| 1985 | Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings Thomas Beth, Norbert Cot, Ingemar Ingemarsson |
| 1984 | A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques. Ingrid Schaumüller-Bichl, Ernst Piller |
| 1984 | A New Trapdoor Knapsack Public-Key Cryptosystem. R. M. F. Goodman, Anthony J. McAuley |
| 1984 | A Provably Secure Oblivious Transfer Protocol. Richard Berger, René Peralta, Tom Tedrick |
| 1984 | Algebraical Structures of Cryptographic Transformations. Josef Pieprzyk |
| 1984 | An Encryption and Authentication Procedure for Telesurveillance Systems. Odoardo Brugia, Salvatore Improta, William Wolfowicz |
| 1984 | An Optimal Class of Symmetric Key Generation Systems. Rolf Blom |
| 1984 | Bull CP8 Smart Card Uses in Cryptology. Yves Giradot |
| 1984 | Cryptology and Complexity Theories. G. Ruggiu |
| 1984 | Discrete Logarithms in Finite Fields and Their Cryptographic Significance. Andrew M. Odlyzko |
| 1984 | Encryption and Key Manaagement for the ECS Satellite Service. Stephen C. Serpell, C. B. Brookson |
| 1984 | Equivolcations for Homophonic Ciphers. Andrea Sgarro |
| 1984 | Estimation of Some Encryption Functions Implemented into Smart Cards. H. Groscot |
| 1984 | Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme. Philippe Delsarte, Yvo Desmedt, Andrew M. Odlyzko, Philippe Piret |
| 1984 | Linear Ciphers and Random Sequence Generators with Multiple Clocks. James L. Massey, Rainer A. Rueppel |
| 1984 | Non-Linear Non-Commutative Functions for Data Integrity. Sami Harari |
| 1984 | On Concurrent Identification Protocols. Oded Goldreich |
| 1984 | On Cryptosystems Based on Polynomials and Finite Fields. Rudolf Lidl |
| 1984 | On the Linear Complexity of Cascaded Sequences. Rainer Vogel |
| 1984 | On the Number of Close-and-Equal Pairs of Bits in a String. Oded Goldreich |
| 1984 | On the Use of the Binary Multiplying Channel in a Private Communication System. Ben J. M. Smeets |
| 1984 | Propagation Characteristics of the DES. Marc Davio, Yvo Desmedt, Jean-Jacques Quisquater |
| 1984 | Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. Dieter Gollmann |
| 1984 | RSA Chips (Past/Present/Future). Ronald L. Rivest |
| 1984 | RSA-Bits are 0.5 + epsilon Secure. Claus-Peter Schnorr, Werner Alexi |
| 1984 | Secrecy and Privacy in a Local Area Network Environment. Gordon B. Agnew |
| 1984 | Security of Transportable Computerized Files. André Bouckaert |
| 1984 | Smart Card Applications in Security and Data Protection. Jean Goutay |
| 1984 | Smart Cards and Conditional Access. Louis C. Guillou |
| 1984 | Status Report on Factoring (At the Sandia National Laboratories). James A. Davis, Diane B. Holdridge, Gustavus J. Simmons |
| 1984 | Strong Primes are Easy to Find. John Gordon |
| 1984 | The Quadratic Sieve Factoring Algorithm. Carl Pomerance |
| 1984 | The Stop-and-Go Generator. Thomas Beth, Fred Piper |
| 1984 | The Subliminal Channel and Digital Signature. Gustavus J. Simmons |
| 1984 | Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems. A. Ecker |
| 1984 | User Functions for the Generation and Distribution of Encipherment Keys. R. W. Jones |
| 1984 | Wire-Tap Channel II. Lawrence H. Ozarow, Aaron D. Wyner |