| 2012 | A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation. Colin D. Walter |
| 2012 | A First-Order Leak-Free Masking Countermeasure. Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger |
| 2012 | A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger |
| 2012 | A New Pseudorandom Generator from Collision-Resistant Hash Functions. Alexandra Boldyreva, Virendra Kumar |
| 2012 | An Efficient Protocol for Oblivious DFA Evaluation and Applications. Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan |
| 2012 | Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism. Amir Moradi, Markus Kasper, Christof Paar |
| 2012 | Boomerang Attacks on Hash Function Using Auxiliary Differentials. Gaëtan Leurent, Arnab Roy |
| 2012 | Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation. Manuel Barbosa, Pooya Farshim |
| 2012 | Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft |
| 2012 | Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao |
| 2012 | Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg |
| 2012 | Localized Electromagnetic Analysis of Cryptographic Implementations. Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl |
| 2012 | New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications. Eiichiro Fujisaki |
| 2012 | On the Joint Security of Encryption and Signature in EMV. Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler |
| 2012 | Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves. Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals |
| 2012 | PMAC with Parity: Minimizing the Query-Length Influence. Kan Yasuda |
| 2012 | Plaintext-Checkable Encryption. Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie |
| 2012 | Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede |
| 2012 | Practical Realisation and Elimination of an ECC-Related Software Bug Attack. Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren |
| 2012 | Reducing the Key Size of Rainbow Using Non-commutative Rings. Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi |
| 2012 | Secure Computation, I/O-Efficient Algorithms and Distributed Signatures. Ivan Damgård, Jonas Kölker, Tomas Toft |
| 2012 | Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces. Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein |
| 2012 | Short Attribute-Based Signatures for Threshold Predicates. Javier Herranz, Fabien Laguillaumie, Benoît Libert, Carla Ràfols |
| 2012 | Short Transitive Signatures for Directed Trees. Philippe Camacho, Alejandro Hevia |
| 2012 | Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings Orr Dunkelman |
| 2012 | Towards Different Flavors of Combined Side Channel Attacks. Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger |
| 2012 | Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro |