| 2014 | Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers Shiho Moriai |
| 2013 | A Framework for Automated Independent-Biclique Cryptanalysis. Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel |
| 2013 | A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. Ruilin Li, Heng Li, Chao Li, Bing Sun |
| 2013 | A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox. Christina Boura, Anne Canteaut |
| 2013 | ALE: AES-Based Lightweight Authenticated Encryption. Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser |
| 2013 | Attacks and Security Proofs of EAX-Prime. Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata |
| 2013 | Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. Itai Dinur, Orr Dunkelman, Adi Shamir |
| 2013 | Complementing Feistel Ciphers. Alex Biryukov, Ivica Nikolic |
| 2013 | Cryptanalysis of Round-Reduced \mathttLED. Ivica Nikolic, Lei Wang, Shuang Wu |
| 2013 | Cryptanalysis of WIDEA. Gaëtan Leurent |
| 2013 | Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. Patrick Derbez, Pierre-Alain Fouque |
| 2013 | Full Plaintext Recovery Attack on Broadcast RC4. Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii |
| 2013 | Higher-Order Side Channel Security and Mask Refreshing. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche |
| 2013 | Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. Pierre-Alain Fouque, Thomas Vannet |
| 2013 | Masking Tables - An Underestimated Security Risk. Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald |
| 2013 | Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller. Mitsuru Matsui, Yumiko Murakami |
| 2013 | Near Collision Attack on the Grain v1 Stream Cipher. Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin |
| 2013 | On Symmetric Encryption with Distinguishable Decryption Failures. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam |
| 2013 | On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. Gordon Procter, Carlos Cid |
| 2013 | On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. Andrey Bogdanov, Elmar Tischhauser |
| 2013 | Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. Hongbo Yu, Jiazhe Chen, Xiaoyun Wang |
| 2013 | Reflection Cryptanalysis of PRINCE-Like Ciphers. Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang |
| 2013 | Related-Key Attacks Against Full Hummingbird-2. Markku-Juhani O. Saarinen |
| 2013 | Rotational Cryptanalysis of Round-Reduced Keccak. Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny |
| 2013 | Secure Message Authentication Against Related-Key Attack. Rishiraj Bhattacharyya, Arnab Roy |
| 2013 | Security Analysis of PRINCE. Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu |
| 2013 | Smashing WEP in a Passive Attack. Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
| 2013 | Time-Memory Trade-Offs for Near-Collisions. Gaëtan Leurent |
| 2013 | Towards Secure Distance Bounding. Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay |
| 2013 | Towards Understanding the Known-Key Security of Block Ciphers. Elena Andreeva, Andrey Bogdanov, Bart Mennink |
| 2013 | Tweakable Blockciphers with Asymptotically Optimal Security. Rodolphe Lampe, Yannick Seurin |