| 2014 | 2-Pass Key Exchange Protocols from CPA-Secure KEM. Kaoru Kurosawa, Jun Furukawa |
| 2014 | A Generic View on Trace-and-Revoke Broadcast Encryption Schemes. Dennis Hofheinz, Christoph Striecks |
| 2014 | An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta |
| 2014 | An Improved Compression Technique for Signatures Based on Learning with Errors. Shi Bai, Steven D. Galbraith |
| 2014 | Analysis of BLAKE2. Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu |
| 2014 | Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. Jeroen Delvaux, Ingrid Verbauwhede |
| 2014 | Automatic Search for Differential Trails in ARX Ciphers. Alex Biryukov, Vesselin Velichkov |
| 2014 | Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation. Markku-Juhani O. Saarinen |
| 2014 | Broadcast Steganography. Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera |
| 2014 | CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions. Markku-Juhani O. Saarinen |
| 2014 | Decentralized Traceable Attribute-Based Signatures. Ali El Kaafarani, Essam Ghadafi, Dalia Khader |
| 2014 | Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves. Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez |
| 2014 | Group Signatures with Message-Dependent Opening in the Standard Model. Benoît Libert, Marc Joye |
| 2014 | Hardware Implementation and Side-Channel Analysis of Lapin. Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert |
| 2014 | KDM Security in the Hybrid Framework. Gareth T. Davies, Martijn Stam |
| 2014 | Key Wrapping with a Fixed Permutation. Dmitry Khovratovich |
| 2014 | On Double Exponentiation for Securing RSA against Fault Analysis. Duc-Phong Le, Matthieu Rivain, Chik How Tan |
| 2014 | On Increasing the Throughput of Stream Ciphers. Frederik Armknecht, Vasily Mikhalev |
| 2014 | On the Practical Security of a Leakage Resilient Masking Scheme. Emmanuel Prouff, Matthieu Rivain, Thomas Roche |
| 2014 | P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. Qiong Huang, Duncan S. Wong, Willy Susilo |
| 2014 | Practical Collision Attack on 40-Step RIPEMD-128. Gaoli Wang |
| 2014 | Practical Distributed Signatures in the Standard Model. Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu |
| 2014 | Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang |
| 2014 | Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters |
| 2014 | The Myth of Generic DPA...and the Magic of Learning. Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert |
| 2014 | Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings Josh Benaloh |