| 1994 | Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings Tor Helleseth |
| 1993 | A New Elliptic Curve Based Analogue of RSA. N. Demytko |
| 1993 | An Alternate Explanation of two BAN-logic "failures". Paul C. van Oorschot |
| 1993 | Blind Synchronization of m-Sequnces with Even Span. Richard A. Games, Joseph J. Rushanan |
| 1993 | Boolean Functions Satisfying a Higher Order Strict Avalanche Criterion. Thomas W. Cusick |
| 1993 | Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. David Naccache |
| 1993 | Collisions for the Compressin Function of MD5. Bert den Boer, Antoon Bosselaers |
| 1993 | Cryptanalysis of the Chang-Wu-Chen Key Distribution System. Mike Burmester |
| 1993 | Differentially Uniform Mappings for Cryptography. Kaisa Nyberg |
| 1993 | Distance-Bounding Protocols (Extended Abstract). Stefan Brands, David Chaum |
| 1993 | Efficient Anonymous Channel and All/Nothing Election Scheme. Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa |
| 1993 | Factoring Integers Using SIMD Sieves. Brandon Dixon, Arjen K. Lenstra |
| 1993 | From the Memoirs of a Norwegian Cryptologist. Ernst S. Selmer |
| 1993 | Global, Unpredictable Bit Generation Without Broadcast. Donald Beaver, Nicol So |
| 1993 | How to Find and Avoid Collisions for the Knapsack Hash Function. Jacques Patarin |
| 1993 | Improved Privacy in Wallets with Observers (Extended Abstract). Ronald Cramer, Torben P. Pedersen |
| 1993 | Interactive Hashing Simplifies Zero-Knowledge Protocol Design. Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung |
| 1993 | Linear Cryptanalysis Method for DES Cipher. Mitsuru Matsui |
| 1993 | Markov Ciphers and Alternating Groups. G. Hornauer, W. Stephan, Ralph Wernsdorf |
| 1993 | New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract). Eli Biham |
| 1993 | Nonperfect Secret Sharing Schemes and Matroids. Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii |
| 1993 | On Almost Perfect Nonlinear Permutations. Thomas Beth, Cunsheng Ding |
| 1993 | On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng |
| 1993 | On Key Distribution and Authentication in Mobile Radio Networks. Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii |
| 1993 | On Schnorr's Preprocessing for Digital Signature Schemes. Peter de Rooij |
| 1993 | On a Limitation of BAN Logic. Colin Boyd, Wenbo Mao |
| 1993 | On the Distribution of Characteristics in Bijective Mappings. Luke O'Connor |
| 1993 | On the Linear Complexity of Products of Shift-Register Sequences. Rainer Göttfert, Harald Niederreiter |
| 1993 | On the Relation between A-Codes and Codes Correcting Independent Errors. Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets |
| 1993 | On the Security of the IDEA Block Cipher. Willi Meier |
| 1993 | One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract). Josh Cohen Benaloh, Michael de Mare |
| 1993 | Optimal Authentication Systems. Reihaneh Safavi-Naini, Leonid M. Tombak |
| 1993 | Practical and Provably Secure Release of a Secret and Exchange of Signatures. Ivan Damgård |
| 1993 | Resynchronization Weaknesses in Synchronous Stream Ciphers. Joan Daemen, René Govaerts, Joos Vandewalle |
| 1993 | Secret-Key Reconciliation by Public Discussion. Gilles Brassard, Louis Salvail |
| 1993 | Single Term Off-Line Coins. Niels Ferguson |
| 1993 | Size of Shares and Probability of Cheating in Threshold Schemes. Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro |
| 1993 | Subliminal Communication is Easy Using the DSA. Gustavus J. Simmons |
| 1993 | The Breaking of the AR Hash Function. Ivan Damgård, Lars R. Knudsen |
| 1993 | The Consequences of Trust in Shared Secret Schemes. Gustavus J. Simmons |
| 1993 | Two New Classes of Bent Functions. Claude Carlet |
| 1993 | Untransferable Rights in a Client-Independent Server Environment. Josep Domingo-Ferrer |
| 1993 | Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups. Simon R. Blackburn, Sean Murphy, Jacques Stern |