| 1995 | A Key Escrow System with Warrant Bounds. Arjen K. Lenstra, Peter Winkler, Yacov Yacobi |
| 1995 | A Key-schedule Weakness in SAFER K-64. Lars R. Knudsen |
| 1995 | A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. Silvio Micali, Ray Sidney |
| 1995 | Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings Don Coppersmith |
| 1995 | An Efficient Divisible Electronic Cash Scheme. Tatsuaki Okamoto |
| 1995 | Bucket Hashing and its Application to Fast Message Authentication. Phillip Rogaway |
| 1995 | Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). Dan Boneh, James Shaw |
| 1995 | Committed Oblivious Transfer and Private Multi-Party Computation. Claude Crépeau, Jeroen van de Graaf, Alain Tapp |
| 1995 | Cryptanalysis Based on 2-Adic Rational Approximation. Andrew Klapper, Mark Goresky |
| 1995 | Cryptanalysis of the Immunized LL Public Key Systems. Yair Frankel, Moti Yung |
| 1995 | Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. Jacques Patarin |
| 1995 | Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. Shai Halevi |
| 1995 | Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Yair Frankel, Moti Yung |
| 1995 | Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). Joe Kilian, Frank Thomson Leighton |
| 1995 | Fast Key Exchange with Elliptic Curve Systems. Richard Schroeppel, Hilarie K. Orman, Sean W. O'Malley, Oliver Spatscheck |
| 1995 | Fast Server-Aided RSA Signatures Secure Against Active Attacks. Philippe Béguin, Jean-Jacques Quisquater |
| 1995 | General Perfect Secret Sharing Schemes. G. R. Blakley, Gregory Kabatianskii |
| 1995 | Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. Ivan Damgård, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson |
| 1995 | How to Break Shamir's Asymmetric Basis. Thorsten Theobald |
| 1995 | Improved Efficient Arguments (Preliminary Version). Joe Kilian |
| 1995 | Improving the Search Algorithm for the Best Linear Expression. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki |
| 1995 | MDx-MAC and Building Fast MACs from Hash Functions. Bart Preneel, Paul C. van Oorschot |
| 1995 | NFS with Four Large Primes: An Explosive Experiment. Bruce Dodson, Arjen K. Lenstra |
| 1995 | On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. Burton S. Kaliski Jr., Yiqun Lisa Yin |
| 1995 | On the Security of the Gollmann Cascades. Sangjoon Park, Sangjin Lee, Seung-Cheol Goh |
| 1995 | On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. Dominic Mayers |
| 1995 | Precomputing Oblivious Transfer. Donald Beaver |
| 1995 | Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung |
| 1995 | Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). Dan Boneh, Richard J. Lipton |
| 1995 | Robustness Principles for Public Key Protocols. Ross J. Anderson, Roger M. Needham |
| 1995 | Secret Sharing with Public Reconstruction (Extended Abstract). Amos Beimel, Benny Chor |
| 1995 | Secure Signature Schemes based on Interactive Protocols. Ronald Cramer, Ivan Damgård |
| 1995 | Security and Performance of Server-Aided RSA Computation Protocols. Chae Hoon Lim, Pil Joong Lee |
| 1995 | Some Remarks on Lucas-Based Cryptosystems. Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra |
| 1995 | Threshold DSS Signatures without a Trusted Party. Susan K. Langford |
| 1995 | XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. Mihir Bellare, Roch Guérin, Phillip Rogaway |
| 1995 | t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata |