| 2014 | A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. Matthias Wachs, Martin Schanzenbach, Christian Grothoff |
| 2014 | A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa |
| 2014 | Attribute-Based Signatures with User-Controlled Linkability. Ali El Kaafarani, Liqun Chen, Essam Ghadafi, James H. Davenport |
| 2014 | Bootstrappable Identity-Based Fully Homomorphic Encryption. Michael Clear, Ciaran McGoldrick |
| 2014 | Breaking and Fixing Cryptophia's Short Combiner. Bart Mennink, Bart Preneel |
| 2014 | Converting PKI-Based Authenticated Key Exchange to Identity-Based. Koutarou Suzuki, Kazuki Yoneyama |
| 2014 | Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis |
| 2014 | Decentralized Distributed Data Usage Control. Florian Kelbert, Alexander Pretschner |
| 2014 | Direct Anonymous Attestations with Dependent Basename Opening. Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré |
| 2014 | Efficient Signatures with Tight Real World Security in the Random-Oracle Model. Christoph Bader |
| 2014 | FFT Key Recovery for Integral Attack. Yosuke Todo, Kazumaro Aoki |
| 2014 | Message Extension Attack against Authenticated Encryptions: Application to PANDA. Yu Sasaki, Lei Wang |
| 2014 | Mining API Calls and Permissions for Android Malware Detection. Akanksha Sharma, Subrat Kumar Dash |
| 2014 | More Sparse Families of Pairing-Friendly Elliptic Curves. Georgios Fotiadis, Elisavet Konstantinou |
| 2014 | Negotiating DNSSEC Algorithms over Legacy Proxies. Amir Herzberg, Haya Schulmann |
| 2014 | New Second Preimage Attack Variants against the MD-Structure. Tuomas Kortelainen, Juha Kortelainen |
| 2014 | On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu |
| 2014 | Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. Felix Günther, Mark Manulis, Andreas Peter |
| 2014 | Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva |
| 2014 | Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender. Florian Böhl, Simon Greiner, Patrik Scheidecker |
| 2014 | Proxy Re-encryption with Unforgeable Re-encryption Keys. Hui Guo, Zhenfeng Zhang, Jiang Zhang |
| 2014 | Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa |
| 2014 | Short Comparable Encryption. Jun Furukawa |
| 2014 | Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players. Sourya Joyee De, Sushmita Ruj, Asim K. Pal |
| 2014 | Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers |
| 2014 | Universally Composable Oblivious Transfer Based on a Variant of LPN. Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento |