| 1993 | Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings Rainer A. Rueppel |
| 1992 | A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. Babak Sadeghiyan, Josef Pieprzyk |
| 1992 | A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. Jovan Dj. Golic, Slobodan V. Petrovic |
| 1992 | A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. David Naccache |
| 1992 | A New Method for Known Plaintext Attack of FEAL Cipher. Mitsuru Matsui, Atsuhiro Yamagishi |
| 1992 | A Note on Discrete Logorithms with Special Structure. Rafi Heiman |
| 1992 | A Remark on a Non-interactive Public-Key Distribution System. Ueli M. Maurer, Yacov Yacobi |
| 1992 | A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. Ueli M. Maurer |
| 1992 | Attacks on Protocols for Server-Aided RSA Computation. Birgit Pfitzmann, Michael Waidner |
| 1992 | Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. Michael J. Beller, Yacov Yacobi |
| 1992 | Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). Yair Frankel, Yvo Desmedt |
| 1992 | Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. Miodrag J. Mihaljevic, Jovan Dj. Golic |
| 1992 | Correlation via Linear Sequential Circuit Approximation of Combiners with memory. Jovan Dj. Golic |
| 1992 | Cryptographic Protocols Provably Secure Against Dynamic Adversaries. Donald Beaver, Stuart Haber |
| 1992 | Differential Cryptanalysis Mod 2^32 with Applications to MD5. Thomas A. Berson |
| 1992 | FFT Hashing is not Collision-free. Thierry Baritaud, Henri Gilbert, Marc Girault |
| 1992 | FFT-Hash II, Efficient Cryptographic Hashing. Claus-Peter Schnorr |
| 1992 | Factoring with an Oracle. Ueli M. Maurer |
| 1992 | Fast Exponentiation with Precomputation (Extended Abstract). Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, David Bruce Wilson |
| 1992 | Graph Decompositions and Secret Sharing Schemes. Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro |
| 1992 | Hash Function Based on Block Ciphers. Xuejia Lai, James L. Massey |
| 1992 | High-Speed Implementation Methods for RSA Scheme. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai |
| 1992 | How Intractable Is the Discrete Logarithm for a General Finite Group? Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya |
| 1992 | How to Break a "Secure" Oblivious Transfer Protocol. Donald Beaver |
| 1992 | How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function. Jacques Patarin |
| 1992 | How to Make Efficient Fail-stop Signatures. Eugène van Heyst, Torben Pryds Pedersen |
| 1992 | Information-Theoretic Bounds for Authentication Frauds. Andrea Sgarro |
| 1992 | Local Randomness in Candidate One-Way Functions. Harald Niederreiter, Claus-Peter Schnorr |
| 1992 | Massively Parallel Elliptic Curve Factorin. Brandon Dixon, Arjen K. Lenstra |
| 1992 | Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. Ivan Damgård |
| 1992 | On the Construction of Highly Nonlinear Permutations. Kaisa Nyberg |
| 1992 | On the Development of a Fast Elliptic Curve Cryptosystem. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
| 1992 | Public-Key Cryptosystems with Very Small Key Length. Greg Harper, Alfred Menezes, Scott A. Vanstone |
| 1992 | Resource Requirements for the Application of Addition Chains in Modulo Exponentiation. Jörg Sauerbrey, Andreas Dietel |
| 1992 | Secure Audio Teleconferencing: A Practical Solution. Rafi Heiman |
| 1992 | Secure Bit Commitment Function against Divertibility. Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka |
| 1992 | Secure Conference Key Distribution Schemes for Conspiracy Attack. Kenji Koyama |
| 1992 | Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract). Lidong Chen, Ivan Damgård |
| 1992 | Suffix Tree and String Complexity. Luke O'Connor, Tim Snider |
| 1992 | Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai |
| 1992 | The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). Yvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid |
| 1992 | The One-Round Functions of the DES Generate the Alternating Group. Ralph Wernsdorf |
| 1992 | Tools for Proving Zero Knowledge. Ingrid Biehl, Johannes A. Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel |
| 1992 | Transferred Cash Grows in Size. David Chaum, Torben Pryds Pedersen |
| 1992 | Uniform Results in Polynomial-Time Security. Paul Barbaroux |
| 1992 | Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? Jan-Hendrik Evertse, Eugène van Heyst |