| 2007 | A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita |
| 2007 | A Generic Method to Design Modes of Operation Beyond the Birthday Bound. David Lefranc, Philippe Painchault, Valérie Rouat, Emmanuel Mayer |
| 2007 | Analysis of Countermeasures Against Access Driven Cache Attacks on AES. Johannes Blömer, Volker Krummel |
| 2007 | Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic. Roberto Maria Avanzi |
| 2007 | Attacks on the ESA-PSS-04-151 MAC Scheme. Georg Illies, Marian Margraf |
| 2007 | Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Christophe De Cannière, Florian Mendel, Christian Rechberger |
| 2007 | Cryptanalysis of White Box DES Implementations. Louis Goubin, Jean-Michel Masereel, Michaël Quisquater |
| 2007 | Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel |
| 2007 | Cryptanalysis of the CRUSH Hash Function. Matthew Henricksen, Lars R. Knudsen |
| 2007 | Distinguishing Attack Against TPypy. Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima |
| 2007 | Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Xinxin Fan, Guang Gong |
| 2007 | Explicit Formulas for Efficient Multiplication in \mathbb Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi |
| 2007 | Extended BDD-Based Cryptanalysis of Keystream Generators. Dirk Stegemann |
| 2007 | Improved Side-Channel Collision Attacks on AES. Andrey Bogdanov |
| 2007 | Koblitz Curves and Integer Equivalents of Frobenius Expansions. Billy Bob Brumley, Kimmo U. Järvinen |
| 2007 | Linear Cryptanalysis of Non Binary Ciphers. Thomas Baignères, Jacques Stern, Serge Vaudenay |
| 2007 | MRHS Equation Systems. Håvard Raddum |
| 2007 | Passive-Only Key Recovery Attacks on RC4. Serge Vaudenay, Martin Vuagnoux |
| 2007 | Permutation After RC4 Key Scheduling Reveals the Secret Key. Goutam Paul, Subhamoy Maitra |
| 2007 | Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. Frédéric Amiel, Benoit Feix, Karine Villegas |
| 2007 | Reduced Complexity Attacks on the Alternating Step Generator. Shahram Khazaei, Simon Fischer, Willi Meier |
| 2007 | Revisiting Correlation-Immunity in Filter Generators. Aline Gouget, Hervé Sibert |
| 2007 | Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers Carlisle M. Adams, Ali Miri, Michael J. Wiener |
| 2007 | The Delicate Issues of Addition with Respect to XOR Differences. Gaoli Wang, Nathan Keller, Orr Dunkelman |
| 2007 | The Security of the Extended Codebook (XCB) Mode of Operation. David A. McGrew, Scott R. Fluhrer |
| 2007 | Two Trivial Attacks on Trivium. Alexander Maximov, Alex Biryukov |