| 2007 | A More Natural Way to Construct Identity-Based Identification Schemes. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang |
| 2007 | A New Protocol for Conditional Disclosure of Secrets and Its Applications. Sven Laur, Helger Lipmaa |
| 2007 | A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. Bahador Bakhshi, Babak Sadeghiyan |
| 2007 | An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
| 2007 | An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. Fagen Li, Yupu Hu, Chuanrong Zhang |
| 2007 | An Unconditionally Secure Protocol for Multi-Party Set Intersection. Ronghua Li, Chuankun Wu |
| 2007 | Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng |
| 2007 | Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings Jonathan Katz, Moti Yung |
| 2007 | BAP: Broadcast Authentication Using Cryptographic Puzzles. Patrick Schaller, Srdjan Capkun, David A. Basin |
| 2007 | Bayesian Methods for Practical Traitor Tracing. Philip Zigoris, Hongxia Jin |
| 2007 | Certified E-Mail Protocol in the ID-Based Setting. Chunxiang Gu, Yuefei Zhu, Yonghui Zheng |
| 2007 | Compressed XTR. Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi |
| 2007 | Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won |
| 2007 | Cryptanalysis of the TRMC-4 Public Key Cryptosystem. Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner |
| 2007 | Efficient Certificateless Signature Schemes. Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee |
| 2007 | Efficient Content Authentication in Peer-to-Peer Networks. Roberto Tamassia, Nikos Triandopoulos |
| 2007 | Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu |
| 2007 | Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay |
| 2007 | Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen |
| 2007 | Generic Transformation to Strongly Unforgeable Signatures. Qiong Huang, Duncan S. Wong, Yiming Zhao |
| 2007 | Gradually Convertible Undeniable Signatures. Laila El Aimani, Damien Vergnaud |
| 2007 | Identity-Based Proxy Re-encryption. Matthew Green, Giuseppe Ateniese |
| 2007 | Merkle Signatures with Virtually Unlimited Signature Capacity. Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume |
| 2007 | Midpoints Versus Endpoints: From Protocols to Firewalls. Diana von Bidder, David A. Basin, Germano Caronni |
| 2007 | Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu |
| 2007 | Privacy-Preserving Set Union. Keith B. Frikken |
| 2007 | Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. Stefan Tillich, Christoph Herbst, Stefan Mangard |
| 2007 | Security Mediated Certificateless Signatures. Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi |
| 2007 | Sliding Window Method for NTRU. Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park |
| 2007 | Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. Rui Zhang |
| 2007 | Universal Accumulators with Efficient Nonmembership Proofs. Jiangtao Li, Ninghui Li, Rui Xue |
| 2007 | Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. Stanislaw Jarecki, Xiaomin Liu |