| 1995 | Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings Alfredo De Santis |
| 1994 | A Linear Construction of Perfect Secret Sharing Schemes. Marten van Dijk |
| 1994 | A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. Glenn A. Orton |
| 1994 | A Practical Attack against Knapsack based Hash Functions (Extended Abstract). Antoine Joux, Louis Granboulan |
| 1994 | A Secure and Efficient Conference Key Distribution System (Extended Abstract). Mike Burmester, Yvo Desmedt |
| 1994 | A Systematic Attack on Clock Controlled Cascades. Renato Menicocci |
| 1994 | An Improvement of Davies' Attack on DES. Eli Biham, Alex Biryukov |
| 1994 | Authentication Codes in Plaintext and Chosen-content Attacks. Reihaneh Safavi-Naini, Leonid M. Tombak |
| 1994 | Black Box Cryptanalysis of Hash Networks Based on Multipermutations. Claus-Peter Schnorr, Serge Vaudenay |
| 1994 | Blackmailing using Undeniable Signatures. Markus Jakobsson |
| 1994 | Blind Signatures Based on the Discrete Logarithm Problem. Jan Camenisch, Jean-Marc Piveteau, Markus Stadler |
| 1994 | Breaking Efficient Anonymous Channel. Birgit Pfitzmann |
| 1994 | Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. David Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli |
| 1994 | Comments on Soviet Encryption Algorithm. Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng |
| 1994 | Designated Confirmer Signatures. David Chaum |
| 1994 | Efficient Exponentiation using Procomputation and Vector Addition Chains. Peter de Rooij |
| 1994 | Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. Jovan Dj. Golic, Luke O'Connor |
| 1994 | Feedback Registers Based on Ramified Extensions of the 2-Adic Numbers (Extended Abstract). Mark Goresky, Andrew Klapper |
| 1994 | Formal Requirements for Key Distribution Protocols. Paul F. Syverson, Catherine Meadows |
| 1994 | General Lower Bound for the Linear Complexity of the Product of Shift-Register Sequences. Rainer Göttfert, Harald Niederreiter |
| 1994 | How to Break and Repair Leighton and Micali's Key Agreement Protocol. Yuliang Zheng |
| 1994 | Linear Approximation of Block Ciphers. Kaisa Nyberg |
| 1994 | Linking Information Reconciliation and Privacy Amplification (Extended Abstract). Christian Cachin, Ueli M. Maurer |
| 1994 | Links Between Differential and Linear Cryptanalysis. Florent Chabaud, Serge Vaudenay |
| 1994 | MIMD-Factorisation on Hypercubes. Frank Damm, F.-P. Heider, G. Wambach |
| 1994 | Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. Adi Shamir |
| 1994 | Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. Kaisa Nyberg, Rainer A. Rueppel |
| 1994 | Methodology for Digital Money based on General Cryptographic Tools. Stefano D'Amiano, Giovanni Di Crescenzo |
| 1994 | Near Optimal Unconditionally Secure Authentication. Richard Taylor |
| 1994 | New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. Lars R. Knudsen, Xuejia Lai |
| 1994 | New Group Signature Schemes (Extended Abstract). Lidong Chen, Torben P. Pedersen |
| 1994 | New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). Lars R. Knudsen |
| 1994 | On A²-Codes Including Arbiter's Attacks. Thomas Johansson, Ben J. M. Smeets |
| 1994 | On Correlation Between the Order of S-boxes and the Strength of DES. Mitsuru Matsui |
| 1994 | On Matsui's Linear Cryptanalysis. Eli Biham |
| 1994 | On the Dealer's Randomness Required in Secret Sharing Schemes. Carlo Blundo, Antonio Giorgio Gaggia, Douglas R. Stinson |
| 1994 | On the Security of Some Cryptosystems Based on Error-correcting Codes. Florent Chabaud |
| 1994 | Optimal Asymmetric Encryption. Mihir Bellare, Phillip Rogaway |
| 1994 | Parallel Divertibility of Proofs of Knowledge (Extended Abstract). Lidong Chen, Ivan Damgård, Torben P. Pedersen |
| 1994 | Q-Deformed Quantum Cryptography. Jaroslav Hruby |
| 1994 | Relationships Among Nonlinear Criteria (Extended Abstract). Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng |
| 1994 | Single-Term Divisible Electronic Coins. Tony L. Eng, Tatsuaki Okamoto |
| 1994 | Space Requirements for Broadcast Encryption. Carlo Blundo, Antonella Cresti |
| 1994 | The Blinding of Weak Signatures (Extended Abstract). Matthew K. Franklin, Moti Yung |
| 1994 | The Self-Shrinking Generator. Willi Meier, Othmar Staffelbach |
| 1994 | The Size of a Share Must Be Large. László Csirmaz |
| 1994 | Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
| 1994 | Visual Cryptography. Moni Naor, Adi Shamir |