What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 2011
Year
Venue
Title
2011
CRYPTO
$1/p$-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
📺
Amos Beimel
Yehuda Lindell
Eran Omri
Ilan Orlov
2011
CRYPTO
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
📺
Carolyn Whitnall
Elisabeth Oswald
2011
CRYPTO
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
📺
Gregor Leander
Mohamed Ahmed Abdelraheem
Hoda AlKhzaimi
Erik Zenner
2011
CRYPTO
A New Variant of PMAC: Beyond the Birthday Bound
📺
Kan Yasuda
2011
CRYPTO
Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
Phillip Rogaway
2011
CRYPTO
Analyzing Blockwise Lattice Algorithms using Dynamical Systems
📺
Guillaume Hanrot
Xavier Pujol
Damien Stehlé
2011
CRYPTO
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
📺
Mihir Bellare
Sriram Keelveedhi
2011
CRYPTO
Automatic Search of Attacks on Round-Reduced AES and Applications
📺
Charles Bouillaguet
Patrick Derbez
Pierre-Alain Fouque
2011
CRYPTO
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Zvika Brakerski
Gil Segev
2011
CRYPTO
Bi-Deniable Public-Key Encryption
📺
Adam O'Neill
Chris Peikert
Brent Waters
2011
CRYPTO
Classical Cryptographic Protocols in a Quantum World
📺
Sean Hallgren
Adam Smith
Fang Song
2011
CRYPTO
Computer-Aided Security Proofs for the Working Cryptographer
📺
★
Best Paper
Gilles Barthe
Benjamin Grégoire
Sylvain Heraud
Santiago Zanella-Béguelin
2011
CRYPTO
Constant-Rate Oblivious Transfer from Noisy Channels
📺
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Manoj Prabhakaran
Amit Sahai
Jürg Wullschleger
2011
CRYPTO
Cryptography with Tamperable and Leaky Memory
📺
Yael Tauman Kalai
Bhavana Kanukurthi
Amit Sahai
2011
CRYPTO
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
Zvika Brakerski
Vinod Vaikuntanathan
2011
CRYPTO
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
📺
David Naccache
Jean-Sébastien Coron
Avradip Mandal
Mehdi Tibouchi
2011
CRYPTO
Generic Side-Channel Distinguishers: Improvements and Limitations
📺
Nicolas Veyrat-Charvillon
François-Xavier Standaert
2011
CRYPTO
How to Improve Rebound Attacks
María Naya-Plasencia
2011
CRYPTO
Inverting HFE Systems is Quasi-Polynomial for All Fields
📺
Jintai Ding
Timothy Hodges
2011
CRYPTO
Key-Evolution Schemes Resilient to Space-Bounded Leakage
Stefan Dziembowski
Tomasz Kazana
Daniel Wichs
2011
CRYPTO
Leakage-Resilient Zero Knowledge
📺
Sanjam Garg
Abhishek Jain
Amit Sahai
2011
CRYPTO
Leftover Hash Lemma, Revisited
📺
Boaz Barak
Yevgeniy Dodis
Hugo Krawczyk
Olivier Pereira
Krzysztof Pietrzak
François-Xavier Standaert
Yu Yu
2011
CRYPTO
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks
📺
Hang Dinh
Cristopher Moore
Alexander Russell
2011
CRYPTO
Memory Delegation
📺
Kai-Min Chung
Yael Tauman Kalai
Feng-Hao Liu
Ran Raz
2011
CRYPTO
Merkle Puzzles in a Quantum World
📺
Gilles Brassard
Peter Høyer
Kassem Kalach
Marc Kaplan
Sophie Laplante
Louis Salvail
2011
CRYPTO
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
📺
Masayuki Abe
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2011
CRYPTO
Optimal Verification of Operations on Dynamic Sets
📺
Charalampos Papamanthou
Roberto Tamassia
Nikos Triandopoulos
2011
CRYPTO
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
📺
Alexandra Boldyreva
Nathan Chenette
Adam O'Neill
2011
CRYPTO
Perfectly-Secure Multiplication for any t<n/3
📺
Gilad Asharov
Yehuda Lindell
Tal Rabin
2011
CRYPTO
Physically Uncloneable Functions in the Universal Composition Framework
📺
Chris Brzuska
Marc Fischlin
Heike Schröder
Stefan Katzenbeisser
2011
CRYPTO
Position-Based Quantum Cryptography: Impossibility and Constructions
📺
Harry Buhrman
Nishanth Chandran
Serge Fehr
Ran Gelles
Vipul Goyal
Rafail Ostrovsky
Christian Schaffner
2011
CRYPTO
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions
Daniele Micciancio
Petros Mol
2011
CRYPTO
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
📺
Koichi Sakumoto
Taizo Shirai
Harunaga Hiwatari
2011
CRYPTO
Random Oracle Reducibility
📺
Paul Baecher
Marc Fischlin
2011
CRYPTO
Round Optimal Blind Signatures in the Standard Model
📺
Sanjam Garg
Vanishree Rao
Amit Sahai
Dominique Schröder
Dominique Unruh
2011
CRYPTO
Secure Computation on the Web: Computing without Simultaneous Interaction
📺
Shai Halevi
Yehuda Lindell
Benny Pinkas
2011
CRYPTO
Smaller Decoding Exponents: Ball-Collision Decoding
📺
Daniel J. Bernstein
Tanja Lange
Christiane Peters
2011
CRYPTO
The Collision Security of Tandem-DM in the Ideal Cipher Model
📺
Joojoung Lee
Martijn Stam
John P. Steinberger
2011
CRYPTO
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
📺
Yehuda Lindell
Eli Oxman
Benny Pinkas
2011
CRYPTO
The PHOTON Family of Lightweight Hash Functions
📺
Jian Guo
Thomas Peyrin
Axel Poschmann
2011
CRYPTO
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing
📺
Ignacio Cascudo
Ronald Cramer
Chaoping Xing
2011
CRYPTO
Time-Lock Puzzles in the Random Oracle Model
📺
Mohammad Mahmoody
Tal Moran
Salil P. Vadhan
2011
CRYPTO
Tor and Circumvention: Lessons Learned
📺
★
Invited paper
Roger Dingledine
2011
CRYPTO
Verifiable Delegation of Computation over Large Datasets
📺
Siavosh Benabbas
Rosario Gennaro
Yevgeniy Vahlis