| 1993 | Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto |
| 1991 | 4 Move Perfect ZKIP of Knowledge with No Assumption. Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai |
| 1991 | A Construction of a Cioher From a Single Pseudorandom Permutation. Shimon Even, Yishay Mansour |
| 1991 | A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. Kazuo Ohta, Tatsuaki Okamoto |
| 1991 | A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. Joan Daemen, René Govaerts, Joos Vandewalle |
| 1991 | A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). Matthew Kwan, Josef Pieprzyk |
| 1991 | A Generalized Secret Sharing Scheme With Cheater Detection. Hung-Yu Lin, Lein Harn |
| 1991 | A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. Toshinobu Kaneko |
| 1991 | A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. Hiroshi Miyano |
| 1991 | A Multi-Purpose Proof System - for Identity and Membership Proofs. Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai |
| 1991 | A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems. Joan Feigenbaum, Rafail Ostrovsky |
| 1991 | A Secure Analog Speech Scrambler Using the Discrete Cosine Transform. Bruce Goldburg, Ed Dawson, S. Sridharan |
| 1991 | An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. Yvo Desmedt, Mike Burmester |
| 1991 | An Extensin of Zero-Knowledge Proofs and Its Applications. Tatsuaki Okamoto |
| 1991 | Any Language in IP Has a Divertable ZKIP. Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya |
| 1991 | Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle |
| 1991 | Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. Kwangjo Kim |
| 1991 | Cryptanalysis of Another Knapsack Cryptosystem. Antoine Joux, Jacques Stern |
| 1991 | Cryptanalysis of LOKI. Lars R. Knudsen |
| 1991 | Cryptanalysis of Several Conference Key Distribution Schemes. Atsushi Shimbo, Shin-ichi Kawamura |
| 1991 | Cryptography and Machine Learning. Ronald L. Rivest |
| 1991 | Extended Majority Voting and Private-Key Algebraic-Code Encryptions. Joost Meijers, Johan van Tilburg |
| 1991 | Feistel Type Authentication Codes. Reihaneh Safavi-Naini |
| 1991 | Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract). Marie-Jeanne Toussaint |
| 1991 | Generalized Threshold Cryptosystems. Chi-Sung Laih, Lein Harn |
| 1991 | How to Construct A Family of Strong One Way Permutations. Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk |
| 1991 | IC-Cards and Telecommunication Services. Jun-ichi Mizusawa |
| 1991 | Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry |
| 1991 | Limitations of the Even-Mansour Construction. Joan Daemen |
| 1991 | On Claw Free Families. Wakaha Ogata, Kaoru Kurosawa |
| 1991 | On NIST's Proposed Digital Signature Standard. Ronald L. Rivest |
| 1991 | On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. Babak Sadeghiyan, Josef Pieprzyk |
| 1991 | On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. Lein Harn, Hung-Yu Lin |
| 1991 | On Ordinary Elliptic Curve Cryptosystems. Atsuko Miyaji |
| 1991 | On the Complexity of Constant Round ZKIP of Possession of Knowledge. Toshiya Itoh, Kouichi Sakurai |
| 1991 | On the Power of Two-Local Random Reductions. Lance Fortnow, Mario Szegedy |
| 1991 | Optima Perfect Randomizers. Josef Pieprzyk, Babak Sadeghiyan |
| 1991 | Privacy, Cryptographic Pseudonyms, and The State of Health. Stig Fr. Mjølsnes |
| 1991 | Research Activities on Cryptology in Korea. Man Y. Rhee |
| 1991 | Results of Switching-Closure-Test on FEAL (Extended Abstract). Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi |
| 1991 | Revealing Information with Partial Period Correlations (Extended Abstract). Andrew Klapper, Mark Goresky |
| 1991 | Sibling Intractable Function Families and Their Applications (Extended Abstract). Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk |
| 1991 | Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption). Matthew Kwan |
| 1991 | Speeding up Prime Number Generation. Jørgen Brandt, Ivan Damgård, Peter Landrock |
| 1991 | The Data Base of Selected Permutations (Extended Abstract). Jun-Hui Yang, Zong-Duo Dai, Kencheng Zeng |
| 1991 | The Transition from Mechanisms to Electronic Computers, 1940 to 1950. Donald W. Davies |
| 1991 | Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. Chi-Sung Laih, Sung-Ming Yen, Lein Harn |