| 2011 | A Single-Key Attack on the Full GOST Block Cipher. Takanori Isobe |
| 2011 | An Improved Algebraic Attack on Hamsi-256. Itai Dinur, Adi Shamir |
| 2011 | Analysis of Reduced-SHAvite-3-256 v2. Marine Minier, María Naya-Plasencia, Thomas Peyrin |
| 2011 | Attack on Broadcast RC4 Revisited. Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta |
| 2011 | Boomerang Attacks on BLAKE-32. Alex Biryukov, Ivica Nikolic, Arnab Roy |
| 2011 | Breaking Grain-128 with Dynamic Cube Attacks. Itai Dinur, Adi Shamir |
| 2011 | Cryptanalysis of Hummingbird-1. Markku-Juhani O. Saarinen |
| 2011 | Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen |
| 2011 | Cryptanalysis of the Knapsack Generator. Simon Knellwolf, Willi Meier |
| 2011 | Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner |
| 2011 | Fast Correlation Attacks: Methods and Countermeasures. Willi Meier |
| 2011 | Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers Antoine Joux |
| 2011 | Higher-Order Differential Properties of Keccak and Christina Boura, Anne Canteaut, Christophe De Cannière |
| 2011 | Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. Yu Sasaki, Kan Yasuda |
| 2011 | Linear Approximations of Addition Modulo 2 Chunfang Zhou, Xiutao Feng, Chuankun Wu |
| 2011 | Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. Yu Sasaki |
| 2011 | Multiple Differential Cryptanalysis: Theory and Practice. Céline Blondeau, Benoît Gérard |
| 2011 | On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson |
| 2011 | On the Security of Hash Functions Employing Blockcipher Postprocessing. Donghoon Chang, Mridul Nandi, Moti Yung |
| 2011 | Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function. Jérémy Jean, Pierre-Alain Fouque |
| 2011 | Practical Near-Collisions on the Compression Function of BMW. Gaëtan Leurent, Søren S. Thomsen |
| 2011 | Search for Related-Key Differential Characteristics in DES-Like Ciphers. Alex Biryukov, Ivica Nikolic |
| 2011 | The Additive Differential Probability of ARX. Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel |
| 2011 | The Software Performance of Authenticated-Encryption Modes. Ted Krovetz, Phillip Rogaway |