| 1994 | Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings Douglas R. Stinson |
| 1993 | A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii |
| 1993 | A New Identification Scheme Based on Syndrome Decoding. Jacques Stern |
| 1993 | A Subexponential Algorithm for Discrete Logarithms over All Finite Fields. Leonard M. Adleman, Jonathan DeMarrais |
| 1993 | An Implementation of the General Number Field Sieve. Johannes A. Buchmann, J. Loho, J. Zayer |
| 1993 | An Integrity Check Value Algorithm for Stream Ciphers. Richard Taylor |
| 1993 | Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. Chae Hoon Lim, Pil Joong Lee |
| 1993 | Attacks on the Birational Permutation Signature Schemes. Don Coppersmith, Jacques Stern, Serge Vaudenay |
| 1993 | Broadcast Encryption. Amos Fiat, Moni Naor |
| 1993 | Codes for Interactive Authentication. Peter Gemmell, Moni Naor |
| 1993 | Comparison of Three Modular Reduction Functions. Antoon Bosselaers, René Govaerts, Joos Vandewalle |
| 1993 | Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens |
| 1993 | Cryptographic Primitives Based on Hard Learning Problems. Avrim Blum, Merrick L. Furst, Michael J. Kearns, Richard J. Lipton |
| 1993 | Differential Attack on Message Authentication Codes. Kazuo Ohta, Mitsuru Matsui |
| 1993 | Differential Cryptanalysis of Lucifer. Ishai Ben-Aroya, Eli Biham |
| 1993 | Discreet Solitary Games. Claude Crépeau, Joe Kilian |
| 1993 | Efficient Signature Schemes Based on Birational Permutations. Adi Shamir |
| 1993 | Entity Authentication and Key Distribution. Mihir Bellare, Phillip Rogaway |
| 1993 | Extensions of Single-term Coins. Niels Ferguson |
| 1993 | Fully Dynamic Secret Sharing Schemes. Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro |
| 1993 | Hash Functions Based on Block Ciphers: A Synthetic Approach. Bart Preneel, René Govaerts, Joos Vandewalle |
| 1993 | Improved Algorithms for the Permuted Kernel Problem. Jacques Patarin, Pascal Chauvaud |
| 1993 | Interaction in Key Distribution Schemes (Extended Abstract). Amos Beimel, Benny Chor |
| 1993 | Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). Ivan Damgård |
| 1993 | Joint Encryption and Message-Efficient Secure Computation. Matthew K. Franklin, Stuart Haber |
| 1993 | Multisecret Threshold Schemes. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
| 1993 | Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng |
| 1993 | On Families of Hash Functions via Geometric Codes and Concatenation. Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets |
| 1993 | On Message Proof Systems with Known Space Verifiers. Yonatan Aumann, Uriel Feige |
| 1993 | On the Construction of Perfect Authentication Codes that Permit Arbitration. Thomas Johansson |
| 1993 | On the Distribution of Characteristics in Composite Permutations. Luke O'Connor |
| 1993 | On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann |
| 1993 | On the Factorization of RSA-120. Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse |
| 1993 | Remark on the Threshold RSA Signature Scheme. Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
| 1993 | Secret Sharing Made Short. Hugo Krawczyk |
| 1993 | Secret Sharing and Perfect Zero Knowledge. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano |
| 1993 | Secret-Key Agreement without Public-Key Cryptography. Frank Thomson Leighton, Silvio Micali |
| 1993 | Security of Iterated Hash Functions Based on Block Ciphers. Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel |
| 1993 | The Shrinking Generator. Don Coppersmith, Hugo Krawczyk, Yishay Mansour |
| 1993 | Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). Stefan Brands |
| 1993 | Weak Keys for IDEA. Joan Daemen, René Govaerts, Joos Vandewalle |