| 2021 | A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption. Marloes Venema, Greg Alpár |
| 2021 | A Framework to Optimize Implementations of Matrices. Da Lin, Zejun Xiang, Xiangyong Zeng, Shasha Zhang |
| 2021 | Balancing Privacy and Accountability in Blockchain Identity Management. Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi |
| 2021 | Compilation of Function Representations for Secure Computing Paradigms. Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy |
| 2021 | Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups. Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto |
| 2021 | Dual Lattice Attacks for Closest Vector Problems (with Preprocessing). Thijs Laarhoven, Michael Walter |
| 2021 | EPID with Malicious Revocation. Olivier Sanders, Jacques Traoré |
| 2021 | FAN: A Lightweight Authenticated Cryptographic Algorithm. Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Shaoyu Du |
| 2021 | Improvements to RSA Key Generation and CRT on Embedded Devices. Mike Hamburg, Mike Tunstall, Qinglai Xiao |
| 2021 | Inverse-Sybil Attacks in Automated Contact Tracing. Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo |
| 2021 | Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge |
| 2021 | Mesh Messaging in Large-Scale Protests: Breaking Bridgefy. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková |
| 2021 | More Efficient Shuffle Argument from Unique Factorization. Toomas Krips, Helger Lipmaa |
| 2021 | Multi-party Revocation in Sovrin: Performance through Distributed Trust. Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch |
| 2021 | Noisy Simon Period Finding. Alexander May, Lars Schlieper, Jonathan Schwinger |
| 2021 | Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures. Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko |
| 2021 | Oblivious TLS via Multi-party Computation. Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger |
| 2021 | On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study. Anupam Chattopadhyay, Mustafa Khairallah, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin, Vesselin Velichkov |
| 2021 | On the Effectiveness of Time Travel to Inject COVID-19 Alerts. Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux |
| 2021 | On the Hardness of Module-LWE with Binary Secret. Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen |
| 2021 | Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions. Yuqing Zhao, Wenqi Yu, Chun Guo |
| 2021 | Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank. Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui |
| 2021 | Signed Diffie-Hellman Key Exchange with Tight Security. Jiaxin Pan, Chen Qian, Magnus Ringerud |
| 2021 | SoK: Game-Based Security Models for Group Key Exchange. Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila |
| 2021 | SoK: How (not) to Design and Implement Post-quantum Cryptography. James Howe, Thomas Prest, Daniel Apon |
| 2021 | The Key-Dependent Message Security of Key-Alternating Feistel Ciphers. Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud |
| 2021 | Topics in Cryptology - CT-RSA 2021 - Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings Kenneth G. Paterson |
| 2021 | Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys. Chao Niu, Muzhou Li, Siwei Sun, Meiqin Wang |