| 2012 | A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract). Antoine Joux |
| 2012 | Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. Tatsuaki Okamoto, Katsuyuki Takashima |
| 2012 | Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings David Pointcheval, Thomas Johansson |
| 2012 | All-But-Many Lossy Trapdoor Functions. Dennis Hofheinz |
| 2012 | Another Look at Provable Security. Alfred Menezes |
| 2012 | Concurrently Secure Computation in Constant Rounds. Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai |
| 2012 | Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $\mathbb{F}_{p^6}$. Antoine Joux, Vanessa Vitse |
| 2012 | Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks. Yu Sasaki |
| 2012 | Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding. Anja Becker, Antoine Joux, Alexander May, Alexander Meurer |
| 2012 | Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. Susan Hohenberger, Allison B. Lewko, Brent Waters |
| 2012 | Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More. Hoeteck Wee |
| 2012 | Efficient Zero-Knowledge Argument for Correctness of a Shuffle. Stephanie Bayer, Jens Groth |
| 2012 | Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading. Peter Gazi, Stefano Tessaro |
| 2012 | Fair Computation with Rational Players. Adam Groce, Jonathan Katz |
| 2012 | Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers. Yuanmi Chen, Phong Q. Nguyen |
| 2012 | Fully Homomorphic Encryption with Polylog Overhead. Craig Gentry, Shai Halevi, Nigel P. Smart |
| 2012 | Group to Group Commitments Do Not Shrink. Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo |
| 2012 | Identity-Based (Lossy) Trapdoor Functions and Applications. Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters |
| 2012 | Identity-Based Encryption Resilient to Continual Auxiliary Leakage. Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu |
| 2012 | Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields. Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault |
| 2012 | Incremental Deterministic Public-Key Encryption. Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev |
| 2012 | Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser |
| 2012 | Lattice Signatures without Trapdoors. Vadim Lyubashevsky |
| 2012 | Malleable Proof Systems and Applications. Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
| 2012 | Message Authentication, Revisited. Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs |
| 2012 | Minimalism in Cryptography: The Even-Mansour Scheme Revisited. Orr Dunkelman, Nathan Keller, Adi Shamir |
| 2012 | Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs |
| 2012 | Narrow-Bicliques: Cryptanalysis of Full IDEA. Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger |
| 2012 | On Round-Optimal Zero Knowledge in the Bare Public-Key Model. Alessandra Scafuro, Ivan Visconti |
| 2012 | On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model. Yannick Seurin |
| 2012 | Optimal Security Proofs for Full Domain Hash, Revisited. Saqib A. Kakvi, Eike Kiltz |
| 2012 | Property Preserving Symmetric Encryption. Omkant Pandey, Yannis Rouselakis |
| 2012 | Pseudorandom Functions and Lattices. Abhishek Banerjee, Chris Peikert, Alon Rosen |
| 2012 | Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi |
| 2012 | Quantum Proofs of Knowledge. Dominique Unruh |
| 2012 | Robust Coin Flipping. Gene S. Kopp, John D. Wiltshire-Gordon |
| 2012 | Scalable Group Signatures with Revocation. Benoît Libert, Thomas Peters, Moti Yung |
| 2012 | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam |
| 2012 | Standard Security Does Not Imply Security against Selective-Opening. Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek |
| 2012 | Statistical Tools Flavor Side-Channel Collision Attacks. Amir Moradi |
| 2012 | Tightly-Secure Signatures from Lossy Identification Schemes. Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi |
| 2012 | Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. Allison B. Lewko |
| 2012 | Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. Daniele Micciancio, Chris Peikert |
| 2012 | Unconditionally-Secure Robust Secret Sharing with Compact Shares. Alfonso Cevallos, Serge Fehr, Rafail Ostrovsky, Yuval Rabani |