| 2007 | A Bit-Slice Implementation of the Whirlpool Hash Function. Karl Scheibelhofer |
| 2007 | A Practical Optimal Padding for Signature Schemes. Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang |
| 2007 | A Practical and Tightly Secure Signature Scheme Without Hash Function. Benoît Chevallier-Mames, Marc Joye |
| 2007 | A Simple Related-Key Attack on the Full SHACAL-1. Eli Biham, Orr Dunkelman, Nathan Keller |
| 2007 | Batch Processing of Interactive Proofs. Koji Chida, Go Yamamoto |
| 2007 | Cache Based Remote Timing Attack on the AES. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç |
| 2007 | Compact E-Cash from Bounded Accumulator. Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu |
| 2007 | Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. Florian Mendel, Joseph Lano, Bart Preneel |
| 2007 | Differential Power Analysis of Stream Ciphers. Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
| 2007 | Directed Transitive Signature Scheme. Xun Yi |
| 2007 | Efficient Password-Authenticated Key Exchange Based on RSA. Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won |
| 2007 | Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
| 2007 | How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
| 2007 | Human Identification Through Image Evaluation Using Secret Predicates. Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee |
| 2007 | Identity-Based Multi-signatures from RSA. Mihir Bellare, Gregory Neven |
| 2007 | Impossibility Proofs for RSA Signatures in the Standard Model. Pascal Paillier |
| 2007 | Improved Efficiency for Private Stable Matching. Matthew K. Franklin, Mark A. Gondree, Payman Mohassel |
| 2007 | MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan |
| 2007 | Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. Yvo Desmedt, Goce Jakimoski |
| 2007 | Predicting Secret Keys Via Branch Prediction. Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert |
| 2007 | Public Key Cryptography and RFID Tags. Máire McLoone, Matthew J. B. Robshaw |
| 2007 | Second Preimages for SMASH. Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2007 | Selecting Secure Passwords. Eric R. Verheul |
| 2007 | Template Attacks on Masking - Resistance Is Futile. Elisabeth Oswald, Stefan Mangard |
| 2007 | Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Joseph H. Silverman, William Whyte |
| 2006 | Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings Masayuki Abe |