| 1983 | Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982. David Chaum, Ronald L. Rivest, Alan T. Sherman |
| 1982 | A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography. Ernest F. Brickell |
| 1982 | A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem. Adi Shamir |
| 1982 | A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems. Ernest F. Brickell, James A. Davis, Gustavus J. Simmons |
| 1982 | A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem. Ravi Janardan, K. B. Lakshmanan |
| 1982 | A Randomized Protocol for Signing Contracts. Shimon Even, Oded Goldreich, Abraham Lempel |
| 1982 | A Short Report on the RSA Chip. Ronald L. Rivest |
| 1982 | Analysis of Certain Aspects of Output Feedback Mode. Robert R. Jueneman |
| 1982 | Blind Signatures for Untraceable Payments. David Chaum |
| 1982 | Comparison of Two Pseudo-Random Number Generators. Lenore Blum, Manuel Blum, Mike Shub |
| 1982 | Cryptographic Protection of Personal Data Cards. Christian Müller-Schloer, Neal R. Wagner |
| 1982 | Cryptographic Solution to a Multilevel Security Problem. Selim G. Akl, Peter D. Taylor |
| 1982 | Drainage and the DES. Martin E. Hellman, Justin M. Reyneri |
| 1982 | Fast Computation of Discrete Logarithms in GF(q). Martin E. Hellman, Justin M. Reyneri |
| 1982 | Implementing an Electronic Notary Public. Leonard M. Adleman |
| 1982 | Inferring a Sequence Produced by a Linear Congruence. Joan B. Plumstead |
| 1982 | Infinite Structures in Information Theory. G. R. Blakley, Laif Swanson |
| 1982 | Key Reconstruction. Michael Merritt |
| 1982 | Local Network Cryptosystem Architecture: Access Control. Thomas A. Berson |
| 1982 | Long Key Variants of DES. Thomas A. Berson |
| 1982 | Non-Public Key Distribution. Rolf Blom |
| 1982 | Nondeterministic Cryptography. Carl Nicolai |
| 1982 | On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem. Leonard M. Adleman |
| 1982 | On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys. Gilles Brassard |
| 1982 | On Signatures and Authentication. Shafi Goldwasser, Silvio Micali, Andrew Chi-Chih Yao |
| 1982 | On the Security of Multi-Party Ping-Pong Protocols. Shimon Even, Oded Goldreich |
| 1982 | On the Security of Multi-Party Protocols in Distributed Systems. Danny Dolev, Avi Wigderson |
| 1982 | On the Security of Ping-Pong Protocols. Danny Dolev, Shimon Even, Richard M. Karp |
| 1982 | Quantum Cryptography, or Unforgeable Subway Tokens. Charles H. Bennett, Gilles Brassard, Seth Breidbart, Stephen Wiesner |
| 1982 | Randomized Encryption Techniques. Ronald L. Rivest, Alan T. Sherman |
| 1982 | Security of a Keystream Cipher with Secret Initial Value. Robert S. Winternitz |
| 1982 | Some Regular Properties of the 'Data Encryption Standard' Algorithm. Donald W. Davies |
| 1982 | Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2 Ernest F. Brickell, Judy H. Moore |
| 1982 | The Average Cycle Size of the Key Stream in Output Feedback Encipherment. Donald W. Davies, Graeme I. P. Parkin |
| 1982 | The Use of Public-Key Cryptography for Signing Checks. Luc Longpré |
| 1982 | Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes. G. M. Avis, Stafford E. Tavares |