| 1992 | Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings Joan Feigenbaum |
| 1991 | A Calculus for Access Control in Distributed Systems. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin |
| 1991 | A Cryptographic Scheme for Computerized Elections. Kenneth R. Iversen |
| 1991 | A Known Plaintext Attack of FEAL-4 and FEAL-6. Anne Tardy-Corfdir, Henri Gilbert |
| 1991 | A New ID-Based Key Sharing System. Shigeo Tsujii, Jinhui Chao |
| 1991 | A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. Dror Lapidot, Adi Shamir |
| 1991 | A Switching Closure Test to Analyze Cryptosystems. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi |
| 1991 | An Attack on the Last Two Rounds of MD4. Bert den Boer, Antoon Bosselaers |
| 1991 | CM-Curves with Good Cryptographic Properties. Neal Koblitz |
| 1991 | Combinatorial Characterizations of Authentication Codes. Douglas R. Stinson |
| 1991 | Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. David Chaum, Eugène van Heijst, Birgit Pfitzmann |
| 1991 | Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract). Marie-Jeanne Toussaint |
| 1991 | Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Eli Biham, Adi Shamir |
| 1991 | Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. Tatsuaki Okamoto, Kouichi Sakurai |
| 1991 | Efficient Multiparty Protocols Using Circuit Randomization. Donald Beaver |
| 1991 | Exploiting Parallelism in Hardware Implementations of the DES. Albert G. Broscius, Jonathan M. Smith |
| 1991 | Faster Modular Multiplication by Operand Scaling. Colin D. Walter |
| 1991 | Foundations of Secure Interactive Computing. Donald Beaver |
| 1991 | Functional Inversion and Communication Complexity. Shang-Hua Teng |
| 1991 | How To Break and Repair A "Provably Secure" Untraceable Payment System. Birgit Pfitzmann, Michael Waidner |
| 1991 | Interactive Proofs with Space Bounded Provers. Joe Kilian, Ronitt Rubinfeld |
| 1991 | Multiparty Secret Key Exchange Using a Random Deal of Cards. Michael J. Fischer, Rebecca N. Wright |
| 1991 | New Public-Key Schemes Based on Elliptic Curves over the Ring Z Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone |
| 1991 | New Results on Pseudorandom Permutation Generators Based on the DES Scheme. Jacques Patarin |
| 1991 | Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Charles Rackoff, Daniel R. Simon |
| 1991 | Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. Torben P. Pedersen |
| 1991 | On Correlation-Immune Functions. Paul Camion, Claude Carlet, Pascale Charpin, Nicolas Sendrier |
| 1991 | On Verification in Secret Sharing. Cynthia Dwork |
| 1991 | On the Size of Shares for Secret Sharing Schemes. Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
| 1991 | Practical Quantum Oblivious Transfer. Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska |
| 1991 | Pseudo-random Generators from One-way Functions (Abstract). Michael Luby |
| 1991 | Secure Computation (Abstract). Silvio Micali, Phillip Rogaway |
| 1991 | Shared Generation of Authenticators and Signatures (Extended Abstract). Yvo Desmedt, Yair Frankel |
| 1991 | Systematic Design of Two-Party Authentication Protocols. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung |
| 1991 | The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. Yeow Meng Chee, Antoine Joux, Jacques Stern |
| 1991 | The Use of Interaction in Public Cryptosystems (Extended Abstract). Steven Rudich |
| 1991 | Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. Ivan Damgård |
| 1991 | Universal Electronic Cash. Tatsuaki Okamoto, Kazuo Ohta |
| 1991 | Universal Hashing and Authentication Codes. Douglas R. Stinson |