| 2011 | A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, Denis Flandre |
| 2011 | Adaptive Pseudo-free Groups and Applications. Dario Catalano, Dario Fiore, Bogdan Warinschi |
| 2011 | Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings Kenneth G. Paterson |
| 2011 | Almost Optimum Satoshi Obana |
| 2011 | Careful with Composition: Limitations of the Indifferentiability Framework. Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton |
| 2011 | Commuting Signatures and Verifiable Encryption. Georg Fuchsbauer |
| 2011 | Concurrent Composition in the Bounded Quantum Storage Model. Dominique Unruh |
| 2011 | Decentralizing Attribute-Based Encryption. Allison B. Lewko, Brent Waters |
| 2011 | Deniable Encryption with Negligible Detection Probability: An Interactive Construction. Markus Dürmuth, David Mandell Freeman |
| 2011 | Domain Extension for MACs Beyond the Birthday Barrier. Yevgeniy Dodis, John P. Steinberger |
| 2011 | Efficient Authentication from Hard Learning Problems. Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi |
| 2011 | Efficient Circuit-Size Independent Public Key Encryption with KDM Security. Tal Malkin, Isamu Teranishi, Moti Yung |
| 2011 | Efficient Non-interactive Secure Computation. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai |
| 2011 | Faster Explicit Formulas for Computing Pairings over Ordinary Curves. Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López |
| 2011 | Fully Leakage-Resilient Signatures. Elette Boyle, Gil Segev, Daniel Wichs |
| 2011 | Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption. Yehuda Lindell |
| 2011 | Homomorphic Signatures for Polynomial Functions. Dan Boneh, David Mandell Freeman |
| 2011 | Implementing Gentry's Fully-Homomorphic Encryption Scheme. Craig Gentry, Shai Halevi |
| 2011 | Improved Generic Algorithms for Hard Knapsacks. Anja Becker, Jean-Sébastien Coron, Antoine Joux |
| 2011 | Key-Dependent Message Security: Generic Amplification and Completeness. Benny Applebaum |
| 2011 | Lattice Reduction Algorithms: Theory and Practice. Phong Q. Nguyen |
| 2011 | Making NTRU as Secure as Worst-Case Problems over Ideal Lattices. Damien Stehlé, Ron Steinfeld |
| 2011 | On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. Gregor Leander |
| 2011 | Pushing the Limits: A Very Compact and a Threshold Implementation of AES. Amir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang |
| 2011 | Secret Keys from Channel Noise. Hadi Ahmadi, Reihaneh Safavi-Naini |
| 2011 | Secure Authentication from a Weak Key, without Leaking Information. Niek J. Bouman, Serge Fehr |
| 2011 | Semi-homomorphic Encryption and Multiparty Computation. Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias |
| 2011 | Statistical Attack on RC4 - Distinguishing WPA. Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux |
| 2011 | The Arithmetic Codex: Theory and Applications. Ronald Cramer |
| 2011 | Threshold and Revocation Cryptosystems via Extractable Hash Proofs. Hoeteck Wee |
| 2011 | Tight Proofs for Signature Schemes without Random Oracles. Sven Schäge |
| 2011 | Towards a Game Theoretic View of Secure Computation. Gilad Asharov, Ran Canetti, Carmit Hazay |
| 2011 | Two-Output Secure Computation with Malicious Adversaries. Abhi Shelat, Chih-Hao Shen |
| 2011 | Unbounded HIBE and Attribute-Based Encryption. Allison B. Lewko, Brent Waters |