| 2014 | Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers Tanja Lange, Kristin E. Lauter, Petr Lisonek |
| 2013 | A Group Action on ℤ Jung Hee Cheon, Taechan Kim, Yong Soo Song |
| 2013 | A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p. Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing |
| 2013 | A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic. Antoine Joux |
| 2013 | A Three-Level Sieve Algorithm for the Shortest Vector Problem. Feng Zhang, Yanbin Pan, Gengran Hu |
| 2013 | AEGIS: A Fast Authenticated Encryption Algorithm. Hongjun Wu, Bart Preneel |
| 2013 | Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers. Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden |
| 2013 | Exponentiating in Pairing Groups. Joppe W. Bos, Craig Costello, Michael Naehrig |
| 2013 | Extended Generalized Feistel Networks Using Matrix Representation. Thierry P. Berger, Marine Minier, Gaël Thomas |
| 2013 | Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang |
| 2013 | Faster Hash-Based Signatures with Bounded Leakage. Thomas Eisenbarth, Ingo von Maurich, Xin Ye |
| 2013 | Faster Repeated Doublings on Binary Elliptic Curves. Christophe Doche, Daniel Sutantyo |
| 2013 | High Precision Discrete Gaussian Sampling on FPGAs. Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede |
| 2013 | Horizontal Collision Correlation Attack on Elliptic Curves. Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild |
| 2013 | How to Recover Any Byte of Plaintext on RC4. Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii |
| 2013 | Implementing Lightweight Block Ciphers on x86 Architectures. Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin |
| 2013 | Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Yu Sasaki, Lei Wang |
| 2013 | Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. Rachid El Bansarkhani, Johannes Buchmann |
| 2013 | Montgomery Multiplication Using Vector Instructions. Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha |
| 2013 | Multiple Limited-Birthday Distinguishers and Applications. Jérémy Jean, María Naya-Plasencia, Thomas Peyrin |
| 2013 | Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes. Kevin J. Henry, Maura B. Paterson, Douglas R. Stinson |
| 2013 | Provable Second Preimage Resistance Revisited. Charles Bouillaguet, Bastien Vayssière |
| 2013 | Solving a 6120 -bit DLP on a Desktop Computer. Faruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel |
| 2013 | The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. Dmitry Khovratovich, Christian Rechberger |
| 2013 | The Realm of the Pairings. Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini |
| 2013 | Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware. Thomas Pöppelmann, Tim Güneysu |
| 2013 | Two Attacks on a White-Box AES Implementation. Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel |
| 2013 | When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. David F. Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar |
| 2013 | White-Box Security Notions for Symmetric Encryption Schemes. Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain |
| 2013 | Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard |