| 1997 | A Satoshi Obana, Kaoru Kurosawa |
| 1997 | A Trust policy framework. Audun Jøsang |
| 1997 | A language for specifying sequences of authorization transformations and its applications. Yun Bai, Vijay Varadharajan |
| 1997 | A multiplication-addition structure against differential attack. Feng Zhu, Bao-An Guo |
| 1997 | A new and optimal chosen-message attack on RSA-type cryptosystems. Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater |
| 1997 | A secure code for recipient watermarking against conspiracy attacks by all users. Hajime Watanabe, Tadao Kasami |
| 1997 | An anonymous and undeniable payment scheme. Liqun Chen, Chris J. Mitchell |
| 1997 | An effective genetic algorithm for finding highly nonlinear Boolean Functions. William Millan, Andrew J. Clark, Ed Dawson |
| 1997 | An implementable scheme for secure delegation of computing and data. Josep Domingo-Ferrer, Ricardo X. Sanchez del Castillo |
| 1997 | An improved key stream generator based on the programmable cellular automata. Miodrag J. Mihaljevic |
| 1997 | Asymmetric cryptography with S-Boxes. Jacques Patarin, Louis Goubin |
| 1997 | Computational learning theoretic cryptanalysis of language theoretic cryptosystems. Takeshi Koshiba |
| 1997 | Construction of correlation immune Boolean functions. Ed Dawson, Chuan-Kun Wu |
| 1997 | Critical analysis of security in voice hiding techniques. Liwu Chang, Ira S. Moskowitz |
| 1997 | Design of a security platform for CORBA based application. Rakman Choi, Jung-Chan Na, Kwonil Lee, Eunmi Kim, Wooyong Han |
| 1997 | Digital signature and public key cryptosystems in a prime order subgroup of Z Colin Boyd |
| 1997 | Distributed cryptographic function application protocols. André Postma, Thijs Krol, Egbert Molenkamp |
| 1997 | Duality of Boolean functions and its cryptographic significance. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai |
| 1997 | Efficient construction of secure hyperelliptic discrete logarithm problems. Jinhui Chao, Nori Matsuda, Shigeo Tsujii |
| 1997 | Efficient elliptic curve exponentiation. Atsuko Miyaji, Takatoshi Ono, Henri Cohen |
| 1997 | Efficient scalable fair cash with off-line extortion prevention. Holger Peterson, Guillaume Poupard |
| 1997 | Electronic commerce with secure intelligent trade agent. Jacobus E. van der Merwe, Sebastiaan H. von Solms |
| 1997 | Enforcing traceability in software. Colin Boyd |
| 1997 | Fault tolerant anonymous channel. Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani |
| 1997 | Hiding the Hidden: A software system for concealing ciphertext as innocuous text. Mark Chapman, George I. Davida |
| 1997 | Improved fast software implementation of block ciphers. Takeshi Shimoyama, Seiichi Amada, Shiho Moriai |
| 1997 | Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings Yongfei Han, Tatsuaki Okamoto, Sihan Qing |
| 1997 | Making unfair a "fair" blind signature scheme. Jacques Traoré |
| 1997 | Minimizing the use of random oracles in authenticated encryption schemes. Mihir Bellare, Phillip Rogaway |
| 1997 | Multisender authentication systems with unconditional security. Keith M. Martin, Reihaneh Safavi-Naini |
| 1997 | On strict estimation method of provable security against differential and linear cryptanalysis. Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta |
| 1997 | On the decomposition constructions for perfect secret sharing schemes. Hung-Min Sun, Bor-Liang Chen |
| 1997 | On the powerline system. Paul Camion, Hervé Chabanne |
| 1997 | On weak RSA-keys produced from Pretty Good Privacy. Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka |
| 1997 | Proposal of user identification scheme using mouse. Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo |
| 1997 | Protocols for issuing public-key certificates over the Internet. James W. Gray III, Kin Fai Epsilon Ip |
| 1997 | Proxy signatures, Revisited. Seungjoo Kim, Sangjoon Park, Dongho Won |
| 1997 | Publicly verifiable partial key escrow. Wenbo Mao |
| 1997 | Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. John Kelsey, Bruce Schneier, David A. Wagner |
| 1997 | Remarks on the multiple assignment secret sharing scheme. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini |
| 1997 | Secret sharing in hierarchical groups. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini |
| 1997 | Secure document management and distribution in an open network environment. Antonio Lioy, Fabio Maino, Marco Mezzalama |
| 1997 | Security comments on the Hwang-Chen algebraic-code cryptosystem. Mohssen Alabbadi |
| 1997 | Self-synchronized message randomization methods for subliminal channels. Kazukuni Kobara, Hideki Imai |
| 1997 | Stateless connections. Tuomas Aura, Pekka Nikander |
| 1997 | Traceable visual cryptography. Ingrid Biehl, Susanne Wetzel |
| 1997 | Trapdoor one-way permutations and multivariate polynominals. Jacques Patarin, Louis Goubin |
| 1997 | Two efficient RSA multisignature schemes. Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won |
| 1997 | Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung |