Abstract is missing.
- On the Necessity of Exhaustive Search for System-Invariant CryptanalysisMartin E. Hellman, Ehud D. Karnin, Justin M. Reyneri. 2-6
- Time-Memory-Processor TradeoffsHamid R. Amirazizi, Martin E. Hellman. 7-9
- Primality TestingLeonard M. Adleman. 10
- Coin Flipping by TelephoneManuel Blum. 11-15
- A Polynomial Time Solution for Compact KnapsacksHamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri. 17-19
- Some Comments on the Knapsack ProblemIngemar Ingemarsson. 20-24
- One-way Sequence for Transaction VerificationAlan G. Konheim. 38
- Some Regular Properties of the DESDonald W. Davies. 41
- An Optimally Secure Relativized CryptosystemGilles Brassard. 54-58
- Scrambling and RandomizationSubhash C. Kak. 59-63
- Digital Signature Scheme for Computer Communication NetworksHenk Meijer, Selim G. Akl. 65-70
- The Design and Analysis of Cryptographic ProtocolsRichard A. DeMillo, Nancy A. Lynch, Michael Merritt. 71-72
- Local Network Cryptosystem ArchitectureThomas A. Berson. 73-78
- Software Protection Using Communal Key Cryptosystems George B. Purdy, Gustavus J. Simmons, James Studier. 79
- Some Cryptographic Techniques for File ProtectionStephen T. Kent. 80
- Key Management from a Security ViewpointG. R. Blakley. 82
- Cryptography, the Next Two DecadesWhitfield Diffie. 84-108
- Security Mechanisms in Electronic CardsStephen B. Weinstein. 109
- Some Thoughts on Speech EncryptionA. D. Wyner. 120
- Limitations on the Use of Encryption to Enforce Mandatory SecurityMorrie Gasser. 130-134
- Verification by Anonymous MonitorsDavid Chaum. 138-139
- Protocol for Signing ContractsShimon Even. 148-153
- National Security and Commercial Security: Division of ResponsibilityWhitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith. 154-156