| 2013 | A Cookbook for Black-Box Separations and a Recipe for UOWHFs. Kfir Barhum, Thomas Holenstein |
| 2013 | A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It. Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia |
| 2013 | A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. Gilad Asharov, Yehuda Lindell, Tal Rabin |
| 2013 | Algebraic (Trapdoor) One-Way Functions and Their Applications. Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis |
| 2013 | Analyzing Graphs with Node Differential Privacy. Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith |
| 2013 | Attribute-Based Functional Encryption on Lattices. Xavier Boyen |
| 2013 | Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. Steven A. Myers, Mona Sergi, Abhi Shelat |
| 2013 | Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities. R. Amzi Jeffs, Mike Rosulek |
| 2013 | Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting. Elette Boyle, Shafi Goldwasser, Stefano Tessaro |
| 2013 | Computational Soundness of Coinductive Symbolic Security under Active Attacks. Mohammad Hajiabadi, Bruce M. Kapron |
| 2013 | Concurrent Zero Knowledge in the Bounded Player Model. Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti |
| 2013 | Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing. Ivan Damgård, Sarah Zakarias |
| 2013 | Cryptographic Hardness of Random Local Functions-Survey. Benny Applebaum |
| 2013 | Distributed Oblivious RAM for Secure Two-Party Computation. Steve Lu, Rafail Ostrovsky |
| 2013 | Encrypted Messages from the Heights of Cryptomania. Craig Gentry |
| 2013 | Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. David Xiao |
| 2013 | Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs. Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth |
| 2013 | Feasibility and Completeness of Cryptographic Tasks in the Quantum World. Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas |
| 2013 | Garbling XOR Gates "For Free" in the Standard Model. Benny Applebaum |
| 2013 | Hardness Preserving Reductions via Cuckoo Hashing. Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor |
| 2013 | Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens. Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges |
| 2013 | Languages with Efficient Zero-Knowledge PCPs are in SZK. Mohammad Mahmoody, David Xiao |
| 2013 | Limits on the Usefulness of Random Oracles. Iftach Haitner, Eran Omri, Hila Zarosim |
| 2013 | Multi-Client Non-interactive Verifiable Computation. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid |
| 2013 | On the (In)security of Fischlin's Paradigm. Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao |
| 2013 | On the Circular Security of Bit-Encryption. Ron Rothblum |
| 2013 | On the Feasibility of Extending Oblivious Transfer. Yehuda Lindell, Hila Zarosim |
| 2013 | On the Power of Correlated Randomness in Secure Computation. Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, Anat Paskin-Cherniavsky |
| 2013 | Overcoming Weak Expectations. Yevgeniy Dodis, Yu Yu |
| 2013 | Public-Coin Concurrent Zero-Knowledge in the Global Hash Model. Ran Canetti, Huijia Lin, Omer Paneth |
| 2013 | Randomness-Dependent Message Security. Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang |
| 2013 | Revisiting Lower and Upper Bounds for Selective Decommitments. Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti |
| 2013 | Secure Computation for Big Data. Tal Malkin |
| 2013 | Signatures of Correct Computation. Charalampos Papamanthou, Elaine Shi, Roberto Tamassia |
| 2013 | Succinct Malleable NIZKs and an Application to Compact Shuffles. Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
| 2013 | Succinct Non-interactive Arguments via Linear Interactive Proofs. Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth |
| 2013 | Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy. Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta |
| 2013 | Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings Amit Sahai |
| 2013 | Universally Composable Synchronous Computation. Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas |
| 2013 | Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments. Rafael Pass |
| 2013 | When Homomorphism Becomes a Liability. Zvika Brakerski |
| 2013 | Why "Fiat-Shamir for Proofs" Lacks a Proof. Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs |