| 1988 | Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings David Chaum, Wyn L. Price |
| 1987 | A Public Key Analog Cryptosystem. George I. Davida, Gilbert G. Walter |
| 1987 | Alternating Step Generators Controlled by De Bruijn Sequences. Christoph G. Günther |
| 1987 | An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf |
| 1987 | Blinding for Unanticipated Signatures. David Chaum |
| 1987 | Collision Free Hash Functions and Public Key Signature Schemes. Ivan Damgård |
| 1987 | Extension of Brickell's Algorithm for Breaking High Density Knapsacks. F. Jorissen, Joos Vandewalle, René Govaerts |
| 1987 | Fast Data Encipherment Algorithm FEAL. Akihiro Shimizu, Shoji Miyaguchi |
| 1987 | Finite State Machine Modelling of Cryptographic Systems in Loops. Franz Pichler |
| 1987 | Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution. Thomas Siegenthaler, Amstein Walthert Kleiner, Réjane Forré |
| 1987 | Hash-Functions Using Modulo-N Operations. Marc Girault |
| 1987 | High-Performance Interface Architectures for Cryptographic Hardware. David P. Anderson, P. Venkat Rangan |
| 1987 | IC-Cards in High-Security Applications. Ingrid Schaumüller-Bichl |
| 1987 | In Memoriam Tore Herlestam (1929 - 1986). James L. Massey |
| 1987 | Linear Structures in Blockciphers. Jan-Hendrik Evertse |
| 1987 | Message Authentication and Dynamic Passwords. H. J. Beker, G. M. Cole |
| 1987 | Message Authentication with Arbitration of Transmitter/Receiver Disputes. Gustavus J. Simmons |
| 1987 | Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. Cees J. A. Jansen, Dick E. Boekee |
| 1987 | Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. James L. Massey, Ueli M. Maurer, Muzhong Wang |
| 1987 | On Privacy Homomorphisms (Extended Abstract). Ernest F. Brickell, Yacov Yacobi |
| 1987 | Perfect and Essentially Perfect Authentication Schemes. Albrecht Beutelspacher |
| 1987 | Physical Protection of Cryptographic Devices. Andrew J. Clark |
| 1987 | Random Sources for Cryptographic Systems. Gordon B. Agnew |
| 1987 | Security Considerations in the Design and Implementation of a new DES chip. Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man |
| 1987 | Sequences With Almost Perfect Linear Complexity Profile. Harald Niederreiter |
| 1987 | Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. Sibylle Mund, Dieter Gollmann, Thomas Beth |
| 1987 | The RSA Cryptography Processor. Holger Sedlak |
| 1987 | When Shift Registers Clock Themselves. Rainer A. Rueppel |