| 2011 | 1/ Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov |
| 2011 | A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. Carolyn Whitnall, Elisabeth Oswald |
| 2011 | A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Alkhzaimi, Erik Zenner |
| 2011 | A New Variant of PMAC: Beyond the Birthday Bound. Kan Yasuda |
| 2011 | Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings Phillip Rogaway |
| 2011 | Analyzing Blockwise Lattice Algorithms Using Dynamical Systems. Guillaume Hanrot, Xavier Pujol, Damien Stehlé |
| 2011 | Authenticated and Misuse-Resistant Encryption of Key-Dependent Data. Mihir Bellare, Sriram Keelveedhi |
| 2011 | Automatic Search of Attacks on Round-Reduced AES and Applications. Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque |
| 2011 | Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. Zvika Brakerski, Gil Segev |
| 2011 | Bi-Deniable Public-Key Encryption. Adam O'Neill, Chris Peikert, Brent Waters |
| 2011 | Classical Cryptographic Protocols in a Quantum World. Sean Hallgren, Adam D. Smith, Fang Song |
| 2011 | Computer-Aided Security Proofs for the Working Cryptographer. Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella-Béguelin |
| 2011 | Constant-Rate Oblivious Transfer from Noisy Channels. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, Jürg Wullschleger |
| 2011 | Cryptography with Tamperable and Leaky Memory. Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai |
| 2011 | Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. Zvika Brakerski, Vinod Vaikuntanathan |
| 2011 | Fully Homomorphic Encryption over the Integers with Shorter Public Keys. Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi |
| 2011 | Generic Side-Channel Distinguishers: Improvements and Limitations. Nicolas Veyrat-Charvillon, François-Xavier Standaert |
| 2011 | How to Improve Rebound Attacks. María Naya-Plasencia |
| 2011 | Inverting HFE Systems Is Quasi-Polynomial for All Fields. Jintai Ding, Timothy J. Hodges |
| 2011 | Key-Evolution Schemes Resilient to Space-Bounded Leakage. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs |
| 2011 | Leakage-Resilient Zero Knowledge. Sanjam Garg, Abhishek Jain, Amit Sahai |
| 2011 | Leftover Hash Lemma, Revisited. Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu |
| 2011 | McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks. Hang Dinh, Cristopher Moore, Alexander Russell |
| 2011 | Memory Delegation. Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz |
| 2011 | Merkle Puzzles in a Quantum World. Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail |
| 2011 | Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. Masayuki Abe, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo |
| 2011 | Optimal Verification of Operations on Dynamic Sets. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos |
| 2011 | Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. Alexandra Boldyreva, Nathan Chenette, Adam O'Neill |
| 2011 | Perfectly-Secure Multiplication for Any Gilad Asharov, Yehuda Lindell, Tal Rabin |
| 2011 | Physically Uncloneable Functions in the Universal Composition Framework. Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser |
| 2011 | Position-Based Quantum Cryptography: Impossibility and Constructions. Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner |
| 2011 | Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. Daniele Micciancio, Petros Mol |
| 2011 | Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials. Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari |
| 2011 | Random Oracle Reducibility. Paul Baecher, Marc Fischlin |
| 2011 | Round Optimal Blind Signatures. Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, Dominique Unruh |
| 2011 | Secure Computation on the Web: Computing without Simultaneous Interaction. Shai Halevi, Yehuda Lindell, Benny Pinkas |
| 2011 | Smaller Decoding Exponents: Ball-Collision Decoding. Daniel J. Bernstein, Tanja Lange, Christiane Peters |
| 2011 | The Collision Security of Tandem-DM in the Ideal Cipher Model. Jooyoung Lee, Martijn Stam, John P. Steinberger |
| 2011 | The IPS Compiler: Optimizations, Variants and Concrete Efficiency. Yehuda Lindell, Eli Oxman, Benny Pinkas |
| 2011 | The PHOTON Family of Lightweight Hash Functions. Jian Guo, Thomas Peyrin, Axel Poschmann |
| 2011 | The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing. Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing |
| 2011 | Time-Lock Puzzles in the Random Oracle Model. Mohammad Mahmoody, Tal Moran, Salil P. Vadhan |
| 2011 | Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk). Roger Dingledine |
| 2011 | Verifiable Delegation of Computation over Large Datasets. Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis |