| 2014 | A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups. Alexander May, Ilya Ozerov |
| 2014 | An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X. Eli Biham, Yaniv Carmeli |
| 2014 | Batch NFS. Daniel J. Bernstein, Tanja Lange |
| 2014 | Binary Elligator Squared. Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz |
| 2014 | Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede |
| 2014 | Colliding Keys for SC2000-256. Alex Biryukov, Ivica Nikolic |
| 2014 | Differential Cryptanalysis of SipHash. Christoph Dobraunig, Florian Mendel, Martin Schläffer |
| 2014 | Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. Daniel Augot, Pierre-Alain Fouque, Pierre Karpman |
| 2014 | Error-Tolerant Side-Channel Cube Attack Revisited. Zhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan |
| 2014 | Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation. Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez |
| 2014 | Faster Binary-Field Multiplication and Faster Binary-Field MACs. Daniel J. Bernstein, Tung Chou |
| 2014 | Improved Differential Cryptanalysis of Round-Reduced Speck. Itai Dinur |
| 2014 | Linear Biases in AEGIS Keystream. Brice Minaud |
| 2014 | Malicious Hashing: Eve's Variant of SHA-1. Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer |
| 2014 | OMD: A Compression Function Mode of Operation for Authenticated Encryption. Simon Cogliani, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay, Damian Vizár |
| 2014 | Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. Atsushi Takayasu, Noboru Kunihiro |
| 2014 | Practical Cryptanalysis of PAES. Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang |
| 2014 | Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results. Benoit Cogliati, Jacques Patarin, Yannick Seurin |
| 2014 | Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers Antoine Joux, Amr M. Youssef |
| 2014 | Side-Channel Analysis of Montgomery's Representation Randomization. Éliane Jaulmes, Emmanuel Prouff, Justine Wild |
| 2014 | Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA Cluster. Erich Wenger, Paul Wolfger |
| 2014 | The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang |
| 2014 | Weak Instances of PLWE. Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter |