| 2012 | A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu |
| 2012 | A Simple Key-Recovery Attack on McOE-X. Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser |
| 2012 | Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in Orestis Tsigkas, Dimitrios Tzovaras |
| 2012 | Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
| 2012 | Attacking Animated CAPTCHAs via Character Extraction. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
| 2012 | Biclique Cryptanalysis of TWINE. Mustafa Çoban, Ferhat Karakoç, Özkan Boztas |
| 2012 | Conditional Differential Cryptanalysis of Grain-128a. Michael Lehmann, Willi Meier |
| 2012 | Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. Jun Xu, Lei Hu, Siwei Sun, Ping Wang |
| 2012 | Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis |
| 2012 | Differential and Linear Attacks on the Full WIDEA- Jorge Nakahara Jr. |
| 2012 | Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa |
| 2012 | Fast and Private Computation of Cardinality of Set Intersection and Union. Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik |
| 2012 | Fast and Secure Root Finding for Code-Based Cryptosystems. Falko Strenzke |
| 2012 | Firm Grip Handshakes: A Tool for Bidirectional Vouching. Omer Berkman, Benny Pinkas, Moti Yung |
| 2012 | Fixed Points of Special Type and Cryptanalysis of Full GOST. Orhun Kara, Ferhat Karakoç |
| 2012 | Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona |
| 2012 | How to Enhance the Security on the Least Significant Bit. Atsuko Miyaji, Yiren Mo |
| 2012 | Improved Linear Analysis on Block Cipher MULTI2. Yi Lu, Liping Ding, Yongji Wang |
| 2012 | Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions. Mansoor Ahmed Khan, Ferruh Özbudak |
| 2012 | LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede |
| 2012 | Mobile Evil Twin Malnets - The Worst of Both Worlds. Christian Szongott, Benjamin Henne, Matthew Smith |
| 2012 | Some Representations of the S-Box of Camellia in Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores |
| 2012 | Strong Privacy for RFID Systems from Plaintext-Aware Encryption. Khaled Ouafi, Serge Vaudenay |