| 2013 | Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers Lars R. Knudsen, Huapeng Wu |
| 2012 | $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms. Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi |
| 2012 | A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery. Zhenyu Huang, Dongdai Lin |
| 2012 | A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. David Galindo, Srinivas Vivek |
| 2012 | All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. Takanori Isobe, Kyoji Shibutani |
| 2012 | An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Martin R. Albrecht, Gregor Leander |
| 2012 | An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks. Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert |
| 2012 | Attacking (EC)DSA Given Only an Implicit Hint. Jean-Charles Faugère, Christopher Goyet, Guénaël Renault |
| 2012 | Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef |
| 2012 | Cryptanalysis of the "Kindle" Cipher. Alex Biryukov, Gaëtan Leurent, Arnab Roy |
| 2012 | Cryptanalysis of the Loiss Stream Cipher. Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef |
| 2012 | Cryptanalysis of the Xiao - Lai White-Box AES Implementation. Yoni De Mulder, Peter Roelse, Bart Preneel |
| 2012 | Cryptographically Strong de Bruijn Sequences with Large Periods. Kalikinkar Mandal, Guang Gong |
| 2012 | Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three. Reza Rezaeian Farashahi, Hongfeng Wu, Changan Zhao |
| 2012 | Efficient Implementation of Bilinear Pairings on ARM Processors. Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao |
| 2012 | Extracts from the SHA-3 Competition. Vincent Rijmen |
| 2012 | Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers. Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling, Axel Poschmann |
| 2012 | Forward Secure Signatures on Smart Cards. Andreas Hülsing, Christoph Busold, Johannes Buchmann |
| 2012 | Improved Cryptanalysis of the Block Cipher KASUMI. Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang |
| 2012 | Lattice Reduction for Modular Knapsack. Thomas Plantard, Willy Susilo, Zhenfei Zhang |
| 2012 | Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. Yu Sasaki, Lei Wang |
| 2012 | Private Stream Search at Almost the Same Communication Cost as a Regular Search. Matthieu Finiasz, Kannan Ramchandran |
| 2012 | Provable Security of BLAKE with Non-ideal Compression Function. Elena Andreeva, Atul Luykx, Bart Mennink |
| 2012 | Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. Shengbao Wu, Mingsheng Wang, Wenling Wu |
| 2012 | The Boomerang Attacks on the Round-Reduced Skein-512. Hongbo Yu, Jiazhe Chen, Xiaoyun Wang |
| 2012 | Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$. Jithra Adikari, M. Anwar Hasan, Christophe Nègre |