| 1990 | Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings Gilles Brassard |
| 1989 | A Certified Digital Signature. Ralph C. Merkle |
| 1989 | A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle |
| 1989 | A Design Principle for Hash Functions. Ivan Damgård |
| 1989 | A Fast Modular-multiplication Algorithm based on a Higher Radix. Hikaru Morita |
| 1989 | A Key Exchange System Based on Real Quadratic Fields. Johannes Buchmann, Hugh C. Williams |
| 1989 | A Signature with Shared Verification Scheme. Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder |
| 1989 | A Survey of Hardware Implementation of RSA (Abstract). Ernest F. Brickell |
| 1989 | Addition Chain Heuristics. Jurjen N. Bos, Matthijs J. Coster |
| 1989 | An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). Adi Shamir |
| 1989 | An Efficient Software Protection Scheme. Rafail Ostrovsky |
| 1989 | Batch RSA. Amos Fiat |
| 1989 | Bit Commitment Using Pseudo-Randomness. Moni Naor |
| 1989 | Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. Richard Cleve |
| 1989 | Covert Distributed Processing with Computer Viruses. Steve R. White |
| 1989 | Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. Tatsuaki Okamoto, Kazuo Ohta |
| 1989 | Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang |
| 1989 | Efficient Identification Schemes Using Two Prover Interactive Proofs. Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson |
| 1989 | Efficient Identification and Signatures for Smart Cards. Claus-Peter Schnorr |
| 1989 | Flexible Access Control with Master Keys. Gerald C. Chick, Stafford E. Tavares |
| 1989 | Good S-Boxes Are Easy To Find. Carlisle M. Adams, Stafford E. Tavares |
| 1989 | How Easy is Collision Search. New Results and Applications to DES. Jean-Jacques Quisquater, Jean-Paul Delescaille |
| 1989 | How to Explain Zero-Knowledge Protocols to Your Children. Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson |
| 1989 | How to Predict Congruential Generators. Hugo Krawczyk |
| 1989 | Key Distribution Protocol for Digital Mobile Communication Systems. Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr. |
| 1989 | Keying the German Navy's Enigma. David Kahn |
| 1989 | Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. Yvo Desmedt |
| 1989 | Minimum Resource Zero-Knowledge Proofs (Extended Abstract). Joe Kilian, Silvio Micali, Rafail Ostrovsky |
| 1989 | Modular Exponentiation Using Recursive Sums of Residues. Paul A. Findlay, Brian A. Johnson |
| 1989 | Multiparty Computation with Faulty Majority. Donald Beaver, Shafi Goldwasser |
| 1989 | Multiparty Protocols Tolerating Half Faulty Processors. Donald Beaver |
| 1989 | New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. Mihir Bellare, Shafi Goldwasser |
| 1989 | Non-Interactive Oblivious Transfer and Applications. Mihir Bellare, Silvio Micali |
| 1989 | On Key Distribution Systems. Yacov Yacobi, Zahava Shmuely |
| 1989 | On the Classification of Idea Secret Sharing Schemes. Ernest F. Brickell, Daniel M. Davenport |
| 1989 | On the Concrete Complexity of Zero-Knowledge Proofs. Joan Boyar, René Peralta |
| 1989 | On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai |
| 1989 | On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. Ivan Damgård |
| 1989 | On the Implementation of Elliptic Curve Cryptosystems. Andreas Bender, Guy Castagnoli |
| 1989 | On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao |
| 1989 | On the Quadratic Spans of Periodic Sequences. Agnes Hui Chan, Richard A. Games |
| 1989 | On the Structure of Secret Key Exchange Protocols. Mihir Bellare, Lenore Cowen, Shafi Goldwasser |
| 1989 | On-Line/Off-Line Digital Schemes. Shimon Even, Oded Goldreich, Silvio Micali |
| 1989 | One Way Hash Functions and DES. Ralph C. Merkle |
| 1989 | Perfect Local Randomness in Pseudo-Random Sequences. Ueli M. Maurer, James L. Massey |
| 1989 | Practical Problems with a Cryptographic Protection Scheme. Jonathan M. Smith |
| 1989 | Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. Russell L. Brand |
| 1989 | Progress in Data Security Standardization. Wyn L. Price |
| 1989 | Properties of Cryptosystem PGM. Spyros S. Magliveras, Nasir D. Memon |
| 1989 | SDNS Architecture and End-to-End Encryption. Ruth Nelson, John H. Heimann |
| 1989 | Secret Sharing Over Infinite Domains (Extended Abstract). Benny Chor, Eyal Kushilevitz |
| 1989 | Sparse Pseudorandom Distributions. Oded Goldreich, Hugo Krawczyk |
| 1989 | The FEAL-8 Cryptosystem and a Call for Attack. Shoji Miyaguchi |
| 1989 | The Shortest Feedback Shift Register That Can Generate A Given Sequence. Cees J. A. Jansen, Dick E. Boekee |
| 1989 | The Smart Siskette - A Universal User Token and Personal Crypto-Engine. Paul Barrett, Raymund Eisele |
| 1989 | The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. David Chaum |
| 1989 | The use of Encryption in Kerberos for Network Authentication. John T. Kohl |
| 1989 | Threshold Cryptosystems. Yvo Desmedt, Yair Frankel |
| 1989 | UNIX Password Security - Ten Years Later. David C. Feldmeier, Philip R. Karn |
| 1989 | Undeniable Signatures. David Chaum, Hans Van Antwerpen |
| 1989 | Zero Knowledge Proofs of Knowledge in Two Rounds. Uriel Feige, Adi Shamir |