| 2013 | A Code-Based Undeniable Signature Scheme. Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek |
| 2013 | A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. David Galindo, Srinivas Vivek |
| 2013 | Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings. Somindu C. Ramanna, Palash Sarkar |
| 2013 | Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption. Rintaro Nakano, Junji Shikata |
| 2013 | Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings Martijn Stam |
| 2013 | Differential Cryptanalysis of Keccak Variants. Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer |
| 2013 | Efficient Generation of Elementary Sequences. David Gardner, Ana Salagean, Raphael C.-W. Phan |
| 2013 | Estimating Key Sizes for High Dimensional Lattice-Based Systems. Joop van de Pol, Nigel P. Smart |
| 2013 | Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. James McLaughlin, John A. Clark |
| 2013 | Hashing Mode Using a Lightweight Blockcipher. Hidenori Kuwakado, Shoichi Hirose |
| 2013 | High-order Masking by Using Coding Theory and Its Application to AES. Guilhem Castagnos, Soline Renner, Gilles Zémor |
| 2013 | Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig |
| 2013 | Indifferentiability of Double Length Compression Functions. Bart Mennink |
| 2013 | On Minimal and Quasi-minimal Linear Codes. Gérard D. Cohen, Sihem Mesnager, Alain Patey |
| 2013 | On the Homomorphic Computation of Symmetric Cryptographic Primitives. Silvia Mella, Ruggero Susella |
| 2013 | On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption. Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson |
| 2013 | Recovering Private Keys Generated with Weak PRNGs. Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz |
| 2013 | Secure Key Management in the Cloud. Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter |
| 2013 | Security Amplification against Meet-in-the-Middle Attacks Using Whitening. Pierre-Alain Fouque, Pierre Karpman |
| 2013 | Semi-bent Functions from Oval Polynomials. Sihem Mesnager |
| 2013 | Sub-linear Blind Ring Signatures without Random Oracles. Essam Ghadafi |