| 2013 | A Toolkit for Ring-LWE Cryptography. Vadim Lyubashevsky, Chris Peikert, Oded Regev |
| 2013 | Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings Thomas Johansson, Phong Q. Nguyen |
| 2013 | Amplification of Chosen-Ciphertext Security. Huijia Lin, Stefano Tessaro |
| 2013 | Batch Fully Homomorphic Encryption over the Integers. Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun |
| 2013 | Candidate Multilinear Maps from Ideal Lattices. Sanjam Garg, Craig Gentry, Shai Halevi |
| 2013 | Circular Chosen-Ciphertext Security with Compact Ciphertexts. Dennis Hofheinz |
| 2013 | Cryptanalysis of Full RIPEMD-128. Franck Landelle, Thomas Peyrin |
| 2013 | Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions. Ananth Raghunathan, Gil Segev, Salil P. Vadhan |
| 2013 | Dynamic Proofs of Retrievability via Oblivious RAM. David Cash, Alptekin Küpçü, Daniel Wichs |
| 2013 | Efficient Cryptosystems from 2 Marc Joye, Benoît Libert |
| 2013 | Fast Cryptography in Genus 2. Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter |
| 2013 | Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields. Antoine Joux |
| 2013 | Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem. Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber |
| 2013 | How to Garble RAM Programs Steve Lu, Rafail Ostrovsky |
| 2013 | How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation. Payman Mohassel, Seyed Saeed Sadeghian |
| 2013 | How to Watermark Cryptographic Functions. Ryo Nishimaki |
| 2013 | Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam |
| 2013 | Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean |
| 2013 | Improving Local Collisions: New Attacks on Reduced SHA-256. Florian Mendel, Tomislav Nad, Martin Schläffer |
| 2013 | Keccak. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche |
| 2013 | Leakage-Resilient Cryptography from Minimal Assumptions. Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs |
| 2013 | Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures. Marc Fischlin, Nils Fleischhacker |
| 2013 | Locally Computable UOWHF with Linear Shrinkage. Benny Applebaum, Yoni Moses |
| 2013 | Lossy Codes and a New Variant of the Learning-With-Errors Problem. Nico Döttling, Jörn Müller-Quade |
| 2013 | Masking against Side-Channel Attacks: A Formal Security Proof. Emmanuel Prouff, Matthieu Rivain |
| 2013 | Message-Locked Encryption and Secure Deduplication. Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart |
| 2013 | MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions. Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi |
| 2013 | Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction. S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee |
| 2013 | New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis. Marc Stevens |
| 2013 | New Links between Differential and Linear Cryptanalysis. Céline Blondeau, Kaisa Nyberg |
| 2013 | On Concurrently Secure Computation in the Multiple Ideal Query Model. Vipul Goyal, Abhishek Jain |
| 2013 | One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games. Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner |
| 2013 | Practical Homomorphic MACs for Arithmetic Circuits. Dario Catalano, Dario Fiore |
| 2013 | Practical Signatures from Standard Assumptions. Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks |
| 2013 | Quadratic Span Programs and Succinct NIZKs without PCPs. Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova |
| 2013 | Quantum-Secure Message Authentication Codes. Dan Boneh, Mark Zhandry |
| 2013 | Regularity of Lossy RSA on Subdomains and Its Applications. Mark Lewko, Adam O'Neill, Adam D. Smith |
| 2013 | Resource-Restricted Indifferentiability. Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer |
| 2013 | Security Evaluations beyond Computing Power. Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert |
| 2013 | Streaming Authenticated Data Structures. Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, Ke Yi |
| 2013 | Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption. Jooyoung Lee |
| 2013 | Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions. Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia |
| 2013 | Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists. Stephanie Bayer, Jens Groth |