| 1982 | Advances in Cryptology: A Report on CRYPTO 81, CRYPTO 81, IEEE Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981. Allen Gersho |
| 1981 | A General Public Key System. Ernst Henze |
| 1981 | A Password Extension for Improved Human Factors. Sig Porter |
| 1981 | A Polynomial Time Solution for Compact Knapsacks. Hamid R. Amirazizi, Ehud D. Karnin, Justin M. Reyneri |
| 1981 | A System for Point-of-Sale or Access User Authentication and Identification. Gustavus J. Simmons |
| 1981 | An Optimally Secure Relativized Cryptosystem. Gilles Brassard |
| 1981 | Coin Flipping by Telephone. Manuel Blum |
| 1981 | Cryptography, the Next Two Decades. Whitfield Diffie |
| 1981 | Current Market: Products, Costs, Trends. J. Michael Nye |
| 1981 | DES '81: An Update. Miles E. Smid |
| 1981 | Digital Signature Scheme for Computer Communication Networks. Henk Meijer, Selim G. Akl |
| 1981 | Discussion of Adleman's Subexponential Algorithm for Computing Discrete Logarithms. Tore Herlestam |
| 1981 | Evaluating Relative Security of Commercial ComSec Devices. Albert L. Lang, Janet T. Vasek |
| 1981 | High-Speed Hardware Implementation of the Knapsack Cipher. Paul S. Henry, R. D. Nash |
| 1981 | Implementation of a Hybrid {RSA/DES} Key Management System. Y. Alfred Lau, Tom McPherson |
| 1981 | Key Management from a Security Viewpoint. G. R. Blakley |
| 1981 | Limitations on the Use of Encryption to Enforce Mandatory Security. Morrie Gasser |
| 1981 | Local Network Cryptosystem Architecture. Thomas A. Berson |
| 1981 | Memo: A Hybrid Approach to Encrypted Electronic Mail. Brian P. Schanning, J. Kowalchuk |
| 1981 | National Security and Commercial Security: Division of Responsibility. Whitfield Diffie, Melville Klein, Michael L. Dertouzos, Andrew Gleason, Dean Smith |
| 1981 | Nonlinear Feedback Shift Register Sequences. H. J. Beker |
| 1981 | On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis. Martin E. Hellman, Ehud D. Karnin, Justin M. Reyneri |
| 1981 | One-way Sequence for Transaction Verification. Alan G. Konheim |
| 1981 | Primality Testing. Leonard M. Adleman |
| 1981 | Protocol for Signing Contracts. Shimon Even |
| 1981 | Results on Sampling-based Scrambling for Secure Speech Communication. Lin-Shan Lee, Ger-Chih Chou |
| 1981 | Scrambling and Randomization. Subhash C. Kak |
| 1981 | Security Mechanisms in Electronic Cards. Stephen B. Weinstein |
| 1981 | Software Protection Using "Communal Key Cryptosystems". George B. Purdy, Gustavus J. Simmons, James Studier |
| 1981 | Some Comments on the Knapsack Problem. Ingemar Ingemarsson |
| 1981 | Some Cryptographic Techniques for File Protection. Stephen T. Kent |
| 1981 | Some Regular Properties of the DES. Donald W. Davies |
| 1981 | Some Thoughts on Speech Encryption. Aaron D. Wyner |
| 1981 | Subtractive Encryptors - Alternatives to the DES. Don R. Morrison |
| 1981 | The Design and Analysis of Cryptographic Protocols. Richard A. DeMillo, Nancy A. Lynch, Michael Merritt |
| 1981 | The Generation of Cryptographically Strong Pseudo-Random Sequences. Adi Shamir |
| 1981 | The Import/Export Dilemma. J. Michael Nye |
| 1981 | Time-Memory-Processor Tradeoffs. Hamid R. Amirazizi, Martin E. Hellman |
| 1981 | Towards a Design Procedure for Cryptosecure Substitution Boxes. J. A. Gordon |
| 1981 | Variant of a Public Key Cryptosystem Based on Goppa Codes. John P. Jordan |
| 1981 | Verification by Anonymous Monitors. David Chaum |