| 2012 | A Dichotomy for Local Small-Bias Generators. Benny Applebaum, Andrej Bogdanov, Alon Rosen |
| 2012 | A Parallel Repetition Theorem for Leakage Resilience. Zvika Brakerski, Yael Tauman Kalai |
| 2012 | A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. Benjamin Fuller, Adam O'Neill, Leonid Reyzin |
| 2012 | Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. Jae Hong Seo, Jung Hee Cheon |
| 2012 | Bounded-Collusion IBE from Key Homomorphism. Shafi Goldwasser, Allison B. Lewko, David A. Wilson |
| 2012 | Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry. Dimitar Jetchev, Onur Özen, Martijn Stam |
| 2012 | Computational Extractors and Pseudorandomness. Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin |
| 2012 | Computing on Authenticated Data. Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters |
| 2012 | Confidentiality and Integrity: A Constructive Perspective. Ueli Maurer, Andreas Rüedlinger, Björn Tackmann |
| 2012 | Counterexamples to Hardness Amplification beyond Negligible. Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs |
| 2012 | From Non-adaptive to Adaptive Pseudorandom Functions. Itay Berman, Iftach Haitner |
| 2012 | Functional Re-encryption and Collusion-Resistant Obfuscation. Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan |
| 2012 | Hardness Preserving Constructions of Pseudorandom Functions. Abhishek Jain, Krzysztof Pietrzak, Aris Tentes |
| 2012 | How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan |
| 2012 | Identifying Cheaters without an Honest Majority. Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu |
| 2012 | Iterative Constructions and Private Data Release. Anupam Gupta, Aaron Roth, Jonathan R. Ullman |
| 2012 | Leakage-Resilient Circuits without Computational Assumptions. Stefan Dziembowski, Sebastian Faust |
| 2012 | Leakage-Tolerant Interactive Protocols. Nir Bitansky, Ran Canetti, Shai Halevi |
| 2012 | Lossy Functions Do Not Amplify Well. Krzysztof Pietrzak, Alon Rosen, Gil Segev |
| 2012 | Lower Bounds in Differential Privacy. Anindya De |
| 2012 | Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions. Benoît Libert, Moti Yung |
| 2012 | On Black-Box Reductions between Predicate Encryption Schemes. Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody |
| 2012 | On Efficient Zero-Knowledge PCPs. Yuval Ishai, Mohammad Mahmoody, Amit Sahai |
| 2012 | On the Instantiability of Hash-and-Sign RSA Signatures. Yevgeniy Dodis, Iftach Haitner, Aris Tentes |
| 2012 | On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. Avradip Mandal, Jacques Patarin, Yannick Seurin |
| 2012 | On the Security of the "Free-XOR" Technique. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou |
| 2012 | Point Obfuscation and 3-Round Zero-Knowledge. Nir Bitansky, Omer Paneth |
| 2012 | Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. Helger Lipmaa |
| 2012 | Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan |
| 2012 | Resettable Statistical Zero Knowledge. Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia |
| 2012 | Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions. Olivier Blazy, David Pointcheval, Damien Vergnaud |
| 2012 | Secure Two-Party Computation with Low Communication. Ivan Damgård, Sebastian Faust, Carmit Hazay |
| 2012 | Simultaneously Resettable Arguments of Knowledge. Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti |
| 2012 | Subspace LWE. Krzysztof Pietrzak |
| 2012 | The Knowledge Tightness of Parallel Zero-Knowledge. Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng |
| 2012 | Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings Ronald Cramer |
| 2012 | Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations. Dario Fiore, Dominique Schröder |