| 1991 | Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings Alfred Menezes, Scott A. Vanstone |
| 1990 | A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. Paul C. van Oorschot |
| 1990 | A Key Distribution "Paradox". Yacov Yacobi |
| 1990 | A Modular Approach to Key Distribution. Walter Fumy, Michael Munzert |
| 1990 | A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai |
| 1990 | A Statistical Attack of the FEAL-8 Cryptosystem. Henri Gilbert, Guy Chassé |
| 1990 | A Universal Statistical Test for Random Bit Generators. Ueli M. Maurer |
| 1990 | Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). Yvo Desmedt, Moti Yung |
| 1990 | Achieving Zero-Knowledge Robustly. Joe Kilian |
| 1990 | An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications. Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao |
| 1990 | CORSAIR: A SMART Card for Public Key Cryptosystems. Dominique de Waleffe, Jean-Jacques Quisquater |
| 1990 | Collective Coin Tossing Without Assumptions nor Broadcasting. Silvio Micali, Tal Rabin |
| 1990 | Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S. Richard Cleve |
| 1990 | Computation of Discrete Logarithms in Prime Fields (Extended Abstract). Brian A. LaMacchia, Andrew M. Odlyzko |
| 1990 | Constructing Elliptic Curve Cryptosystems in Characteristic 2. Neal Koblitz |
| 1990 | Convertible Undeniable Signatures. Joan Boyar, David Chaum, Ivan Damgård, Torben P. Pedersen |
| 1990 | Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems. Alfredo De Santis, Moti Yung |
| 1990 | Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. Othmar Staffelbach, Willi Meier |
| 1990 | Differential Cryptanalysis of DES-like Cryptosystems. Eli Biham, Adi Shamir |
| 1990 | Discrete-Log With Compressible Exponents. Yacov Yacobi |
| 1990 | Fair Computation of General Functions in Presence of Immoral Majority. Shafi Goldwasser, Leonid A. Levin |
| 1990 | Fast Checkers for Cryptography. Kireeti Kompella, Leonard M. Adleman |
| 1990 | Fast Software Encryption Functions. Ralph C. Merkle |
| 1990 | Finding Four Million Large Random Primes. Ronald L. Rivest |
| 1990 | Geometric Shared Secret and/or Shared Control Schemes. Gustavus J. Simmons |
| 1990 | Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract). Donald Beaver, Joan Feigenbaum, Victor Shoup |
| 1990 | How to Time-Stamp a Digital Document. Stuart Haber, W. Scott Stornetta |
| 1990 | How to Utilize the Randomness of Zero-Knowledge Proofs. Tatsuaki Okamoto, Kazuo Ohta |
| 1990 | Identification Tokens - or: Solving the Chess Grandmaster Problem. Thomas Beth, Yvo Desmedt |
| 1990 | Interactive Proofs with Provable Security Against Honest Verifiers. Joe Kilian |
| 1990 | Matrix Extensions of the RSA Algorithm. Chih-Chwen Chuang, James George Dunham |
| 1990 | Multi-Language Zero Knowledge Interactive Proof Systems. Kaoru Kurosawa, Shigeo Tsujii |
| 1990 | Nonlinear Parity Circuits and their Cryptographic Applications. Kenji Koyama, Routo Terada |
| 1990 | On the Computation of Discrete Logarithms in Class Groups. Johannes A. Buchmann, Stephan Düllmann |
| 1990 | On the Impossibility of Private Key Cryptography with Weakly Random Keys. James L. McInnes, Benny Pinkas |
| 1990 | On the Universality of the Next Bit Test. A. W. Schrift, Adi Shamir |
| 1990 | One-Way Group Actions. Gilles Brassard, Moti Yung |
| 1990 | Publicly Verifiable Non-Interactive Zero-Knowledge Proofs. Dror Lapidot, Adi Shamir |
| 1990 | Quantum Bit Commitment and Coin Tossing Protocols. Gilles Brassard, Claude Crépeau |
| 1990 | Security with Low Communication Overhead. Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway |
| 1990 | Solving Large Sparse Linear Systems over Finite Fields. Brian A. LaMacchia, Andrew M. Odlyzko |
| 1990 | Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. Ernest F. Brickell, Douglas R. Stinson |
| 1990 | Structural Properties of One-way Hash Functions. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai |
| 1990 | Systolic Modular Multiplication. Shimon Even |
| 1990 | The FEAL Cipher Family. Shoji Miyaguchi |
| 1990 | The MD4 Message Digest Algorithm. Ronald L. Rivest |
| 1990 | The REDOC II Cryptosystem. Thomas W. Cusick, Michael C. Wood |
| 1990 | Unconditionally Secure Digital Signatures. David Chaum, Sandra Roijakkers |