| 2011 | A Framework for Practical Universally Composable Zero-Knowledge Protocols. Jan Camenisch, Stephan Krenn, Victor Shoup |
| 2011 | Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings Dong Hoon Lee, Xiaoyun Wang |
| 2011 | An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann |
| 2011 | BKZ 2.0: Better Lattice Security Estimates. Yuanmi Chen, Phong Q. Nguyen |
| 2011 | BiTR: Built-in Tamper Resilience. Seung Geol Choi, Aggelos Kiayias, Tal Malkin |
| 2011 | Biclique Cryptanalysis of the Full AES. Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger |
| 2011 | Bridging Broadcast Encryption and Group Key Agreement. Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs |
| 2011 | Computational Verifiable Secret Sharing Revisited. Michael Backes, Aniket Kate, Arpita Patra |
| 2011 | Constant-Round Private Function Evaluation with Linear Complexity. Jonathan Katz, Lior Malka |
| 2011 | Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. Chao Ning, Qiuliang Xu |
| 2011 | Counting Points on Genus 2 Curves with Real Multiplication. Pierrick Gaudry, David R. Kohel, Benjamin A. Smith |
| 2011 | Cryptanalysis of ARMADILLO2. Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner |
| 2011 | Cryptography Secure against Related-Key Attacks and Tampering. Mihir Bellare, David Cash, Rachel Miller |
| 2011 | Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$. Alexander May, Alexander Meurer, Enrico Thomae |
| 2011 | Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments. Jens Groth |
| 2011 | Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. Florian Mendel, Tomislav Nad, Martin Schläffer |
| 2011 | Functional Encryption for Inner Product Predicates from Learning with Errors. Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan |
| 2011 | Leakage-Resilient Cryptography from the Inner-Product Extractor. Stefan Dziembowski, Sebastian Faust |
| 2011 | Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud |
| 2011 | Lower and Upper Bounds for Deniable Public-Key Encryption. Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi |
| 2011 | Natural Generalizations of Threshold Secret Sharing. Oriol Farràs, Carles Padró, Chaoping Xing, An Yang |
| 2011 | Noiseless Database Privacy. Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta |
| 2011 | Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security. Marc Fischlin, Benoît Libert, Mark Manulis |
| 2011 | Oblivious RAM with O((logN)3) Worst-Case Cost. Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li |
| 2011 | On the Efficiency of Bit Commitment Reductions. Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger |
| 2011 | On the Joint Security of Encryption and Signature, Revisited. Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson |
| 2011 | Polly Cracker, Revisited. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret |
| 2011 | Practical Key-Recovery for All Possible Parameters of SFLASH. Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat |
| 2011 | Program Obfuscation with Leaky Hardware. Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum |
| 2011 | Random Oracles in a Quantum World. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry |
| 2011 | Rebound Attack on JH42. María Naya-Plasencia, Deniz Toz, Kerem Varici |
| 2011 | Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung |
| 2011 | Second-Order Differential Collisions for Reduced SHA-256. Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic |
| 2011 | Secure Communication in Multicast Graphs. Qiushi Yang, Yvo Desmedt |
| 2011 | Separating Short Structure-Preserving Signatures from Non-interactive Assumptions. Masayuki Abe, Jens Groth, Miyako Ohkubo |
| 2011 | Short Signatures from Weaker Assumptions. Dennis Hofheinz, Tibor Jager, Eike Kiltz |
| 2011 | Structure Preserving CCA Secure Encryption and Applications. Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens |
| 2011 | Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton |
| 2011 | The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy. Divesh Aggarwal, Ueli Maurer |
| 2011 | The Preimage Security of Double-Block-Length Compression Functions. Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John P. Steinberger |
| 2011 | Two Provers in Isolation. Claude Crépeau, Louis Salvail, Jean-Raymond Simard, Alain Tapp |