| 1984 | Advances in Cryptology, Proceedings of CRYPTO '83, Santa Barbara, California, USA, August 21-24, 1983. David Chaum |
| 1983 | A Layered Broadcast Cryptographic System. M. E. Spencerr, S. E. Travares |
| 1983 | A Simple Protocol for Signing Contracts. Oded Goldreich |
| 1983 | A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p²). Taher El Gamal |
| 1983 | An Overview of Factoring. Hugh C. Williams |
| 1983 | Analytical Characteristics of the DES. Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters |
| 1983 | Blind Signature System. David Chaum |
| 1983 | Design Concepts for Tamper Responding Systems. David Chaum |
| 1983 | Electronic Wallet. Shimon Even, Oded Goldreich |
| 1983 | Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems. Ernest F. Brickell, J. C. Lagarias, Andrew M. Odlyzko |
| 1983 | Factoring Numbers on the Massively Parallel Computer. Marvin C. Wunderlich |
| 1983 | Factorization Using the Quadratic Sieve Algorithm. James A. Davis, Diane B. Holdridge |
| 1983 | Field Encryption and Authentication. Dorothy E. Denning |
| 1983 | How to Exchange Half a Bit. Tom Tedrick |
| 1983 | Improving the Security of Exponential Key Exchange. Bahaa W. Fam |
| 1983 | Knapsack Public Key Cryptosystems and Diophantine Approximation. J. C. Lagarias |
| 1983 | New Ideas for Factoring Large Integers. Carl Pomerance, Jeffrey W. Smith, Samuel S. Wagstaff Jr. |
| 1983 | On the Power of Cascade Ciphers. Shimon Even, Oded Goldreich |
| 1983 | On the Security of Compressed Encodings. Selim G. Akl |
| 1983 | Permutation Polynomials in RSA-Cryptosystems. Rudolf Lidl, Winfried B. Müller |
| 1983 | Probabilistic Analysis and Performance Modelling of the 'Swedish' Algorithm and Modifications. Joel E. Sachs, Shimshon Berkovits |
| 1983 | Producing a One-Way Hash Function from DES. Robert S. Winternitz |
| 1983 | RSA Bits are 732+epsilon Secure. Umesh V. Vazirani, Vijay V. Vazirani |
| 1983 | Reducibility Among Protocols. Manuel Blum, Umesh V. Vazirani, Vijay V. Vazirani |
| 1983 | Shift-Register Synthesis (Modula m). James A. Reeds, Neil J. A. Sloane |
| 1983 | Signatures through Approximate Representation by Quadratic Forms. H. Ong, Claus-Peter Schnorr |
| 1983 | Solving Low Density Knapsacks. Ernest F. Brickell |
| 1983 | Some Results on the Information Theoretic Analysis of Cryptosystems. Helmut Jürgensen, D. E. Matthew |
| 1983 | The Prisoners' Problem and the Subliminal Channel. Gustavus J. Simmons |
| 1983 | Use of the 'Signature Token' to Create a Negotiable Document. Donald W. Davies |