| 2012 | 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. Liting Zhang, Wenling Wu, Han Sui, Peng Wang |
| 2012 | A Coding-Theoretic Approach to Recovering Noisy RSA Keys. Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn |
| 2012 | A Mix-Net from Any CCA2 Secure Cryptosystem. Shahram Khazaei, Tal Moran, Douglas Wikström |
| 2012 | A Unified Framework for UC from Only OT. Rafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam |
| 2012 | Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. Mihir Bellare, Viet Tung Hoang, Phillip Rogaway |
| 2012 | Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings Xiaoyun Wang, Kazue Sako |
| 2012 | An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. Rodolphe Lampe, Jacques Patarin, Yannick Seurin |
| 2012 | Analysis of Differential Attacks in ARX Constructions. Gaëtan Leurent |
| 2012 | Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. Dmitry Khovratovich |
| 2012 | Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi |
| 2012 | Calling Out Cheaters: Covert Security with Public Verifiability. Gilad Asharov, Claudio Orlandi |
| 2012 | Certifying RSA. Saqib A. Kakvi, Eike Kiltz, Alexander May |
| 2012 | Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes |
| 2012 | Completeness for Symmetric Two-Party Functionalities - Revisited. Yehuda Lindell, Eran Omri, Hila Zarosim |
| 2012 | Computing on Authenticated Data: New Privacy Definitions and Constructions. Nuttapong Attrapadung, Benoît Libert, Thomas Peters |
| 2012 | Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo |
| 2012 | Differential Analysis of the LED Block Cipher. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici |
| 2012 | Differential Attacks against Stream Cipher ZUC. Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling |
| 2012 | Dual Form Signatures: An Approach for Proving Security from Static Assumptions. Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters |
| 2012 | ECM at Work. Joppe W. Bos, Thorsten Kleinjung |
| 2012 | Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic. Léo Ducas, Phong Q. Nguyen |
| 2012 | Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. Patrick Longa, Francesco Sica |
| 2012 | Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. Tatsuaki Okamoto, Katsuyuki Takashima |
| 2012 | Generic Related-Key Attacks for HMAC. Thomas Peyrin, Yu Sasaki, Lei Wang |
| 2012 | How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. David Bernhard, Olivier Pereira, Bogdan Warinschi |
| 2012 | IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento |
| 2012 | Integral and Multidimensional Linear Distinguishers with Correlation Zero. Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang |
| 2012 | Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu |
| 2012 | Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures. Léo Ducas, Phong Q. Nguyen |
| 2012 | On Polynomial Systems Arising from a Weil Descent. Christophe Petit, Jean-Jacques Quisquater |
| 2012 | On the (Im)possibility of Projecting Property in Prime-Order Setting. Jae Hong Seo |
| 2012 | Optimal Collision Security in Double Block Length Hashing with Single Length Key. Bart Mennink |
| 2012 | Optimal Reductions of Some Decisional Problems to the Rank Problem. Jorge Luis Villar |
| 2012 | PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin |
| 2012 | Pairing-Based Cryptography: Past, Present, and Future. Dan Boneh |
| 2012 | Perfect Algebraic Immune Functions. Meicheng Liu, Yin Zhang, Dongdai Lin |
| 2012 | Provable Security of the Knudsen-Preneel Compression Functions. Jooyoung Lee |
| 2012 | RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. Mihir Bellare, Kenneth G. Paterson, Susan Thomson |
| 2012 | Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract). Kyle Brogle, Sharon Goldberg, Leonid Reyzin |
| 2012 | Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert |
| 2012 | Signature Schemes Secure against Hard-to-Invert Leakage. Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel |
| 2012 | Some Mathematical Mysteries in Lattices. Chuanming Zong |
| 2012 | The Five-Card Trick Can Be Done with Four Cards. Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone |
| 2012 | The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam |
| 2012 | Theory and Practice of a Leakage Resilient Masking Scheme. Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede |
| 2012 | Understanding Adaptivity: Random Systems Revisited. Dimitar Jetchev, Onur Özen, Martijn Stam |