 2001 | Short Signatures from the Weil Pairing. Dan Boneh, Ben Lynn, Hovav Shacham |
| 2001 | Speeding Up XTR. Martijn Stam, Arjen K. Lenstra |
| 2001 | Supersingular Curves in Cryptography. Steven D. Galbraith |
| 2001 | The Modular Inversion Hidden Number Problem. Dan Boneh, Shai Halevi, Nick Howgrave-Graham |
| 2001 | Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Pierre-Alain Fouque, David Pointcheval |
| 2001 | Unbelievable Security. Matching AES Security Using Public Key Systems. Arjen K. Lenstra |