| 2007 | A Key Recovery Attack on Edon80. Martin Hell, Thomas Johansson |
| 2007 | A Kilobit Special Number Field Sieve Factorization. Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik |
| 2007 | A Non-interactive Shuffle with Pairing Based Verifiability. Jens Groth, Steve Lu |
| 2007 | A Simple Variant of the Merkle-Damgård Scheme with a Permutation. Shoichi Hirose, Je Hong Park, Aaram Yun |
| 2007 | Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings Kaoru Kurosawa |
| 2007 | Anonymous Quantum Communication. Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp |
| 2007 | Authenticated Key Exchange and Key Encapsulation in the Standard Model. Tatsuaki Okamoto |
| 2007 | Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. Ueli M. Maurer, Dominik Raub |
| 2007 | Blind Identity-Based Encryption and Simulatable Oblivious Transfer. Matthew Green, Susan Hohenberger |
| 2007 | Boosting Merkle-Damgård Hashing for Message Authentication. Kan Yasuda |
| 2007 | Bounded CCA2-Secure Encryption. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
| 2007 | Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai |
| 2007 | Cryptanalysis of Grindahl. Thomas Peyrin |
| 2007 | Cryptanalysis of the Tiger Hash Function. Florian Mendel, Vincent Rijmen |
| 2007 | Efficient Byzantine Agreement with Faulty Minority. Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser |
| 2007 | Faster Addition and Doubling on Elliptic Curves. Daniel J. Bernstein, Tanja Lange |
| 2007 | Fully Anonymous Group Signatures Without Random Oracles. Jens Groth |
| 2007 | Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Jacques Patarin, Valérie Nachef, Côme Berbain |
| 2007 | Group Encryption. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
| 2007 | How to Build a Hash Function from Any Collision-Resistant Function. Thomas Ristenpart, Thomas Shrimpton |
| 2007 | Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. Cécile Delerablée |
| 2007 | Information-Theoretic Security Without an Honest Majority. Anne Broadbent, Alain Tapp |
| 2007 | Known-Key Distinguishers for Some Block Ciphers. Lars R. Knudsen, Vincent Rijmen |
| 2007 | Miniature CCA2 PK Encryption: Tight Security Without Redundancy. Xavier Boyen |
| 2007 | Multi-party Indirect Indexing and Applications. Matthew K. Franklin, Mark A. Gondree, Payman Mohassel |
| 2007 | Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. Ran Canetti |
| 2007 | On Efficient Message Authentication Via Block Cipher Design Techniques. Goce Jakimoski, K. P. Subbalakshmi |
| 2007 | On Privacy Models for RFID. Serge Vaudenay |
| 2007 | On Tweaking Luby-Rackoff Blockciphers. David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu |
| 2007 | Relations Among Notions of Non-malleability for Encryption. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
| 2007 | Secure Protocols with Asymmetric Trust. Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen |
| 2007 | Seven-Property-Preserving Iterated Hashing: ROX. Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton |
| 2007 | Simple and Efficient Perfectly-Secure Asynchronous MPC. Zuzana Beerliová-Trubíniová, Martin Hirt |
| 2007 | Symmetric Key Cryptography on Modern Graphics Hardware. Jason Yang, James Goodman |
| 2007 | Two-Party Computing with Encrypted Data. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung |
| 2007 | When Antoine Joux, David Naccache, Emmanuel Thomé |