Abstract is missing.
- Structure in the S-boxes of the DESErnest F. Brickell, Judy H. Moore, M. R. Purtill. 3-8 [doi]
- Cycle Structures of the DES with Weak and Semi-Weak KeysJudy H. Moore, Gustavus J. Simmons. 9-32 [doi]
- Private-Key Algebraic-Coded CryptosystemsT. R. N. Rao, Kil-Hyun Nam. 35-48 [doi]
- Some Variations on RSA Signatures and Their SecurityWiebren de Jonge, David Chaum. 49-59 [doi]
- Breaking the Cade CipherN. S. James, Rudolf Lidl, Harald Niederreiter. 60-63 [doi]
- A Modification of a Broken Public-Key CipherJohn J. Cade. 64-83 [doi]
- A Pseudo-Random Bit Generator Based on Elliptic LogarithmsBurton S. Kaliski Jr.. 84-103 [doi]
- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature SchemeOded Goldreich. 104-110 [doi]
- Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?)Yvo Desmedt, Jean-Jacques Quisquater. 111-117 [doi]
- A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between OrganizationsDavid Chaum, Jan-Hendrik Evertse. 118-167 [doi]
- How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol DesignOded Goldreich, Silvio Micali, Avi Wigderson. 171-185 [doi]
- How to Prove Yourself: Practical Solutions to Identification and Signature ProblemsAmos Fiat, Adi Shamir. 186-194 [doi]
- Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About HowDavid Chaum. 195-199 [doi]
- Demonstrating Possession of a Discrete Logarithm Without Revealing ItDavid Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta. 200-212 [doi]
- Cryptographic Capsules: A Disjunctive Primative for Interactive ProtocolsJosh Cohen Benaloh. 213-222 [doi]
- Zero-Knowledge Simulation of Boolean CircuitsGilles Brassard, Claude Crépeau. 223-233 [doi]
- All-or-Nothing Disclosure of SecretsGilles Brassard, Claude Crépeau, Jean-Marc Robert. 234-238 [doi]
- A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players Strategy or How to Achieve an Electronic Poker FaceClaude Crépeau. 239-247 [doi]
- Secret Sharing Homomorphisms: Keeping Shares of A Secret SharingJosh Cohen Benaloh. 251-260 [doi]
- How to Share a Secret with CheatersMartin Tompa, Heather Woll. 261-265 [doi]
- Smallest Possible Message Expansion in Threshold SchemesG. R. Blakley, R. D. Dixon. 266-274 [doi]
- VLSI Implementation of Public-Key Encryption AlgorithmsGlenn A. Orton, M. P. Roy, P. A. Scott, Lloyd E. Peppard, Stafford E. Tavares. 277-301 [doi]
- Architectures for Exponentiation in GF(2:::n:::)Thomas Beth, B. M. Cook, Dieter Gollmann. 302-310 [doi]
- Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal ProcessorPaul Barrett. 311-323 [doi]
- A High Speed Manipulation Detection CodeRobert R. Jueneman. 327-346 [doi]
- Electronic Funds Transfer Point of Sale in AustraliaRalph Gyoery, Jennifer Seberry. 347-377 [doi]
- The Notion of Security for Probabilistic CryptosystemsSilvio Micali, Charles Rackoff, Bob Sloan. 381-392 [doi]
- Large-Scale Randomization TechniquesNeal R. Wagner, Paul Putter, Marianne R. Cain. 393-404 [doi]
- On the Linear Span of binary Sequences Obtained from Finite GeometriesAgnes Hui Chan, Richard A. Games. 405-417 [doi]
- Some Constructions and Bounds for authentication CodesDouglas R. Stinson. 418-425 [doi]
- Towards a Theory of Software ProtectionOded Goldreich. 426-439 [doi]
- Two Observations on Probabilistic Primality TestingPierre Beauchemin, Gilles Brassard, Claude Crépeau. 443-450 [doi]
- Public-Key RegistrationStephen M. Matyas. 451-458 [doi]
- Is There an ultimate Use of Cryptography?Yvo Desmedt. 459-463 [doi]
- Smart Card, a Highly Reliable and Portable Security DeviceLouis C. Guillou, Michel Ugon. 464-479 [doi]
- THOMAS - A Complete Single Chip RSA DeviceGordon Rankine. 480-487 [doi]