| 1987 | Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings Andrew M. Odlyzko |
| 1986 | A High Speed Manipulation Detection Code. Robert R. Jueneman |
| 1986 | A Modification of a Broken Public-Key Cipher. John J. Cade |
| 1986 | A Pseudo-Random Bit Generator Based on Elliptic Logarithms. Burton S. Kaliski Jr. |
| 1986 | A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. David Chaum, Jan-Hendrik Evertse |
| 1986 | A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. Claude Crépeau |
| 1986 | All-or-Nothing Disclosure of Secrets. Gilles Brassard, Claude Crépeau, Jean-Marc Robert |
| 1986 | Architectures for Exponentiation in GF(2 Thomas Beth, B. M. Cook, Dieter Gollmann |
| 1986 | Breaking the Cade Cipher. N. S. James, Rudolf Lidl, Harald Niederreiter |
| 1986 | Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. Josh Cohen Benaloh |
| 1986 | Cycle Structures of the DES with Weak and Semi-Weak Keys. Judy H. Moore, Gustavus J. Simmons |
| 1986 | Demonstrating Possession of a Discrete Logarithm Without Revealing It. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta |
| 1986 | Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How. David Chaum |
| 1986 | Electronic Funds Transfer Point of Sale in Australia. Ralph Gyoery, Jennifer Seberry |
| 1986 | How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Amos Fiat, Adi Shamir |
| 1986 | How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. Oded Goldreich, Silvio Micali, Avi Wigderson |
| 1986 | How to Share a Secret with Cheaters. Martin Tompa, Heather Woll |
| 1986 | Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. Paul Barrett |
| 1986 | Is There an ultimate Use of Cryptography? Yvo Desmedt |
| 1986 | Large-Scale Randomization Techniques. Neal R. Wagner, Paul Putter, Marianne R. Cain |
| 1986 | On the Linear Span of binary Sequences Obtained from Finite Geometries. Agnes Hui Chan, Richard A. Games |
| 1986 | Private-Key Algebraic-Coded Cryptosystems. T. R. N. Rao, Kil-Hyun Nam |
| 1986 | Public-Key Registration. Stephen M. Matyas |
| 1986 | Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). Yvo Desmedt, Jean-Jacques Quisquater |
| 1986 | Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. Josh Cohen Benaloh |
| 1986 | Smallest Possible Message Expansion in Threshold Schemes. G. R. Blakley, R. D. Dixon |
| 1986 | Smart Card, a Highly Reliable and Portable Security Device. Louis C. Guillou, Michel Ugon |
| 1986 | Some Constructions and Bounds for authentication Codes. Douglas R. Stinson |
| 1986 | Some Variations on RSA Signatures and Their Security. Wiebren de Jonge, David Chaum |
| 1986 | Structure in the S-boxes of the DES. Ernest F. Brickell, Judy H. Moore, M. R. Purtill |
| 1986 | THOMAS - A Complete Single Chip RSA Device. Gordon Rankine |
| 1986 | The Notion of Security for Probabilistic Cryptosystems. Silvio Micali, Charles Rackoff, Bob Sloan |
| 1986 | Towards a Theory of Software Protection. Oded Goldreich |
| 1986 | Two Observations on Probabilistic Primality Testing. Pierre Beauchemin, Gilles Brassard, Claude Crépeau |
| 1986 | Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme. Oded Goldreich |
| 1986 | VLSI Implementation of Public-Key Encryption Algorithms. Glenn A. Orton, M. P. Roy, P. Andrew Scott, Lloyd E. Peppard, Stafford E. Tavares |
| 1986 | Zero-Knowledge Simulation of Boolean Circuits. Gilles Brassard, Claude Crépeau |