| 2015 | Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers Carlos Cid, Christian Rechberger |
| 2014 | APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda |
| 2014 | Branching Heuristics in Differential Collision Search with Applications to SHA-512. Maria Eichlseder, Florian Mendel, Martin Schläffer |
| 2014 | CLOC: Authenticated Encryption for Short Input. Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka |
| 2014 | COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda |
| 2014 | Collision Attack on 5 Rounds of Grøstl. Florian Mendel, Vincent Rijmen, Martin Schläffer |
| 2014 | Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. Léo Perrin, Dmitry Khovratovich |
| 2014 | Cryptanalysis of FIDES. Itai Dinur, Jérémy Jean |
| 2014 | Cryptanalysis of KLEIN. Virginie Lallemand, María Naya-Plasencia |
| 2014 | Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar |
| 2014 | Differential Analysis of Block Ciphers SIMON and SPECK. Alex Biryukov, Arnab Roy, Vesselin Velichkov |
| 2014 | Differential Cryptanalysis of Round-Reduced Simon and Speck. Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel |
| 2014 | Differential-Linear Cryptanalysis Revisited. Céline Blondeau, Gregor Leander, Kaisa Nyberg |
| 2014 | Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes. Daniel Augot, Matthieu Finiasz |
| 2014 | Efficient Fuzzy Search on Encrypted Data. Alexandra Boldyreva, Nathan Chenette |
| 2014 | Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen |
| 2014 | Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. Tetsu Iwata, Lei Wang |
| 2014 | Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. Takanori Isobe, Kyoji Shibutani |
| 2014 | Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir |
| 2014 | Improved Single-Key Attacks on 9-Round AES-192/256. Leibo Li, Keting Jia, Xiaoyun Wang |
| 2014 | Improved Slender-Set Linear Cryptanalysis. Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi |
| 2014 | LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici |
| 2014 | Match Box Meet-in-the-Middle Attack Against KATAN. Thomas Fuhr, Brice Minaud |
| 2014 | Multiple Differential Cryptanalysis of Round-Reduced PRINCE. Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard |
| 2014 | On the Minimum Number of Multiplications Necessary for Universal Hash Functions. Mridul Nandi |
| 2014 | Pipelineable On-line Encryption. Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel |
| 2014 | Plaintext Recovery Attacks Against WPA/TKIP. Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt |
| 2014 | Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro. Hadi Soleimany |
| 2014 | SPRING: Fast Pseudorandom Functions from Rounded Ring Products. Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen |
| 2014 | Security Analysis of Key-Alternating Feistel Ciphers. Rodolphe Lampe, Yannick Seurin |
| 2014 | The Indistinguishability of the XOR of k Permutations. Benoit Cogliati, Rodolphe Lampe, Jacques Patarin |
| 2014 | The Related-Key Analysis of Feistel Constructions. Manuel Barbosa, Pooya Farshim |