| 2001 | A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing. Phillip Benachour, Patrick Guy Farrell, Bahram Honary |
| 2001 | A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda |
| 2001 | A New Ultrafast Stream Cipher Design: COS Ciphers. Eric Filiol, Caroline Fontaine |
| 2001 | A New Undeniable Signature Scheme Using Smart Cards. Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung |
| 2001 | A Simple Soft-Input/Soft-Output Decoder for Hamming Codes. Simon Hirst, Bahram Honary |
| 2001 | A Statistical Decoding Algorithm for General Linear Block Codes. A. Kh. Al Jabri |
| 2001 | A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. Manfred von Willich |
| 2001 | Almost-Certainly Runlength-Limiting Codes. David J. C. MacKay |
| 2001 | An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. N. Komninos, Bahram Honary, Michael Darnell |
| 2001 | An Identity Based Encryption Scheme Based on Quadratic Residues. Clifford C. Cocks |
| 2001 | Another Way of Doing RSA Cryptography in Hardware. Lejla Batina, Geeke Muurling |
| 2001 | Attacking the Affine Parts of SFLASH. Willi Geiselmann, Rainer Steinwandt, Thomas Beth |
| 2001 | Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor |
| 2001 | Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings Bahram Honary |
| 2001 | Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera |
| 2001 | Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. Maki Yoshida, Toru Fujiwara |
| 2001 | Generating Large Instances of the Gong-Harn Cryptosystem. Kenneth J. Giuliani, Guang Gong |
| 2001 | Graph Configurations and Decoding Performance. J. T. Paire, Paul Coulton, Patrick Guy Farrell |
| 2001 | Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. Svetla Nikova, Ventzislav Nikov |
| 2001 | Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. Werner Schindler, François Koeune, Jean-Jacques Quisquater |
| 2001 | Investigation of Linear Codes Possessing Some Extra Properties. Viktoriya Masol |
| 2001 | Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. Karl Brincat, Chris J. Mitchell |
| 2001 | Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. Konstantinos Rantos, Chris J. Mitchell |
| 2001 | Lattice Attacks on RSA-Encrypted IP and TCP. Paul A. Crouch, James H. Davenport |
| 2001 | Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps. F. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso |
| 2001 | Non-binary Block Inseparable Errors Control Codes. Alexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko |
| 2001 | On Rabin-Type Signatures. Marc Joye, Jean-Jacques Quisquater |
| 2001 | On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory. Christoph Lange, Andreas Ahrens |
| 2001 | Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement. Matthew Geoffrey Parker |
| 2001 | Statistical Physics of Low Density Parity Check Error Correcting Codes. David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente |
| 2001 | Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai |
| 2001 | Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng |
| 2001 | The Complete Weight Enumerator for Codes over M Irfan Siap |
| 2001 | The Exact Security of ECIES in the Generic Group Model. Nigel P. Smart |
| 2001 | The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems. Ahmed Al-Dabbagh, Michael Darnell |
| 2001 | The Wide Trail Design Strategy. Joan Daemen, Vincent Rijmen |
| 2001 | Unconditionally Secure Key Agreement Protocol. Cyril Prissette |
| 2001 | Undetachable Threshold Signatures. Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
| 2001 | Weight vs. Magnetization Enumerator for Gallager Codes. Jort van Mourik, David Saad, Yoshiyuki Kabashima |