Abstract is missing.
- Fast Computation of Discrete Logarithms in GF(q)Martin E. Hellman, Justin M. Reyneri. 3-13
- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2:::p:::)Ernest F. Brickell, Judy H. Moore. 15-19
- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete ProblemRavi Janardan, K. B. Lakshmanan. 21-37
- Infinite Structures in Information TheoryG. R. Blakley, Laif Swanson. 39-50
- A Fast Modular Multiplication Algorithm With Application To Two Key CryptographyErnest F. Brickell. 51-60
- Comparison of Two Pseudo-Random Number GeneratorsLenore Blum, Manuel Blum, Mike Shub. 61-78
- On Computationally Secure Authentication Tags Requiring Short Secret Shared KeysGilles Brassard. 79-86
- Some Regular Properties of the Data Encryption Standard AlgorithmDonald W. Davies. 89-96
- The Average Cycle Size of the Key Stream in Output Feedback EnciphermentDonald W. Davies, Graeme I. P. Parkin. 97-98
- Analysis of Certain Aspects of Output Feedback ModeRobert R. Jueneman. 99-127
- Drainage and the DESMartin E. Hellman, Justin M. Reyneri. 129-131
- Randomized Encryption TechniquesRonald L. Rivest, Alan T. Sherman. 145-163
- On the Security of Multi-Party Protocols in Distributed SystemsDanny Dolev, Avi Wigderson. 167-175
- On the Security of Ping-Pong ProtocolsDanny Dolev, Shimon Even, Richard M. Karp. 177-186
- The Use of Public-Key Cryptography for Signing ChecksLuc Longpré. 187-197
- Blind Signatures for Untraceable PaymentsDavid Chaum. 199-203
- On Signatures and AuthenticationShafi Goldwasser, Silvio Micali, Andrew Chi-Chih Yao. 211-215
- Cryptographic Protection of Personal Data CardsChristian Müller-Schloer, Neal R. Wagner. 219-229
- Cryptographic Solution to a Multilevel Security ProblemSelim G. Akl, Peter D. Taylor. 237-249
- Local Network Cryptosystem Architecture: Access ControlThomas A. Berson. 251-258
- Implementing an Electronic Notary PublicLeonard M. Adleman. 259-265
- Quantum Cryptography, or Unforgeable Subway TokensCharles H. Bennett, Gilles Brassard, Seth Breidbard, Stephen Wiesner. 267-275
- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack CryptosystemsErnest F. Brickell, James A. Davis, Gustavus J. Simmons. 289-301
- On Breaking the Iterated Merkle-Hellman Public-Key CryptosystemLeonard M. Adleman. 303-308
- Long Key Variants of DESThomas A. Berson. 311-313
- Inferring a Sequence Produced by a Linear CongruenceJoan B. Plumstead. 317-319
- Key ReconstructionMichael Merritt. 321-322