| 2014 | A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. Shoichi Hirose, Hidenori Kuwakado |
| 2014 | A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. Jiageng Chen, Atsuko Miyaji, Chunhua Su |
| 2014 | A Short Fail-Stop Signature Scheme from Factoring. Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto |
| 2014 | Adaptive versus Static Security in the UC Model. Ivan Damgård, Jesper Buus Nielsen |
| 2014 | Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Tapas Pandit, Sumit Kumar Pandey, Rana Barua |
| 2014 | Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu |
| 2014 | Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. Kazuki Yoneyama, Goichiro Hanaoka |
| 2014 | Complete Robustness in Identity-Based Encryption. Hui Cui, Yi Mu, Man Ho Au |
| 2014 | Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols. Kazuki Yoneyama |
| 2014 | Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li |
| 2014 | Constructing Subspace Membership Encryption through Inner Product Encryption. Shuichi Katsumata, Noboru Kunihiro |
| 2014 | Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. Lukasz Krzywiecki |
| 2014 | Efficient (Anonymous) Compact HIBE from Standard Assumptions. Somindu C. Ramanna, Palash Sarkar |
| 2014 | Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. Nilanjan Datta, Mridul Nandi |
| 2014 | Fine-Grained Conditional Proxy Re-Encryption and Application. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai |
| 2014 | Forward-Secure Sequential Aggregate Message Authentication Revisited. Shoichi Hirose, Hidenori Kuwakado |
| 2014 | Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. Yuyu Wang, Keisuke Tanaka |
| 2014 | How to Use Pseudorandom Generators in Unconditional Security Settings. Koji Nuida |
| 2014 | Impossibility of Surjective Icart-Like Encodings. Mehdi Tibouchi |
| 2014 | Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. Haiyang Xue, Xianhui Lu, Bao Li, Yamin Liu |
| 2014 | Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. Reza Reyhanitabar, Serge Vaudenay, Damian Vizár |
| 2014 | On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen |
| 2014 | Password-Based Authenticated Key Exchange: An Overview. Michel Abdalla |
| 2014 | Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu |
| 2014 | RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang |
| 2014 | Timed-Release Computational Secret Sharing Scheme and Its Applications. Yohei Watanabe, Junji Shikata |
| 2014 | Verifiable Computation in Multiparty Protocols with Honest Majority. Peeter Laud, Alisa Pankova |