| 2011 | (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. David Xiao |
| 2011 | A Zero-One Law for Secure Multi-party Computation with Ternary Outputs. Gunnar Kreitz |
| 2011 | Achieving Leakage Resilience through Dual System Encryption. Allison B. Lewko, Yannis Rouselakis, Brent Waters |
| 2011 | After-the-Fact Leakage in Public-Key Encryption. Shai Halevi, Huijia Lin |
| 2011 | Black-Box Circular-Secure Encryption beyond Affine Functions. Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai |
| 2011 | Bringing People of Different Beliefs Together to Do UC. Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai |
| 2011 | Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions. Daniel Kraschewski, Jörn Müller-Quade |
| 2011 | Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs. Huijia Lin, Rafael Pass |
| 2011 | Concurrent Security and Non-malleability. Rafael Pass |
| 2011 | Correlated-Input Secure Hash Functions. Vipul Goyal, Adam O'Neill, Vanishree Rao |
| 2011 | Dense Model Theorems and Their Applications. Luca Trevisan |
| 2011 | Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek |
| 2011 | Functional Encryption: Definitions and Challenges. Dan Boneh, Amit Sahai, Brent Waters |
| 2011 | General Hardness Amplification of Predicates and Puzzles - (Extended Abstract). Thomas Holenstein, Grant Schoenebeck |
| 2011 | Homomorphic Encryption: From Private-Key to Public-Key. Ron Rothblum |
| 2011 | Identity-Based Encryption Secure against Selective Opening Attack. Mihir Bellare, Brent Waters, Scott Yilek |
| 2011 | Impossibility of Blind Signatures from One-Way Permutations. Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich |
| 2011 | Input Locality and Hardness Amplification. Andrej Bogdanov, Alon Rosen |
| 2011 | Limits of Computational Differential Privacy in the Client/Server Setting. Adam Groce, Jonathan Katz, Arkady Yerukhimovich |
| 2011 | Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions. Zvika Brakerski, Jonathan Katz, Gil Segev, Arkady Yerukhimovich |
| 2011 | Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators. Josh Bronson, Ali Juma, Periklis A. Papakonstantinou |
| 2011 | On Black-Box Separations among Injective One-Way Functions. Takahiro Matsuda, Kanta Matsuura |
| 2011 | On the Black-Box Complexity of Optimally-Fair Coin Tossing. Dana Dachman-Soled, Yehuda Lindell, Mohammad Mahmoody, Tal Malkin |
| 2011 | On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators. Eric Miles, Emanuele Viola |
| 2011 | One-Time Computable Self-erasing Functions. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs |
| 2011 | PCPs and the Hardness of Generating Private Synthetic Data. Jonathan R. Ullman, Salil P. Vadhan |
| 2011 | Parallel Repetition for Leakage Resilience Amplification Revisited. Abhishek Jain, Krzysztof Pietrzak |
| 2011 | Perfectly Secure Oblivious RAM without Random Oracles. Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen |
| 2011 | Practical Adaptive Oblivious Transfer from Simple Assumptions. Matthew Green, Susan Hohenberger |
| 2011 | Round-Optimal Password-Based Authenticated Key Exchange. Jonathan Katz, Vinod Vaikuntanathan |
| 2011 | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. Yehuda Lindell, Benny Pinkas |
| 2011 | Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma. Stefano Tessaro |
| 2011 | Signatures Resilient to Continual Leakage on Memory and Computation. Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung |
| 2011 | Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings Yuval Ishai |
| 2011 | Tight Bounds for Classical and Quantum Coin Flipping. Esther Hänggi, Jürg Wullschleger |
| 2011 | Towards Non-Black-Box Lower Bounds in Cryptography. Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
| 2011 | Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy. Johannes Gehrke, Edward Lui, Rafael Pass |
| 2011 | Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade |