| 2012 | A New Approach to Practical Active-Secure Two-Party Computation. Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra |
| 2012 | Actively Secure Two-Party Evaluation of Any Quantum Operation. Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail |
| 2012 | Adaptively Secure Multi-Party Computation with Dishonest Majority. Sanjam Garg, Amit Sahai |
| 2012 | Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings Reihaneh Safavi-Naini, Ran Canetti |
| 2012 | An Enciphering Scheme Based on a Card Shuffle. Viet Tung Hoang, Ben Morris, Phillip Rogaway |
| 2012 | Black-Box Constructions of Composable Protocols without Set-Up. Huijia Lin, Rafael Pass |
| 2012 | Breaking and Repairing GCM Security Proofs. Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu |
| 2012 | Collusion-Preserving Computation. Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas |
| 2012 | Crowd-Blending Privacy. Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass |
| 2012 | Differential Privacy with Imperfect Randomness. Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan |
| 2012 | Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. Amit Sahai, Hakan Seyalioglu, Brent Waters |
| 2012 | Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir |
| 2012 | Efficient Padding Oracle Attacks on Cryptographic Hardware. Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay |
| 2012 | Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. Zvika Brakerski |
| 2012 | Functional Encryption for Regular Languages. Brent Waters |
| 2012 | Functional Encryption with Bounded Collusions via Multi-party Computation. Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee |
| 2012 | Group Signatures with Almost-for-Free Revocation. Benoît Libert, Thomas Peters, Moti Yung |
| 2012 | Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves. Alexandre Duc, Dimitar Jetchev |
| 2012 | Hash Functions Based on Three Permutations: A Generic Security Analysis. Bart Mennink, Bart Preneel |
| 2012 | Homomorphic Evaluation of the AES Circuit. Craig Gentry, Shai Halevi, Nigel P. Smart |
| 2012 | How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware. Guy N. Rothblum |
| 2012 | Impossibility Results for Static Input Secure Computation. Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti |
| 2012 | Multi-instance Security and Its Application to Password-Based Cryptography. Mihir Bellare, Thomas Ristenpart, Stefano Tessaro |
| 2012 | Multiparty Computation from Somewhat Homomorphic Encryption. Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias |
| 2012 | Must You Know the Code of f to Securely Compute f? Mike Rosulek |
| 2012 | Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority. Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky |
| 2012 | New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai |
| 2012 | New Preimage Attacks against Reduced SHA-1. Simon Knellwolf, Dmitry Khovratovich |
| 2012 | New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. Allison B. Lewko, Brent Waters |
| 2012 | On the Distribution of Linear Biases: Three Instructive Examples. Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander |
| 2012 | On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt |
| 2012 | On the Security of TLS-DHE in the Standard Model. Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk |
| 2012 | Public Keys. Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter |
| 2012 | Quantum to Classical Randomness Extractors. Mario Berta, Omar Fawzi, Stephanie Wehner |
| 2012 | Recent Advances and Existing Research Questions in Platform Security. Ernie Brickell |
| 2012 | Resistance against Iterated Attacks by Decorrelation Revisited, . Aslí Bay, Atefeh Mashatan, Serge Vaudenay |
| 2012 | Secret Sharing Schemes for Very Dense Graphs. Amos Beimel, Oriol Farràs, Yuval Mintz |
| 2012 | Secure Database Commitments and Universal Arguments of Quasi Knowledge. Melissa Chase, Ivan Visconti |
| 2012 | Secure Identity-Based Encryption in the Quantum Random Oracle Model. Mark Zhandry |
| 2012 | Securing Circuits against Constant-Rate Tampering. Dana Dachman-Soled, Yael Tauman Kalai |
| 2012 | Semantic Security for the Wiretap Channel. Mihir Bellare, Stefano Tessaro, Alexander Vardy |
| 2012 | Stam's Conjecture and Threshold Phenomena in Collision Resistance. John P. Steinberger, Xiaoming Sun, Zhe Yang |
| 2012 | Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs. Eric Miles, Emanuele Viola |
| 2012 | Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. Nir Bitansky, Alessandro Chiesa |
| 2012 | Tamper and Leakage Resilience in the Split-State Model. Feng-Hao Liu, Anna Lysyanskaya |
| 2012 | The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives. Mohammad Mahmoody, Rafael Pass |
| 2012 | The End of Crypto. Jonathan Zittrain |
| 2012 | Tightly Secure Signatures and Public-Key Encryption. Dennis Hofheinz, Tibor Jager |
| 2012 | To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro |
| 2012 | Tweakable Blockciphers with Beyond Birthday-Bound Security. Will Landecker, Thomas Shrimpton, R. Seth Terashima |
| 2012 | Universal Composability from Essentially Any Trusted Setup. Mike Rosulek |