| 1993 | Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings Ernest F. Brickell |
| 1992 | A High-Speed DES Implementation for Network Applications. Hans Eberle |
| 1992 | A Quadratic Sieve on the n-Dimensional Cube. René Peralta |
| 1992 | An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z Tatsuaki Okamoto, Atsushi Fujioka, Eiichiro Fujisaki |
| 1992 | An l-Span Generalized Secret Sharing Scheme. Lein Harn, Hung-Yu Lin |
| 1992 | Certifying Cryptographic Tools: The Case of Trapdoor Permutations. Mihir Bellare, Moti Yung |
| 1992 | Content-Addressable Search Engines and DES-like Systems. Peter C. Wayner |
| 1992 | DES is not a Group. Keith W. Campbell, Michael J. Wiener |
| 1992 | Designing and Detecting Trapdoors for Discrete Log Cryptosystems. Daniel M. Gordon |
| 1992 | Differential Cryptanalysis of the Full 16-Round DES. Eli Biham, Adi Shamir |
| 1992 | Efficient Multiplication on Certain Nonsupersingular Elliptic Curves. Willi Meier, Othmar Staffelbach |
| 1992 | FFT-Hash-II is not yet Collision-free. Serge Vaudenay |
| 1992 | Fair Public-Key Cryptosystems. Silvio Micali |
| 1992 | Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract). Shafi Goldwasser, Rafail Ostrovsky |
| 1992 | Iterative Characteristics of DES and s²-DES. Lars R. Knudsen |
| 1992 | Kid Krypto. Michael R. Fellows, Neal Koblitz |
| 1992 | Low Communication 2-Prover Zero-Knowledge Proofs for NP. Cynthia Dwork, Uriel Feige, Joe Kilian, Moni Naor, Shmuel Safra |
| 1992 | Making Electronic Refunds Safer. Rafael Hirschfeld |
| 1992 | Massively Parallel Computation of Discrete Logarithms. Daniel M. Gordon, Kevin S. McCurley |
| 1992 | Necessary and Sufficient Conditions For Collision-Free Hashing. Alexander Russell |
| 1992 | New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann |
| 1992 | New General Lower Bounds on the Information Rate of Secret Sharing Schemes. Douglas R. Stinson |
| 1992 | Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). Yair Frankel, Yvo Desmedt, Mike Burmester |
| 1992 | On Defining Proofs of Knowledge. Mihir Bellare, Oded Goldreich |
| 1992 | On Generation of Probable Primes By Incremental Search. Jørgen Brandt, Ivan Damgård |
| 1992 | On the Design of SP Networks From an Information Theoretic Point of View. M. Sivabalan, Stafford E. Tavares, Lloyd E. Peppard |
| 1992 | On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract). Kouichi Sakurai, Toshiya Itoh |
| 1992 | On the Information Rate of Secret Sharing Schemes (Extended Abstract). Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
| 1992 | On the Security of the Permuted Kernel Identification Scheme. Thierry Baritaud, Mireille Campana, Pascal Chauvaud, Henri Gilbert |
| 1992 | Partially-Bent Functions. Claude Carlet |
| 1992 | Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung |
| 1992 | Perfectly-Secure Key Distribution for Dynamic Conferences. Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung |
| 1992 | Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). Yuliang Zheng, Jennifer Seberry |
| 1992 | Pricing via Processing or Combatting Junk Mail. Cynthia Dwork, Moni Naor |
| 1992 | Protocols for Secret Key Agreement by Public Discussion Based on Common Information. Ueli M. Maurer |
| 1992 | Provable Security Against Differential Cryptanalysis. Kaisa Nyberg, Lars R. Knudsen |
| 1992 | Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Tatsuaki Okamoto |
| 1992 | Provably Unforgeable Signatures. Jurjen N. Bos, David Chaum |
| 1992 | Pubic Randomness in Cryptography. Amir Herzberg, Michael Luby |
| 1992 | Response to Comments of the NIST Proposed Digital Signature Standard. Miles E. Smid, Dennis K. Branstad |
| 1992 | Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. Kenji Koyama, Yukio Tsuruoka |
| 1992 | Threshold Schemes with Disenrollment. Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey |
| 1992 | Universally Ideal Secret Sharing Schemes (Preliminary Version). Amos Beimel, Benny Chor |
| 1992 | Wallet Databases with Observers. David Chaum, Torben Pryds Pedersen |