| 2013 | Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud |
| 2013 | Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini |
| 2013 | Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. Alexander Wild, Tim Güneysu, Amir Moradi |
| 2013 | BLAKE2: Simpler, Smaller, Fast as MD5. Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein |
| 2013 | Batch Proofs of Partial Knowledge. Ryan Henry, Ian Goldberg |
| 2013 | Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors. Michael Henson, Stephen Taylor |
| 2013 | Client-Controlled Cryptography-as-a-Service in the Cloud. Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi |
| 2013 | CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou |
| 2013 | Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. Aurore Guillevic |
| 2013 | Computing on Authenticated Data for Adjustable Predicates. Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein |
| 2013 | Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng |
| 2013 | CrowdShare: Secure Mobile Resource Sharing. N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle |
| 2013 | Cryptophia's Short Combiner for Collision-Resistant Hash Functions. Arno Mittelbach |
| 2013 | Efficient Signatures of Knowledge and DAA in the Standard Model. David Bernhard, Georg Fuchsbauer, Essam Ghadafi |
| 2013 | Experimental Analysis of Attacks on Next Generation Air Traffic Communication. Matthias Schäfer, Vincent Lenders, Ivan Martinovic |
| 2013 | Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles. Koutarou Suzuki, Kazuki Yoneyama |
| 2013 | FROST - Forensic Recovery of Scrambled Telephones. Tilo Müller, Michael Spreitzenbarth |
| 2013 | Fast and Maliciously Secure Two-Party Computation Using the GPU. Tore Kasper Frederiksen, Jesper Buus Nielsen |
| 2013 | From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. Sven Laur, Riivo Talviste, Jan Willemson |
| 2013 | Generic Attacks for the Xor of k Random Permutations. Jacques Patarin |
| 2013 | Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography. Erich Wenger |
| 2013 | How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. Rikke Bendlin, Sara Krehbiel, Chris Peikert |
| 2013 | Keystroke Timing Analysis of on-the-fly Web Apps. Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang |
| 2013 | Launching Generic Attacks on iOS with Approved Third-Party Applications. Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou |
| 2013 | Leakage Resilient IBE and IPE under the DLIN Assumption. Kaoru Kurosawa, Le Trieu Phong |
| 2013 | NEON Implementation of an Attribute-Based Encryption Scheme. Ana Helena Sánchez, Francisco Rodríguez-Henríquez |
| 2013 | Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. Yu Sasaki |
| 2013 | Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. Sonia Bogos, Ioana Boureanu, Serge Vaudenay |
| 2013 | Private Database Queries Using Somewhat Homomorphic Encryption. Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu |
| 2013 | Public Key Exchange Using Semidirect Product of (Semi)Groups. Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain |
| 2013 | Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora |
| 2013 | Sequential Aggregate Signatures Made Shorter. Kwangsu Lee, Dong Hoon Lee, Moti Yung |
| 2013 | Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. Marc Fischlin, Cristina Onete |
| 2013 | Toward Practical Group Encryption. Laila El Aimani, Marc Joye |
| 2013 | Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract). Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky |
| 2013 | Transparent, Distributed, and Replicated Dynamic Provable Data Possession. Mohammad Etemad, Alptekin Küpçü |