| 1999 | A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond. D. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass |
| 1999 | A Design of Reliable True Random Number Generator for Cryptographic Applications. Vittorio Bagini, Marco Bucci |
| 1999 | A High-Performance Flexible Architecture for Cryptography. R. Reed Taylor, Seth Copen Goldstein |
| 1999 | A Scalable Architecture for Montgomery Multiplication. Alexandre F. Tenca, Çetin Kaya Koç |
| 1999 | Arithmetic Design for Permutation Groups. Tamás Horváth |
| 1999 | CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor. Emeka Mosanya, Christof Teuscher, Héctor Fabio Restrepo, Patrick Galley, Eduardo Sanchez |
| 1999 | Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings Çetin Kaya Koç, Christof Paar |
| 1999 | DES Cracking on the Transmogrifier 2a. Ivan Hamer, Paul Chow |
| 1999 | DES and Differential Power Analysis (The "Duplication" Method). Louis Goubin, Jacques Patarin |
| 1999 | Efficient Finite Field Basis Conversion Involving Dual Bases. Burton S. Kaliski Jr., Moses D. Liskov |
| 1999 | Elliptic Curve Scalar Multiplier Design Using FPGAs. Lijun Gao, Sarvesh Shrivastava, Gerald E. Sobelman |
| 1999 | Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. Oliver Jung, Christoph Ruland |
| 1999 | Factoring Large Numbers with the Twinkle Device (Extended Abstract). Adi Shamir |
| 1999 | Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara |
| 1999 | Fast Multiplication in Finite Fields GF(2 Joseph H. Silverman |
| 1999 | Fast Multiplication on Elliptic Curves over GF(2 Julio López, Ricardo Dahab |
| 1999 | Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton. Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim |
| 1999 | Highly Regular Architectures for Finite Field Computation Using Redundant Basis. Huapeng Wu, M. Anwarul Hasan, Ian F. Blake |
| 1999 | How to Implement Cost-Effective and Secure Public Key Cryptosystems. Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim |
| 1999 | IPA: A New Class of Power Attacks. Paul N. Fahn, Peter K. Pearson |
| 1999 | Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis. Huapeng Wu |
| 1999 | Modelling the Crypto-Processor from Design to Synthesis. W. P. Choi, Lee-Ming Cheng |
| 1999 | Montgomery's Multiplication Technique: How to Make It Smaller and Faster. Colin D. Walter |
| 1999 | NICE - New Ideal Coset Encryption. Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi |
| 1999 | Power Analysis Attacks of Modular Exponentiation in Smartcards. Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan |
| 1999 | Probing Attacks on Tamper-Resistant Devices. Helena Handschuh, Pascal Paillier, Jacques Stern |
| 1999 | Random Number Generators Founded on Signal and Information Theory. David Paul Maher, Robert J. Rance |
| 1999 | Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. Jean-Sébastien Coron |
| 1999 | Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems. Eberhard von Faber |
| 1999 | We Need Assurance. Brian D. Snow |