| 2007 | A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. Ueli M. Maurer, Johan Sjödin |
| 2007 | Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings Moni Naor |
| 2007 | An Andreas Enge, Pierrick Gaudry |
| 2007 | An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. Yehuda Lindell, Benny Pinkas |
| 2007 | Ate Pairing on Hyperelliptic Curves. Robert Granger, Florian Hess, Roger Oyono, Nicolas Thériault, Frederik Vercauteren |
| 2007 | Atomic Secure Multi-party Multiplication with Low Communication. Ronald Cramer, Ivan Damgård, Robbert de Haan |
| 2007 | Batch Verification of Short Signatures. Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen |
| 2007 | Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Marc Stevens, Arjen K. Lenstra, Benne de Weger |
| 2007 | Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin |
| 2007 | Cryptanalysis of SFLASH with Slightly Modified Parameters. Vivien Dubois, Pierre-Alain Fouque, Jacques Stern |
| 2007 | Cryptanalysis of the Sidelnikov Cryptosystem. Lorenz Minder, Amin Shokrollahi |
| 2007 | Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. Hongjun Wu, Bart Preneel |
| 2007 | Divisible E-Cash Systems Can Be Truly Anonymous. Sébastien Canard, Aline Gouget |
| 2007 | Efficient Two-Party Secure Computation on Committed Inputs. Stanislaw Jarecki, Vitaly Shmatikov |
| 2007 | Feistel Networks Made Public, and Applications. Yevgeniy Dodis, Prashant Puniya |
| 2007 | General Xavier Boyen |
| 2007 | Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. Moti Yung, Yunlei Zhao |
| 2007 | Ideal Multipartite Secret Sharing Schemes. Oriol Farràs, Jaume Martí-Farré, Carles Padró |
| 2007 | Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. Yi Deng, Dongdai Lin |
| 2007 | Mesh Signatures. Xavier Boyen |
| 2007 | Non-interactive Proofs for Integer Multiplication. Ivan Damgård, Rune Thorbek |
| 2007 | Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist. Krzysztof Pietrzak |
| 2007 | Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. Willi Geiselmann, Rainer Steinwandt |
| 2007 | Oblivious-Transfer Amplification. Jürg Wullschleger |
| 2007 | Range Extension for Weak PRFs; The Good, the Bad, and the Ugly. Krzysztof Pietrzak, Johan Sjödin |
| 2007 | Revisiting the Efficiency of Malicious Two-Party Computation. David P. Woodruff |
| 2007 | Round-Efficient Secure Computation in Point-to-Point Networks. Jonathan Katz, Chiu-Yuen Koo |
| 2007 | Secure Computation from Random Error Correcting Codes. Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan |
| 2007 | Simulatable Adaptive Oblivious Transfer. Jan Camenisch, Gregory Neven, Abhi Shelat |
| 2007 | The Collision Intractability of MDC-2 in the Ideal-Cipher Model. John P. Steinberger |
| 2007 | The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. Thomas Ristenpart, Scott Yilek |
| 2007 | Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. Aurélie Bauer, Antoine Joux |
| 2007 | Universally Composable Multi-party Computation Using Tamper-Proof Hardware. Jonathan Katz |
| 2007 | Zero Knowledge and Soundness Are Symmetric. Shien Jin Ong, Salil P. Vadhan |