| 2014 | A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing. Himanshu Tyagi, Shun Watanabe |
| 2014 | A Full Characterization of Completeness for Two-Party Randomized Function Evaluation. Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai |
| 2014 | A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé |
| 2014 | Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings Phong Q. Nguyen, Elisabeth Oswald |
| 2014 | Distributed Point Functions and Their Applications. Niv Gilboa, Yuval Ishai |
| 2014 | Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More. Nuttapong Attrapadung |
| 2014 | Déjà Q: Using Dual Systems to Revisit q-Type Assumptions. Melissa Chase, Sarah Meiklejohn |
| 2014 | Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs |
| 2014 | Efficient Round Optimal Blind Signatures. Sanjam Garg, Divya Gupta |
| 2014 | Faster Compact Diffie-Hellman: Endomorphisms on the x-line. Craig Costello, Hüseyin Hisil, Benjamin Smith |
| 2014 | Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy |
| 2014 | GGHLite: More Efficient Multilinear Maps from Ideal Lattices. Adeline Langlois, Damien Stehlé, Ron Steinfeld |
| 2014 | Garbled RAM Revisited. Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs |
| 2014 | Generic Universal Forgery Attack on Iterative Hash-Based MACs. Thomas Peyrin, Lei Wang |
| 2014 | Higher Order Masking of Look-Up Tables. Jean-Sébastien Coron |
| 2014 | Honey Encryption: Security Beyond the Brute-Force Bound. Ari Juels, Thomas Ristenpart |
| 2014 | How to Certify the Leakage of a Chip? François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon |
| 2014 | Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao |
| 2014 | Key Derivation without Entropy Waste. Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs |
| 2014 | Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig. Mihir Bellare, Sarah Meiklejohn, Susan Thomson |
| 2014 | Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. Céline Blondeau, Kaisa Nyberg |
| 2014 | Multi-input Functional Encryption. Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou |
| 2014 | Non-Interactive Secure Computation Based on Cut-and-Choose. Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva |
| 2014 | Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. Benoît Libert, Thomas Peters, Marc Joye, Moti Yung |
| 2014 | On the Complexity of UC Commitments. Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee |
| 2014 | Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. Kazuhiko Minematsu |
| 2014 | Polynomial Time Attack on Wild McEliece over Quadratic Extensions. Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich |
| 2014 | Protecting Obfuscation against Algebraic Attacks. Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai |
| 2014 | Reconsidering Generic Composition. Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton |
| 2014 | Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation. Susan Hohenberger, Amit Sahai, Brent Waters |
| 2014 | Revocable Quantum Timed-Release Encryption. Dominique Unruh |
| 2014 | Salvaging Indifferentiability in a Multi-stage Setting. Arno Mittelbach |
| 2014 | Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time. Ben Morris, Phillip Rogaway |
| 2014 | Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus. Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse |
| 2014 | The Locality of Searchable Symmetric Encryption. David Cash, Stefano Tessaro |
| 2014 | Tight Security Bounds for Key-Alternating Ciphers. Shan Chen, John P. Steinberger |
| 2014 | Unifying Leakage Models: From Probing Attacks to Noisy Leakage. Alexandre Duc, Stefan Dziembowski, Sebastian Faust |
| 2014 | Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption. Morten Dahl, Ivan Damgård |
| 2014 | Why Proving HIBE Systems Secure Is Difficult. Allison B. Lewko, Brent Waters |