| 1995 | Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Josef Pieprzyk, Reihaneh Safavi-Naini |
| 1994 | A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. Miodrag J. Mihaljevic |
| 1994 | A Digital Signature Scheme Based on Linear Error-correcting Block Codes. Mohssen Alabbadi, Stephen B. Wicker |
| 1994 | A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. Peter Smith, Christopher Skinner |
| 1994 | A Unified Markow Approach to Differential and Linear Cryptanalysis. Luke O'Connor, Jovan Dj. Golic |
| 1994 | Attacking the SL Chris Charnes, Josef Pieprzyk |
| 1994 | Can One Design a Signature Scheme Based on Error-Correctin Codes? Jacques Stern |
| 1994 | Collisions and Inversions for Damgård's Whole Hash Function. Jacques Patarin |
| 1994 | Combinatorial Interpretation of Secret Sharing Schemes. Kaoru Kurosawa, Koji Okada |
| 1994 | Combinatorial Structure of A-codes with r-fold Security. Reihaneh Safavi-Naini, Leonid M. Tombak |
| 1994 | Cryptanalysis of Multiple Modes of Operation. Eli Biham |
| 1994 | DESV-1: A Variation of the Data Encryption Standard (DES). Gary Carter, Andrew J. Clark, Lauren Nielsen |
| 1994 | Design and Analysis of Key Exchange Protocols via Secure Channel Identification. Colin Boyd, Wenbo Mao |
| 1994 | Efficient Electronic Money (Extended Abstract). Yacov Yacobi |
| 1994 | Factoring: The DNA Solution. Donald Beaver |
| 1994 | Formal Verification of Cryptographic Protocols: A Survey. Catherine A. Meadows |
| 1994 | Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. Masayuki Abe, Hikaru Morita |
| 1994 | How to Prevent Buying of Votes in Computer Elections. Valtteri Niemi, Ari Renvall |
| 1994 | How to Strengthen DES Using Existing Hardware. Eli Biham, Alex Biryukov |
| 1994 | Incidence Structures for Key Sharing (Extended Abstract). Tsutomu Matsumoto |
| 1994 | Information Security Aspects of Spread Spectrum Systems. Hideki Imai |
| 1994 | Intrinsic Statistical Weakness of Keystream Generators. Jovan Dj. Golic |
| 1994 | Linear Cryptanalysis of LOKI and s Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui |
| 1994 | Low Exponent Attack against Elliptic Curve RSA. Kaoru Kurosawa, Koji Okada, Shigeo Tsujii |
| 1994 | Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. Koji Okada, Kaoru Kurosawa |
| 1994 | Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. Patrick Horster, Markus Michels, Holger Petersen |
| 1994 | Multifeature Security through Homomorphic Encryption. Thomas Beth |
| 1994 | Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester |
| 1994 | On Sharing Many Secrets (Extended Abstract). Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
| 1994 | On the Linear Complexity of Nonlinear Filtered PN-sequences. Amparo Fúster-Sabater, Pino Caballero-Gil |
| 1994 | Secure Acceleration of DSS Signatures Using Insecure Server. Philippe Béguin, Jean-Jacques Quisquater |
| 1994 | Security of the Center in Key Distribution Schemes. Kaoru Kurosawa, Koji Okada, Keiichi Sakano |
| 1994 | Semi-bent Functions. Seongtaek Chee, Sangjin Lee, Kwangjo Kim |
| 1994 | Some Cryptographic Properties of Exponential Functions. Xingong Chang, Zong-Duo Dai, Guang Gong |
| 1994 | Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng |
| 1994 | The Magic Words are Squeamish Ossifrage. Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul C. Leyland |
| 1994 | Zero-Knowledge Proofs of Computational Power in the Shared String Model. Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano |