| 1986 | Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings Franz Pichler |
| 1985 | A Comment on Niederreiter's Public Key Cryptosystem. Bernhard Smeets |
| 1985 | A Note On Sequences Generated by Clock Controlled Shift Registers. Bernhard Smeets |
| 1985 | A Public-Key Cryptosystem based on Shift Register Sequences. Harald Niederreiter |
| 1985 | Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators. J. Bernasconi, Christoph G. Günther |
| 1985 | Authorized Writing for "Write-Once" Memories. Philippe Godlewski, Gérard D. Cohen |
| 1985 | Cryptanalysis of the Dickson Scheme. Winfried B. Müller, Rupert Nöbauer |
| 1985 | Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. Thomas Siegenthaler |
| 1985 | Efficient Factoring Based on Partial Information. Ronald L. Rivest, Adi Shamir |
| 1985 | Encryption: Needs, Requirements, and SOlutions in Banking Networks. U. Rimensberger |
| 1985 | Engineering Secure Information Systems. Donald W. Davies, Wyn L. Price |
| 1985 | Full Encryption in a Personal Computer System. Robert L. Bradey, Ian G. Graham |
| 1985 | Generalized Multiplexed Sequences. Mulan Liu, Zhe-Xian Wan |
| 1985 | Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck |
| 1985 | Is the Data Encryption Standard a Group? (Preliminary Abstract). Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
| 1985 | Linear Complexity and Random Sequences. Rainer A. Rueppel |
| 1985 | Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link. Max Kowatsch, Bernd O. Eichinger, Franz J. Seifert |
| 1985 | Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks. Gordon B. Agnew |
| 1985 | Networks Without User Observability: Design Options. Andreas Pfitzmann, Michael Waidner |
| 1985 | On Feedforward Transforms and p-Fold Periodic p-Arrays. Dong-sheng Chen, Zong-Duo Dai |
| 1985 | On Functions of Linear Shift Register Sequences. Tore Herlestam |
| 1985 | On Public-Key Cryptosystems Built using Polynomial Rings. Josef Pieprzyk |
| 1985 | On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. Tom Tedrick |
| 1985 | On the Linear Complexity of Combined Shift Register Sequences. Lennart Brynielsson |
| 1985 | Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. David Chaum |
| 1985 | Simultaneous Security of Bits in the Discrete Log. René Peralta |
| 1985 | The Chipcard: An Identification Card With Cryptographic Protection. Thomas Krivachy |
| 1985 | The Contribution of E. B. Fleissner and A. Figl for Today's Cryptography. Otto J. Horak |
| 1985 | The Practice of Authentication. Gustavus J. Simmons |
| 1985 | The Role of Encipherment Services in Distributed Systems. R. W. Jones, M. S. J. Baxter |
| 1985 | The Verifiability of Two-Party Protocols. Ronald V. Book, Friedrich Otto |
| 1985 | Two New Secret Key Cryptosystems. Henk Meijer, Selim G. Akl |
| 1985 | Using Algorithms as Keys in Stream Ciphers. Neal R. Wagner, Paul Putter, Marianne R. Cain |