| 2012 | A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions. K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan |
| 2012 | A Framework for Security Analysis of Key Derivation Functions. Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson |
| 2012 | A Pre-computable Signature Scheme with Efficient Verification for RFID. Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan |
| 2012 | Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. Yanfeng Wang, Wenling Wu, Xiaoli Yu |
| 2012 | Computational Soundness of Indistinguishability Properties without Computable Parsing. Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada |
| 2012 | Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. Chong-zhi Gao, Dongqing Xie, Baodian Wei |
| 2012 | Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family. Yang-Wai Chow, Willy Susilo |
| 2012 | Fault Analysis of the KATAN Family of Block Ciphers. Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry |
| 2012 | High-Entropy Visual Identification for Touch Screen Devices. Nathaniel Wesley Filardo, Giuseppe Ateniese |
| 2012 | Impossible Differential Attacks on Reduced-Round LBlock. Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li |
| 2012 | Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu |
| 2012 | Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings Mark Dermot Ryan, Ben Smyth, Guilin Wang |
| 2012 | Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi |
| 2012 | Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote |
| 2012 | Linear Cryptanalysis of Reduced-Round ICEBERG. Yue Sun, Meiqin Wang |
| 2012 | New Impossible Differential Attacks on Camellia. Dongxia Bai, Leibo Li |
| 2012 | New Truncated Differential Cryptanalysis on 3D Block Cipher. Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
| 2012 | On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. Zhenfei Zhang, Thomas Plantard, Willy Susilo |
| 2012 | On the Equivalence of Two Definitions of Visual Cryptography Scheme. Teng Guo, Feng Liu, Chuan Kun Wu |
| 2012 | Overcoming Significant Noise: Correlation-Template-Induction Attack. An Wang, Man Chen, Zongyue Wang, Yaoling Ding |
| 2012 | Partial Key Exposure on RSA with Private Exponents Larger Than N. Marc Joye, Tancrède Lepoint |
| 2012 | Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization. Shuo Tian, Yeping He, Baozeng Ding |
| 2012 | Redactable Signatures for Independent Removal of Structure and Content. Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer |
| 2012 | Secure Distributed Computation of the Square Root and Applications. Manuel Liedel |
| 2012 | Structure-Based RSA Fault Attacks. Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert |
| 2012 | T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings. Christian L. F. Corniaux, Hossein Ghodosi |
| 2012 | Towards Fine-Grained Access Control on Browser Extensions. Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang |
| 2012 | iPIN and mTAN for Secure eID Applications. Johannes Braun, Moritz Horsch, Alexander Wiesmaier |