| 1995 | A Jürgen Bierbrauer |
| 1995 | A Block Lanczos Algorithm for Finding Dependencies Over GF(2). Peter L. Montgomery |
| 1995 | A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. Carlo Harpes, Gerhard Kramer, James L. Massey |
| 1995 | A New Identification Scheme Based on the Perceptrons Problem. David Pointcheval |
| 1995 | Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding Louis C. Guillou, Jean-Jacques Quisquater |
| 1995 | An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p. Damian Weber |
| 1995 | Anonymous NIZK Proofs of Knowledge with Preprocessing. Stefano D'Amiano, Giovanni Di Crescenzo |
| 1995 | Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers David Naccache, David M'Raïhi, William Wolfowicz, Adina di Porto |
| 1995 | Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction. Claus-Peter Schnorr, Horst Helmut Hörner |
| 1995 | Combinatorial Bounds for Authentication Codes with Arbitration. Kaoru Kurosawa, Satoshi Obana |
| 1995 | Convergence in Differential Distributions. Luke O'Connor |
| 1995 | Counting the Number of Points on Elliptic Curves over Finite Fields: Strategies and Performance. Reynald Lercier, François Morain |
| 1995 | Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
| 1995 | Fair Blind Signatures. Markus Stadler, Jean-Marc Piveteau, Jan Camenisch |
| 1995 | Fast RSA-type Schemes Based on Singular Cubic Curves y Kenji Koyama |
| 1995 | General Short Computational Secret Sharing Schemes. Philippe Béguin, Antonella Cresti |
| 1995 | How to Break Another Provably Secure Payment System. Birgit Pfitzmann, Matthias Schunter, Michael Waidner |
| 1995 | Large Periods Nearly de Bruijn FCSR Sequences. Andrew Klapper, Mark Goresky |
| 1995 | New Hash Functions For Message Authentication. Hugo Krawczyk |
| 1995 | On Nonlinear Resilient Functions (Extended Abstract). Xian-Mo Zhang, Yuliang Zheng |
| 1995 | On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity. Lidong Chen, Torben P. Pedersen |
| 1995 | On the Matsumoto and Imai's Human Identification Scheme. Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai |
| 1995 | Quantum Oblivious Mutual Identification. Claude Crépeau, Louis Salvail |
| 1995 | Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. Kazue Sako, Joe Kilian |
| 1995 | Recycling Random Bits in Composed Perfect Zero-Knowledge. Giovanni Di Crescenzo |
| 1995 | Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. Kouichi Sakurai, Hiroki Shizuya |
| 1995 | Restrictive Blinding of Secret-Key Certificates. Stefan Brands |
| 1995 | Ripping Coins For a Fair Exchange. Markus Jakobsson |
| 1995 | Secure Multiround Authentication Protocols. Christian Gehrmann |
| 1995 | Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). Yvo Desmedt |
| 1995 | Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. Chae Hoon Lim, Pil Joong Lee |
| 1995 | Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. Jovan Dj. Golic |
| 1995 | Universal Hash Functions & Hard Core Bits. Mats Näslund |
| 1995 | Verifiable Secret Sharing as Secure Computation. Rosario Gennaro, Silvio Micali |
| 1995 | Verifiable Signature Sharing. Matthew K. Franklin, Michael K. Reiter |