| 1988 | Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings Carl Pomerance |
| 1987 | A Combinatorial Approach to Threshold Schemes. Douglas R. Stinson, Scott A. Vanstone |
| 1987 | A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs. Douglas R. Stinson |
| 1987 | A Crypto-Engine. George I. Davida, Frank B. Dancs |
| 1987 | A Digital Signature Based on a Conventional Encryption Function. Ralph C. Merkle |
| 1987 | A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract). Pierre Beauchemin, Gilles Brassard |
| 1987 | A Natural Taxonomy for Digital Information Authentication Schemes. Gustavus J. Simmons |
| 1987 | A Realization Scheme for the Identity-Based Cryptosystem. Hatsukazu Tanaka |
| 1987 | A Simple and Secure Way to Show the Validity of Your Public Key. Jeroen van de Graaf, René Peralta |
| 1987 | A Study of Password Security. Michael Luby, Charles Rackoff |
| 1987 | A Video Scrambling Technique Based On Space Filling Curves. Yossi Matias, Adi Shamir |
| 1987 | An Impersonation-Proof Identity Verfication Scheme. Gustavus J. Simmons |
| 1987 | Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. Richard A. Kemmerer |
| 1987 | Arbitration in Tamper Proof Systems. George I. Davida, Brian J. Matt |
| 1987 | Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. Yacov Yacobi |
| 1987 | Components and Cycles of a Random Function. John M. DeLaurentis |
| 1987 | Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. Zvi Galil, Stuart Haber, Moti Yung |
| 1987 | Cryptosystems Based on an Analog of Heat Flow. G. R. Blakley, William Rundell |
| 1987 | Direct Minimum-Knowledge Computations. Russell Impagliazzo, Moti Yung |
| 1987 | Efficient Digital Public-Key Signature with Shadow (Abstract). Louis C. Guillou, Jean-Jacques Quisquater |
| 1987 | Equivalence Between Two Flavours of Oblivious Transfers. Claude Crépeau |
| 1987 | Fast Spectral Tests for Measuring Nonrandomness and the DES. Frank A. Feldman |
| 1987 | Gradual and Verifiable Release of a Secret. Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf |
| 1987 | How to Make Replicated Data Secure. Maurice Herlihy, J. D. Tygar |
| 1987 | How to Solve any Protocol Problem - An Efficiency Improvement. Oded Goldreich, Ronen Vainish |
| 1987 | Identity-based Conference Key Distribution Systems. Kenji Koyama, Kazuo Ohta |
| 1987 | Integrating Cryptography in ISDN. Kåre Presttun |
| 1987 | Key Distribution Systems Based on Identification Information. Eiji Okamoto |
| 1987 | Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. David Chaum, Ivan Damgård, Jeroen van de Graaf |
| 1987 | Multiparty Unconditionally Secure Protocols (Abstract). David Chaum, Claude Crépeau, Ivan Damgård |
| 1987 | Non-Interactive Zero-Knowledge Proof Systems. Alfredo De Santis, Silvio Micali, Giuseppe Persiano |
| 1987 | On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme. T. R. N. Rao |
| 1987 | On the F-function of FEAL. Walter Fumy |
| 1987 | On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. Tsutomu Matsumoto, Hideki Imai |
| 1987 | Other Cycling Tests for DES (Abstract). Jean-Jacques Quisquater, Jean-Paul Delescaille |
| 1987 | Patterns of Entropy Drop of the Key in an S-Box of the DES. Kencheng Zeng, Jun-Hui Yang, Z. T. Dai |
| 1987 | Secret Distribution of Keys for Public-Key Systems. Jean-Jacques Quisquater |
| 1987 | Secure Audio Teleconference. Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi |
| 1987 | Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. Carlisle M. Adams, Henk Meijer |
| 1987 | Society and Group Oriented Cryptography: A New Concept. Yvo Desmedt |
| 1987 | Special Uses and Abuses of the Fiat-Shamir Passport Protocol. Yvo Desmedt, Claude Goutier, Samy Bengio |
| 1987 | Standards for Data Security - A Change of Direction. Wyn L. Price |
| 1987 | Strong Practical Protocols. Judy H. Moore |
| 1987 | The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack. René Struik, Johan van Tilburg |