| 2013 | A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy. Michal Hojsík, Veronika Pulpánová |
| 2013 | A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption. Yannick Seurin, Joana Treger |
| 2013 | Accountable Authority Identity-Based Encryption with Public Traceability. Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng |
| 2013 | Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag. Thomas Korak, Thomas Plos |
| 2013 | Asynchronous Computational VSS with Reduced Communication Complexity. Michael Backes, Amit Datta, Aniket Kate |
| 2013 | Collisions for the WIDEA-8 Compression Function. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici |
| 2013 | Cryptanalytic Attacks on MIFARE Classic Protocol. Jovan Dj. Golic |
| 2013 | Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption. Jae Hong Seo, Keita Emura |
| 2013 | Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. Shengli Liu, Jian Weng, Yunlei Zhao |
| 2013 | Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser |
| 2013 | Fair Exchange of Short Signatures without Trusted Third Party. Philippe Camacho |
| 2013 | Finding Collisions for Round-Reduced SM3. Florian Mendel, Tomislav Nad, Martin Schläffer |
| 2013 | Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang |
| 2013 | Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild |
| 2013 | Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures. Stanislav Bulygin, Michael Walter, Johannes Buchmann |
| 2013 | Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness. Yu Yu, François-Xavier Standaert |
| 2013 | Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012. Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka |
| 2013 | Randomized Partial Checking Revisited. Shahram Khazaei, Douglas Wikström |
| 2013 | Randomly Failed! The State of Randomness in Current Java Implementations. Kai Michaelis, Christopher Meyer, Jörg Schwenk |
| 2013 | Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering |
| 2013 | Solving BDD by Enumeration: An Update. Mingjie Liu, Phong Q. Nguyen |
| 2013 | The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users. Mike Bond, George French, Nigel P. Smart, Gaven J. Watson |
| 2013 | The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. Karyn Benson, Hovav Shacham, Brent Waters |
| 2013 | Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. Cyril Arnaud, Pierre-Alain Fouque |
| 2013 | Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings Ed Dawson |
| 2013 | Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. Jiqiang Lu, Wun-She Yap, Yongzhuang Wei |