| 2012 | Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers Ali Miri, Serge Vaudenay |
| 2011 | A Unified Framework for Small Secret Exponent Attack on RSA. Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu |
| 2011 | ASC-1: An Authenticated Encryption Stream Cipher. Goce Jakimoski, Samant Khajuria |
| 2011 | Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau |
| 2011 | Another Look at Tightness. Sanjit Chatterjee, Alfred Menezes, Palash Sarkar |
| 2011 | Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles. Yusuke Naito |
| 2011 | Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. Yu Sasaki |
| 2011 | Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher. Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci |
| 2011 | Conditional Differential Cryptanalysis of Trivium and KATAN. Simon Knellwolf, Willi Meier, María Naya-Plasencia |
| 2011 | Cryptographic Analysis of All 4 × 4-Bit S-Boxes. Markku-Juhani O. Saarinen |
| 2011 | Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche |
| 2011 | Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. Daniel Slamanig |
| 2011 | Faster Hashing to ${\mathbb G}_2$. Laura Fuentes-Castañeda, Edward Knapp, Francisco Rodríguez-Henríquez |
| 2011 | Group Law Computations on Jacobians of Hyperelliptic Curves. Craig Costello, Kristin E. Lauter |
| 2011 | Improved Analysis of ECHO-256. Jérémy Jean, María Naya-Plasencia, Martin Schläffer |
| 2011 | Improved Three-Way Split Formulas for Binary Polynomial Multiplication. Murat Cenk, Christophe Nègre, M. Anwar Hasan |
| 2011 | New Insights on Impossible Differential Cryptanalysis. Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent |
| 2011 | On CCA-Secure Somewhat Homomorphic Encryption. Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren |
| 2011 | On Various Families of Twisted Jacobi Quartics. Jérôme Plût |
| 2011 | Practical Attack on the Full MMB Block Cipher. Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang |
| 2011 | Proof of Empirical RC4 Biases and New Key Correlations. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar |
| 2011 | Provable Chosen-Target-Forced-Midfix Preimage Resistance. Elena Andreeva, Bart Mennink |
| 2011 | Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. Martin Ågren |
| 2011 | Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves. Hugo Labrande, Michael J. Jacobson Jr. |
| 2011 | The Cryptographic Power of Random Selection. Matthias Krause, Matthias Hamann |
| 2011 | Very Compact Hardware Implementations of the Blockcipher CLEFIA. Toru Akishita, Harunaga Hiwatari |