1. Martín Abadi, Joan Feigenbaum, and Joe Kilian. “On Hiding Information from an Oracle,” Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 19, 1987, 195–203.
2. Gilles Brassard and Claude Crépeau. “Nontransitive Transfer of Confidence: A Perfect Zero-Knowledge Interactive Protocol for SAT and Beyond,” Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, 27, 1986, 188–195.
3. Gilles Brassard and Claude Crépeau. “Zero-knowledge Simulation of Boolean Circuits,” Advances in Cryptology — CRYPTO '86 Proceedings, Andrew Odlyzko (ed.), Springer-Verlag (pub.), 1987, 223–233.
4. David Chaum, Ivan Damgaard, and Jeroen van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party's Input and Correctness of the Output,” to appear in Proceedings of CRYPTO '87.
5. Zvi Galil, Stuart Haber, and Moti Yung. “Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model,” to appear in Proceedings of CRYPTO '87.