| 2014 | A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols. Martin Kreuzer, Alexey D. Myasnikov, Alexander Ushakov |
| 2014 | A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai |
| 2014 | Activity Spoofing and Its Defense in Android Smartphones. Brett Cooley, Haining Wang, Angelos Stavrou |
| 2014 | All-but-One Dual Projective Hashing and Its Applications. Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao |
| 2014 | Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings Ioana Boureanu, Philippe Owesarski, Serge Vaudenay |
| 2014 | Automatic Protocol Selection in Secure Two-Party Computations. Florian Kerschbaum, Thomas Schneider, Axel Schröpfer |
| 2014 | BackRef: Accountability in Anonymous Communication Networks. Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel |
| 2014 | Bit-Flip Faults on Elliptic Curve Base Fields, Revisited. Taechan Kim, Mehdi Tibouchi |
| 2014 | Certified Bitcoins. Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros |
| 2014 | Delegating a Pairing Can Be Both Secure and Efficient. Sébastien Canard, Julien Devigne, Olivier Sanders |
| 2014 | Detecting Hidden Leakages. Amir Moradi, Sylvain Guilley, Annelie Heuser |
| 2014 | Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu |
| 2014 | Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. Franziskus Kiefer, Mark Manulis |
| 2014 | Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. Sabyasachi Karati, Abhijit Das |
| 2014 | Fragmentation Considered Leaking: Port Inference for DNS Poisoning. Haya Schulmann, Michael Waidner |
| 2014 | Improved Constructions of PRFs Secure Against Related-Key Attacks. Kevin Lewi, Hart William Montgomery, Ananth Raghunathan |
| 2014 | Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li |
| 2014 | Improving Intrusion Detection Systems for Wireless Sensor Networks. Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík |
| 2014 | Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. Jia Xu, Jianying Zhou |
| 2014 | Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. Yu Sasaki |
| 2014 | MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. Zhe Liu, Erich Wenger, Johann Großschädl |
| 2014 | New Modular Compilers for Authenticated Key Exchange. Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk |
| 2014 | New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. Yao Lu, Rui Zhang, Dongdai Lin |
| 2014 | On Updatable Redactable Signatures. Henrich Christopher Pöhls, Kai Samelin |
| 2014 | On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. Céline Blondeau, Andrey Bogdanov, Meiqin Wang |
| 2014 | Partial Key Exposure Attacks on Takagi's Variant of RSA. Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie |
| 2014 | Password-Based Authenticated Key Exchange without Centralized Trusted Setup. Kazuki Yoneyama |
| 2014 | Polymorphism as a Defense for Automated Attack of Websites. Xinran Wang, Tadayoshi Kohno, Bob Blakley |
| 2014 | Practical Signatures from the Partial Fourier Recovery Problem. Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte |
| 2014 | Private Message Transmission Using Disjoint Paths. Hadi Ahmadi, Reihaneh Safavi-Naini |
| 2014 | Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions. Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta |
| 2014 | Sakura: A Flexible Coding for Tree Hashing. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche |
| 2014 | Verifiable Multi-server Private Information Retrieval. Liang Feng Zhang, Reihaneh Safavi-Naini |
| 2014 | WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin |