| 1986 | A Cryptanalytic Attack on the CADE Cryptosystem. N. S. James, Rudolf Lidl, Harald Niederreiter |
| 1986 | A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number. René Peralta, Jeroen van de Graaf |
| 1986 | Activities of IFIP Working Group 11: 4 on Crypto Management. Viiveke Fåk |
| 1986 | Additional Properties in the S-Boxes of the DES. Henri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts |
| 1986 | Analyzing Encryption Protocols Using Formal Verification Techniques. Richard A. Kemmerer |
| 1986 | Another Look at Redundancy in Cryptographic Systems. Gordon B. Agnew |
| 1986 | Controlling Individual Information in Statistics by Coding. Ove Frank, Per Weidenman |
| 1986 | Correlation-Immune Polynomials over Finite Fields. Thomas Siegenthaler |
| 1986 | Could the Smart Card Be Dumb. A. S. Glass |
| 1986 | Cryptanalysis of Pseudo-Random Number Sequences Generated by a Linear Recurrence of a Given Order. Anne Bauval |
| 1986 | Cryptanalysis of the Yagisawa Public Key Cryptosystem. Ernest F. Brickell |
| 1986 | Cycle Structure of the Weak and Semi-Weak DES Keys. Judy H. Moore, Gustavus J. Simmons |
| 1986 | EUROCRYPT 1986, A Workshop on the Theory and Application of Cryptographic Techniques, Linköping, Sweden, 20-22 May 1986, Paper Abstracts Ingemar Ingemarsson |
| 1986 | Elementary Proof of Rueppel's Linear Complexity Conjecture. Nguyen Quang A |
| 1986 | Encryption Exponent 3 and the Security of RSA. David S. P. Khoo, Gregory J. Bird, Jennifer Seberry |
| 1986 | Geometric Structures as Threshold Schemes. Albrecht Beutelspacher |
| 1986 | Linear Complexity of Sequences with Period p Dieter Gollmann |
| 1986 | Multilevel Cryptosecure Relational Database. George I. Davida, Yi-Shiung Yeh |
| 1986 | On Commutative Semigroups of Polynomials and their Application in Cryptography. Winfried B. Müller, Rupert Nöbauer |
| 1986 | On Linear Shift Registers with Permuted Feedback. Tore Herlestam |
| 1986 | On Some Properties of the Sum of Two Pseudorandom Sequences. Christoph G. Günther |
| 1986 | On the Walsh-Fourier Analysis of Correlation-Immune Switching Functions. Franz Pichler |
| 1986 | Perfect Authentication Systems for Data Sources with Arbitrary Statistics. Paul Schöbi |
| 1986 | Products of Linear Recurring Sequence with Maximum Complexity. Rainer A. Rueppel, Othmar Staffelbach |
| 1986 | Properties of De Bruijn Sequences Generated by a Cross-Join Technique. Maurice Beale |
| 1986 | Protection Against Active Eavesdropping. Cees J. A. Jansen |
| 1986 | Public Key Encryption of Stream Ciphers. D. D. Buckley, Maurice Beale |
| 1986 | Several Exhaustive Key Search Machines and DES. Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater |
| 1986 | Sharma-Mittal Entropy and Shannon's Random Cipher Result. Gur Dial, Franquiberto Pessoa |
| 1986 | Some Preliminary Remarks on the Decimal, Shift an Add-Algorithm (DSA). F.-P. Heider, Dieter Kraus, M. Welschenbach |
| 1986 | Some Properties of Sequences Generated by a Windmill Machine. Bernhard Smeets |
| 1986 | Tactical Configurations and Threshold Schemes. A. Ecker |
| 1986 | The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles. Muzhong Wang, James L. Massey |
| 1986 | The NPL Intelligent Token and its Application. Wyn L. Price |
| 1986 | The Need for a Standarized Compression Algorithm for Digital Signatures. Denis Pinkas |