| 1985 | Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings G. R. Blakley, David Chaum |
| 1984 | A "Paradoxical'"Solution to the Signature Problem (Abstract). Shafi Goldwasser, Silvio Micali, Ronald L. Rivest |
| 1984 | A Fast Pseudo Random Permutation Generator With Applications to Cryptology. Selim G. Akl, Henk Meijer |
| 1984 | A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. Benny Chor, Ronald L. Rivest |
| 1984 | A Message Authenticator Algorithm Suitable for A Mainframe Computer. Donald W. Davies |
| 1984 | A Prototype Encryption System Using Public Key. Stephen C. Serpell, C. B. Brookson, B. L. Clark |
| 1984 | A Public Key Cryptosystem Based on the Word Problem. Neal R. Wagner, Marianne R. Magyarik |
| 1984 | A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Taher El Gamal |
| 1984 | A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. Norman Proctor |
| 1984 | An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. Manuel Blum, Shafi Goldwasser |
| 1984 | An LSI Digital Encryption Processor (DEP). Robert C. Fairfield, Alex Matusevich, Joseph Plany |
| 1984 | An LSI Random Number Generator (RNG). Robert C. Fairfield, Robert L. Mortenson, K. B. Coulthart |
| 1984 | An Update on Factorization at Sandia National Laboratories (Abstract). James A. Davis, Diane B. Holdridge |
| 1984 | An Update on Quantum Cryptography. Charles H. Bennett, Gilles Brassard |
| 1984 | Authentication Theory/Coding Theory. Gustavus J. Simmons |
| 1984 | Breaking Iterated Knapsacks. Ernest F. Brickell |
| 1984 | Computing Logarithms in GF(2 Ian F. Blake, Ronald C. Mullin, Scott A. Vanstone |
| 1984 | Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). Alan G. Konheim |
| 1984 | Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract). Moti Yung |
| 1984 | DES Has No Per Round Linear Factors. James A. Reeds, John L. Manferdelli |
| 1984 | Dependence of Output on Input in DES: Small Avalanche Characteristics. Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio |
| 1984 | Efficient Hardware Implementation of the DES. Frank Hoornaert, Jo Goubert, Yvo Desmedt |
| 1984 | Efficient Hardware and Software Implementations for the DES. Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater |
| 1984 | Efficient Signature Schemes Based on Polynomial Equations. H. Ong, Claus-Peter Schnorr, Adi Shamir |
| 1984 | Efficient and Secure Pseudo-Random Number Generation. Umesh V. Vazirani, Vijay V. Vazirani |
| 1984 | Fair Exchange of Secrets. Tom Tedrick |
| 1984 | Generalized Linear Threshold Scheme. Suresh C. Kothari |
| 1984 | How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. David Chaum |
| 1984 | Identity-Based Cryptosystems and Signature Schemes. Adi Shamir |
| 1984 | Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. G. R. Blakley |
| 1984 | Key Management for Secure Electronic Funds Transfer in a Retail Environment. Henry Beker, Michael Walker |
| 1984 | New Secret Codes Can Prevent a Computerized Big Brother (Abstract). David Chaum |
| 1984 | On Rotation Group and Encryption of Analog Signals. Su-shing Chen |
| 1984 | On the Cryptographic Applications of Random Functions. Oded Goldreich, Shafi Goldwasser, Silvio Micali |
| 1984 | Poker Protocols. Steven Fortune, Michael Merritt |
| 1984 | RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. Benny Chor, Oded Goldreich |
| 1984 | Security of Ramp Schemes. G. R. Blakley, Catherine Meadows |
| 1984 | Sequence Complexity as a Test for Cryptographic Systems. A. K. Leung, Stafford E. Tavares |
| 1984 | Some Public Key Crypto-Functions as Intractable as Factorization. Hugh C. Williams |
| 1984 | The History of Book Ciphers. Albert C. Leighton, Stephen M. Matyas |
| 1984 | Wyner's Analog Encryption Scheme: Results of a Simulation. Burton S. Kaliski Jr. |