| 1997 | A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost. Mihir Bellare, Daniele Micciancio |
| 1997 | A New Public-Key Cryptosystem. David Naccache, Jacques Stern |
| 1997 | A Secure and Optimally Efficient Multi-Authority Election Scheme. Ronald Cramer, Rosario Gennaro, Berry Schoenmakers |
| 1997 | Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding Walter Fumy |
| 1997 | Almost k-wise Independent Sample Spaces and Their Cryptologic Applications. Kaoru Kurosawa, Thomas Johansson, Douglas R. Stinson |
| 1997 | Anonymous Fingerprinting. Birgit Pfitzmann, Michael Waidner |
| 1997 | Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. Eric R. Verheul, Henk C. A. van Tilborg |
| 1997 | Bucket Hashing with a Small Key Size. Thomas Johansson |
| 1997 | Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. Niko Baric, Birgit Pfitzmann |
| 1997 | Combinatorial Properties of Basic Encryption Operations (Extended Abstract). Thilo Zieschang |
| 1997 | Cryptanalysis of Alleged A5 Stream Cipher. Jovan Dj. Golic |
| 1997 | Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria. Kaoru Kurosawa, Takashi Satoh |
| 1997 | Distributed "Magic Ink" Signatures. Markus Jakobsson, Moti Yung |
| 1997 | Efficient Cryptographic Protocols Based on Noisy Channels. Claude Crépeau |
| 1997 | Efficient and Generalized Group Signatures. Jan Camenisch |
| 1997 | Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2 Christof Paar, Pedro Soria-Rodriguez |
| 1997 | Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. Ronald Cramer, Ivan Damgård |
| 1997 | Finding Good Random Elliptic Curves for Cryptosystems Defined over F Reynald Lercier |
| 1997 | Incremental Cryptography and Memory Checkers. Marc Fischlin |
| 1997 | Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. Ueli M. Maurer |
| 1997 | Kleptography: Using Cryptography Against Cryptography. Adam L. Young, Moti Yung |
| 1997 | Lattice Attacks on NTRU. Don Coppersmith, Adi Shamir |
| 1997 | Linear Statistical Weakness of Alleged RC4 Keystream Generator. Jovan Dj. Golic |
| 1997 | Lower Bounds for Discrete Logarithms and Related Problems. Victor Shoup |
| 1997 | More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings. Claude Carlet |
| 1997 | Oblivious Transfers and Privacy Amplification. Gilles Brassard, Claude Crépeau |
| 1997 | On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). Dan Boneh, Richard A. DeMillo, Richard J. Lipton |
| 1997 | Rapid Demonstration of Linear Relations Connected by Boolean Operators. Stefan Brands |
| 1997 | Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. Mihir Bellare, Markus Jakobsson, Moti Yung |
| 1997 | SHA: A Design for Parallel Architectures? Antoon Bosselaers, René Govaerts, Joos Vandewalle |
| 1997 | Selective Forgery of RSA Signatures Using Redundancy. Marc Girault, Jean-François Misarsky |
| 1997 | Smooth Entropy and Rényi Entropy. Christian Cachin |
| 1997 | Stronger Security Proofs for RSA and Rabin Bits. Roger Fischlin, Claus-Peter Schnorr |
| 1997 | The GCHQ Protocol and Its Problems. Ross J. Anderson, Michael Roe |
| 1997 | Two Attacks on Reduced IDEA. Johan Borst, Lars R. Knudsen, Vincent Rijmen |