| 2011 | A Note on the Dual Codes of Module Skew Codes. Delphine Boucher, Felix Ulmer |
| 2011 | A Secure and Efficient Proof of Integer in an Interval Range. Kun Peng |
| 2011 | Analysis of the SSH Key Exchange Protocol. Stephen C. Williams |
| 2011 | Binary Kloosterman Sums with Value 4. Jean-Pierre Flori, Sihem Mesnager, Gérard D. Cohen |
| 2011 | Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction. Junji Shikata, Daisuke Yamanaka |
| 2011 | Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes. Malika Izabachène, Benoît Libert, Damien Vergnaud |
| 2011 | Breaking an Identity-Based Encryption Scheme Based on DHIES. Martin R. Albrecht, Kenneth G. Paterson |
| 2011 | Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. Kazuhiko Minematsu, Tetsu Iwata |
| 2011 | Can a Program Reverse-Engineer Itself? Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion |
| 2011 | Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting. Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta |
| 2011 | Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity. Yuki Shibuya, Junji Shikata |
| 2011 | Cryptanalysis of the Light-Weight Cipher A2U2. Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner, Mathieu David |
| 2011 | Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings Liqun Chen |
| 2011 | Designated Confirmer Signatures with Unified Verification. Guilin Wang, Fubiao Xia, Yunlei Zhao |
| 2011 | Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2. Xusheng Zhang, Dongdai Lin |
| 2011 | Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions. Marc Mouffron, Guillaume Vergne |
| 2011 | Ensuring Message Embedding in Wet Paper Steganography. Daniel Augot, Morgan Barbier, Caroline Fontaine |
| 2011 | Generalised Complementary Arrays. Matthew Geoffrey Parker, Constanza Riera |
| 2011 | Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme. Peter Scholl, Nigel P. Smart |
| 2011 | Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves. Duc-Phong Le, Chik How Tan |
| 2011 | On Constructing Homomorphic Encryption Schemes from Coding Theory. Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi |
| 2011 | On Forward Secrecy in One-Round Key Exchange. Colin Boyd, Juanma González Nieto |
| 2011 | On the Efficient Implementation of Pairing-Based Protocols. Michael Scott |
| 2011 | On the Stability of m-Sequences. Alex J. Burrage, Ana Salagean, Raphael C.-W. Phan |
| 2011 | On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i + 1, 2 j + 1}. Vincent Herbert, Sumanta Sarkar |
| 2011 | Parallelizing the Weil and Tate Pairings. Diego F. Aranha, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez |
| 2011 | Security of Hash-then-CBC Key Wrapping Revisited. Yasushi Osaki, Tetsu Iwata |
| 2011 | Self-correctors for Cryptographic Modules. Go Yamamoto, Tetsutaro Kobayashi |
| 2011 | The Symbiosis between Collision and Preimage Resistance. Elena Andreeva, Martijn Stam |