Abstract is missing.
- On Cryptosystems Based on Polynomials and Finite FieldsRudolf Lidl. 10-15 [doi]
- Algebraical Structures of Cryptographic TransformationsJosef Pieprzyk. 16-24 [doi]
- Non-Linear Non-Commutative Functions for Data IntegritySami Harari. 25-32 [doi]
- Wire-Tap Channel IILawrence H. Ozarow, Aaron D. Wyner. 33-50 [doi]
- Equivolcations for Homophonic CiphersAndrea Sgarro. 51-61 [doi]
- Linear Ciphers and Random Sequence Generators with Multiple ClocksJames L. Massey, Rainer A. Rueppel. 74-87 [doi]
- The Stop-and-Go GeneratorThomas Beth, Fred Piper. 88-92 [doi]
- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift RegistersDieter Gollmann. 93-98 [doi]
- RSA-Bits are 0.5 + epsilon SecureClaus-Peter Schnorr, Werner Alexi. 113-126 [doi]
- On the Number of Close-and-Equal Pairs of Bits in a StringOded Goldreich. 127-141 [doi]
- Fast Cryptanalysis of the Matsumoto-Imai Public Key SchemePhilippe Delsarte, Yvo Desmedt, Andrew M. Odlyzko, Philippe Piret. 142-149 [doi]
- RSA Chips (Past/Present/Future)Ronald L. Rivest. 159-165 [doi]
- The Quadratic Sieve Factoring AlgorithmCarl Pomerance. 169-182 [doi]
- Status Report on Factoring (At the Sandia National Laboratories)James A. Davis, Diane B. Holdridge, Gustavus J. Simmons. 183-215 [doi]
- Strong Primes are Easy to FindJohn Gordon. 216-223 [doi]
- Discrete Logarithms in Finite Fields and Their Cryptographic SignificanceAndrew M. Odlyzko. 224-314 [doi]
- User Functions for the Generation and Distribution of Encipherment KeysR. W. Jones. 317-334 [doi]
- On the Use of the Binary Multiplying Channel in a Private Communication SystemBen J. M. Smeets. 339-348 [doi]
- Secrecy and Privacy in a Local Area Network EnvironmentGordon B. Agnew. 349-363 [doi]
- A Provably Secure Oblivious Transfer ProtocolRichard Berger, René Peralta, Tom Tedrick. 379-386 [doi]
- On Concurrent Identification ProtocolsOded Goldreich. 387-396 [doi]
- Encryption and Key Manaagement for the ECS Satellite ServiceS. C. Serpell, C. B. Brookson. 426-436 [doi]
- An Encryption and Authentication Procedure for Telesurveillance SystemsOdoardo Brugia, Salvatore Improta, William Wolfowicz. 437-445 [doi]
- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic TechniquesIngrid Schaumüller-Bichl, Ernst Piller. 446-454 [doi]
- Bull CP8 Smart Card Uses in CryptologyYves Giradot. 464-469 [doi]
- Smart Cards and Conditional AccessLouis C. Guillou. 480-489 [doi]