| 2013 | A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. Tomer Ashur, Orr Dunkelman |
| 2013 | Achieving Correctness in Fair Rational Secret Sharing. Sourya Joyee De, Asim K. Pal |
| 2013 | BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis. Nizar Kheir, Chirine Wolley |
| 2013 | Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab |
| 2013 | Differential Attacks on Generalized Feistel Schemes. Valérie Nachef, Emmanuel Volte, Jacques Patarin |
| 2013 | Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu |
| 2013 | Efficient Modular NIZK Arguments from Shift and Product. Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang |
| 2013 | How to Update Documents Verifiably in Searchable Symmetric Encryption. Kaoru Kurosawa, Yasuhiro Ohtaki |
| 2013 | Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? Si Gao, Hua Chen, Limin Fan |
| 2013 | Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. Liang Feng Zhang, Reihaneh Safavi-Naini |
| 2013 | Resource Access Control in the Facebook Model. Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias |
| 2013 | Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. Bo Zhu, Yin Tan, Guang Gong |
| 2013 | Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. Mihir Bellare, Adam O'Neill |
| 2013 | Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model. Yong Li, Zheng Yang |
| 2013 | Truncated Differential Analysis of Reduced-Round LBlock. Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld |
| 2013 | Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. Veronika Kuchta, Mark Manulis |
| 2013 | Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. Babins Shrestha, Nitesh Saxena, Justin Harrison |
| 2013 | Zero Knowledge Proofs from Ring-LWE. Xiang Xie, Rui Xue, Minqian Wang |
| 2013 | Zero Knowledge with Rubik's Cubes and Non-abelian Groups. Emmanuel Volte, Jacques Patarin, Valérie Nachef |