| 2013 | A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. Kazuhiko Minematsu |
| 2013 | Anonymous Signcryption against Linear Related-Key Attacks. Hui Cui, Yi Mu, Man Ho Au |
| 2013 | Authenticated Key Exchange Protocols Based on Factoring Assumption. Hai Huang |
| 2013 | CIL Security Proof for a Password-Based Key Exchange. Cristian Ene, Clémentine Gritti, Yassine Lakhnech |
| 2013 | Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. Y. Sreenivasa Rao, Ratna Dutta |
| 2013 | Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan |
| 2013 | Factoring-Based Proxy Re-Encryption Schemes. Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka |
| 2013 | How to Remove the Exponent GCD in HK09. Xianhui Lu, Bao Li, Yamin Liu |
| 2013 | Improved Authenticity Bound of EAX, and Refinements. Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata |
| 2013 | Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. Angsuman Das, Sabyasachi Dutta, Avishek Adhikari |
| 2013 | Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges. Ioana Boureanu, Serge Vaudenay |
| 2013 | Non Observability in the Random Oracle Model. Prabhanjan Ananth, Raghav Bhaskar |
| 2013 | On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols. Serge Vaudenay |
| 2013 | Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings Willy Susilo, Reza Reyhanitabar |
| 2013 | RKA Secure PKE Based on the DDH and HR Assumptions. Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei |
| 2013 | The Security of the OCB Mode of Operation without the SPRP Assumption. Kazumaro Aoki, Kan Yasuda |
| 2013 | Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu |
| 2013 | Towards a Secure Certificateless Proxy Re-Encryption Scheme. Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen |
| 2013 | Translation-Randomizable Distributions via Random Walks. Nirattaya Khamsemanan, William E. Skeith III |
| 2013 | k-time Proxy Signature: Formal Definition and Efficient Construction. Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei |