| 2012 | "Provable" Security against Differential and Linear Cryptanalysis. Kaisa Nyberg |
| 2012 | (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou |
| 2012 | A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract). Jiqiang Lu |
| 2012 | A Model for Structure Attacks, with Applications to PRESENT and Serpent. Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel |
| 2012 | Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva |
| 2012 | Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. Florian Mendel, Tomislav Nad, Martin Schläffer |
| 2012 | Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. Ji Li, Takanori Isobe, Kyoji Shibutani |
| 2012 | Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. Markku-Juhani Olavi Saarinen |
| 2012 | Differential Propagation Analysis of Keccak. Joan Daemen, Gilles Van Assche |
| 2012 | ElimLin Algorithm Revisited. Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay |
| 2012 | Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers Anne Canteaut |
| 2012 | Higher-Order Masking Schemes for S-Boxes. Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain |
| 2012 | Improved Attacks on Full GOST. Itai Dinur, Orr Dunkelman, Adi Shamir |
| 2012 | Improved Rebound Attack on the Finalist Grøstl. Jérémy Jean, María Naya-Plasencia, Thomas Peyrin |
| 2012 | Lapin: An Efficient Authentication Protocol Based on Ring-LPN. Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak |
| 2012 | McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. Ewan Fleischmann, Christian Forler, Stefan Lucks |
| 2012 | New Attacks on Keccak-224 and Keccak-256. Itai Dinur, Orr Dunkelman, Adi Shamir |
| 2012 | New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li |
| 2012 | On the (In)Security of IDEA in Various Hashing Modes. Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang |
| 2012 | Practical Cryptanalysis of ARMADILLO2. María Naya-Plasencia, Thomas Peyrin |
| 2012 | Recursive Diffusion Layers for Block Ciphers and Hash Functions. Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad |
| 2012 | Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication. Long Hoang Nguyen, A. W. Roscoe |
| 2012 | The Security of Ciphertext Stealing. Phillip Rogaway, Mark Wooding, Haibin Zhang |
| 2012 | UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel |
| 2012 | Unaligned Rebound Attack: Application to Keccak. Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei |
| 2012 | Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. Andrey Bogdanov, Meiqin Wang |