| 1997 | "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case. Mihir Bellare, Shafi Goldwasser, Daniele Micciancio |
| 1997 | A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. Chae Hoon Lim, Pil Joong Lee |
| 1997 | A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. Jean-François Misarsky |
| 1997 | A One Way Function Based on Ideal Arithmetic in Number Fields. Johannes Buchmann, Sachar Paulus |
| 1997 | Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings Burton S. Kaliski Jr. |
| 1997 | An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. Jerome A. Solinas |
| 1997 | Collision-Resistant Hashing: Towards Making UOWHFs Practical. Mihir Bellare, Phillip Rogaway |
| 1997 | Cryptanalysis of the Cellular Encryption Algorithm. David A. Wagner, Bruce Schneier, John Kelsey |
| 1997 | Deniable Encryption. Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky |
| 1997 | Differential Fault Analysis of Secret Key Cryptosystems. Eli Biham, Adi Shamir |
| 1997 | Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). Yuliang Zheng |
| 1997 | Edit Distance Correlation Attack on the Alternating Step Generator. Jovan Dj. Golic, Renato Menicocci |
| 1997 | Efficient Algorithms for Elliptic Curve Cryptosystems. Jorge Guajardo, Christof Paar |
| 1997 | Efficient Anonymous Multicast and Reception (Extended Abstract). Shlomi Dolev, Rafail Ostrovsky |
| 1997 | Efficient Generation of Shared RSA Keys (Extended Abstract). Dan Boneh, Matthew K. Franklin |
| 1997 | Efficient Group Signature Schemes for Large Groups (Extended Abstract). Jan Camenisch, Markus Stadler |
| 1997 | Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. Oded Goldreich, Shafi Goldwasser, Shai Halevi |
| 1997 | Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Thomas A. Berson |
| 1997 | Fast RSA-Type Cryptosystems Using N-Adic Expansion. Tsuyoshi Takagi |
| 1997 | Fast and Secure Hashing Based on Codes. Lars R. Knudsen, Bart Preneel |
| 1997 | How to Sign Digital Streams. Rosario Gennaro, Pankaj Rohatgi |
| 1997 | Keeping the SZK-Verifier Honest Unconditionally. Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung |
| 1997 | Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. Phong Q. Nguyen, Jacques Stern |
| 1997 | On the Foundations of Modern Cryptography. Oded Goldreich |
| 1997 | On the Security of the KMOV Public Key Cryptosystem. Daniel Bleichenbacher |
| 1997 | Plug and Play Encryption. Donald Beaver |
| 1997 | Privacy Amplification Secure Against Active Adversaries. Ueli M. Maurer, Stefan Wolf |
| 1997 | Proactive RSA. Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung |
| 1997 | Public-Key Cryptosystems from Lattice Reduction Problems. Oded Goldreich, Shafi Goldwasser, Shai Halevi |
| 1997 | Quantum Information Processing: The Good, the Bad and the Ugly. Gilles Brassard |
| 1997 | RSA-Based Undeniable Signatures. Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
| 1997 | Security of Blind Digital Signatures (Extended Abstract). Ari Juels, Michael Luby, Rafail Ostrovsky |
| 1997 | Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. Eiichiro Fujisaki, Tatsuaki Okamoto |
| 1997 | The Complexity of Computing Hard Core Predicates. Mikael Goldmann, Mats Näslund |
| 1997 | The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Adam L. Young, Moti Yung |
| 1997 | Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. Ran Canetti |
| 1997 | Unconditional Security Against Memory-Bounded Adversaries. Christian Cachin, Ueli M. Maurer |
| 1997 | Visual Authentication and Identification. Moni Naor, Benny Pinkas |