| 2007 | A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
| 2007 | A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. Nick Howgrave-Graham |
| 2007 | A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra. Ronald Cramer, Eike Kiltz, Carles Padró |
| 2007 | A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than Ellen Jochemsz, Alexander May |
| 2007 | A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Daniel R. L. Brown, Kristian Gjøsteen |
| 2007 | A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner |
| 2007 | Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings Alfred Menezes |
| 2007 | Amplifying Collision Resistance: A Complexity-Theoretic Treatment. Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee |
| 2007 | Chernoff-Type Direct Product Theorems. Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
| 2007 | Cryptography in the Multi-string Model. Jens Groth, Rafail Ostrovsky |
| 2007 | Cryptography with Constant Input Locality. Benny Applebaum, Yuval Ishai, Eyal Kushilevitz |
| 2007 | Deterministic and Efficiently Searchable Encryption. Mihir Bellare, Alexandra Boldyreva, Adam O'Neill |
| 2007 | Domain Extension of Public Random Functions: Beyond the Birthday Barrier. Ueli M. Maurer, Stefano Tessaro |
| 2007 | Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. Jean-Sébastien Coron |
| 2007 | Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
| 2007 | Hash Functions and the (Amplified) Boomerang Attack. Antoine Joux, Thomas Peyrin |
| 2007 | How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? Danny Harnik, Yuval Ishai, Eyal Kushilevitz |
| 2007 | How Should We Solve Search Problems Privately? Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb |
| 2007 | Improved Analysis of Kannan's Shortest Lattice Vector Algorithm. Guillaume Hanrot, Damien Stehlé |
| 2007 | Indistinguishability Amplification. Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner |
| 2007 | Information Security Economics - and Beyond. Ross J. Anderson, Tyler Moore |
| 2007 | Invertible Universal Hashing and the TET Encryption Mode. Shai Halevi |
| 2007 | On Secure Multi-party Computation in Black-Box Groups. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
| 2007 | Pirate Evolution: How to Make the Most of Your Traitor Keys. Aggelos Kiayias, Serdar Pehlivanoglu |
| 2007 | Practical Cryptanalysis of SFLASH. Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern |
| 2007 | Public Key Encryption That Allows PIR Queries. Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
| 2007 | Random Oracles and Auxiliary Input. Dominique Unruh |
| 2007 | Reducing Trust in the PKG in Identity Based Cryptosystems. Vipul Goyal |
| 2007 | Rerandomizable RCCA Encryption. Manoj Prabhakaran, Mike Rosulek |
| 2007 | Scalable and Unconditionally Secure Multiparty Computation. Ivan Damgård, Jesper Buus Nielsen |
| 2007 | Secure Hybrid Encryption from Weakened Key Encapsulation. Dennis Hofheinz, Eike Kiltz |
| 2007 | Secure Identification and QKD in the Bounded-Quantum-Storage Model. Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner |
| 2007 | Security-Amplifying Combiners for Collision-Resistant Hash Functions. Marc Fischlin, Anja Lehmann |
| 2007 | Simulatable VRFs with Applications to Multi-theorem NIZK. Melissa Chase, Anna Lysyanskaya |
| 2007 | Universally-Composable Two-Party Computation in Two Rounds. Omer Horvitz, Jonathan Katz |