Abstract is missing.
- A Prototype Encryption System Using Public KeyS. C. Serpell, C. B. Brookson, B. L. Clark. 3-9 [doi]
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete LogarithmsTaher El Gamal. 10-18 [doi]
- A Public Key Cryptosystem Based on the Word ProblemNeal R. Wagner, Marianne R. Magyarik. 19-36 [doi]
- Efficient Signature Schemes Based on Polynomial EquationsH. Ong, Claus-Peter Schnorr, Adi Shamir. 37-46 [doi]
- Identity-Based Cryptosystems and Signature SchemesAdi Shamir. 47-53 [doi]
- A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite FieldsBenny Chor, Ronald L. Rivest. 54-65 [doi]
- Some Public Key Crypto-Functions as Intractable as FactorizationHugh C. Williams. 66-70 [doi]
- Computing Logarithms in GF(2:::n:::)Ian F. Blake, Ronald C. Mullin, Scott A. Vanstone. 73-82 [doi]
- Wyner's Analog Encryption Scheme: Results of a SimulationBurton S. Kaliski Jr.. 83-94 [doi]
- On Rotation Group and Encryption of Analog SignalsSu-Shing Chen. 95-100 [doi]
- The History of Book CiphersAlbert C. Leighton, Stephen M. Matyas. 101-113 [doi]
- An Update on Factorization at Sandia National Laboratories (Abstract)James A. Davis, Diane B. Holdridge. 114 [doi]
- An LSI Digital Encryption Processor (DEP)R. C. Fairfield, A. Matusevich, J. Plany. 115-143 [doi]
- Efficient Hardware and Software Implementations for the DESMarc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater. 144-146 [doi]
- Efficient Hardware Implementation of the DESFrank Hoornaert, Jo Goubert, Yvo Desmedt. 147-173 [doi]
- A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-PropagationNorman Proctor. 174-190 [doi]
- Efficient and Secure Pseudo-Random Number GenerationUmesh V. Vazirani, Vijay V. Vazirani. 193-202 [doi]
- An LSI Random Number Generator (RNG)R. C. Fairfield, R. L. Mortenson, K. B. Coulthart. 203-230 [doi]
- Generalized Linear Threshold SchemeSuresh C. Kothari. 231-241 [doi]
- Security of Ramp SchemesG. R. Blakley, Catherine Meadows. 242-268 [doi]
- A Fast Pseudo Random Permutation Generator With Applications to CryptologySelim G. Akl, Henk Meijer. 269-275 [doi]
- On the Cryptographic Applications of Random FunctionsOded Goldreich, Shafi Goldwasser, Silvio Micali. 276-288 [doi]
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial InformationManuel Blum, Shafi Goldwasser. 289-302 [doi]
- RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) SecureBenny Chor, Oded Goldreich. 303-313 [doi]
- Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic ObjectsG. R. Blakley. 314-338 [doi]
- Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract)Alan G. Konheim. 339-341 [doi]
- Breaking Iterated KnapsacksErnest F. Brickell. 342-358 [doi]
- Dependence of Output on Input in DES: Small Avalanche CharacteristicsYvo Desmedt, Jean-Jacques Quisquater, Marc Davio. 359-376 [doi]
- DES Has No Per Round Linear FactorsJames A. Reeds, J. L. Manferdelli. 377-389 [doi]
- A Message Authenticator Algorithm Suitable for A Mainframe ComputerDonald W. Davies. 393-400 [doi]
- Key Management for Secure Electronic Funds Transfer in a Retail EnvironmentHenry Beker, Michael Walker. 401-410 [doi]
- Authentication Theory/Coding TheoryGustavus J. Simmons. 411-431 [doi]
- New Secret Codes Can Prevent a Computerized Big Brother (Abstract)David Chaum. 432-433 [doi]
- Fair Exchange of SecretsTom Tedrick. 434-438 [doi]
- Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract)Moti Yung. 439-453 [doi]
- Poker ProtocolsSteven Fortune, Michael Merritt. 454-464 [doi]
- A Paradoxical Solution to the Signature Problem (Abstract)Shafi Goldwasser, Silvio Micali, Ronald L. Rivest. 467 [doi]
- Sequence Complexity as a Test for Cryptographic SystemsA. K. Leung, Stafford E. Tavares. 468-474 [doi]
- An Update on Quantum CryptographyCharles H. Bennett, Gilles Brassard. 475-480 [doi]
- How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold SystemsDavid Chaum. 481-485 [doi]