| 1999 | A Forward-Secure Digital Signature Scheme. Mihir Bellare, Sara K. Miner |
| 1999 | A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. Berry Schoenmakers |
| 1999 | Abuse-Free Optimistic Contract Signing. Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie |
| 1999 | Adaptive Security for Threshold Cryptosystems. Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
| 1999 | Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings Michael J. Wiener |
| 1999 | An Efficient Public Key Traitor Tracing Scheme. Dan Boneh, Matthew K. Franklin |
| 1999 | An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. Radha Poovendran, John S. Baras |
| 1999 | Auditable, Anonymous Electronic Cash Extended Abstract. Tomas Sander, Amnon Ta-Shma |
| 1999 | Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. Oded Goldreich, Amit Sahai, Salil P. Vadhan |
| 1999 | Coding Constructions for Blacklisting Problems without Computational Assumptions. Ravi Kumar, Sridhar Rajagopalan, Amit Sahai |
| 1999 | Compressing Cryptographic Resources. Niv Gilboa, Yuval Ishai |
| 1999 | Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. Jee Hea An, Mihir Bellare |
| 1999 | Cryptanalysis of "2 R" Schemes. Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai |
| 1999 | Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. Phong Q. Nguyen |
| 1999 | Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. Aviad Kipnis, Adi Shamir |
| 1999 | Differential Power Analysis. Paul C. Kocher, Joshua Jaffe, Benjamin Jun |
| 1999 | Dynamic Traitor Training. Amos Fiat, Tamir Tassa |
| 1999 | Efficient Methods for Integrating Traceability and Broadcast Encryption. Eli Gafni, Jessica Staddon, Yiqun Lisa Yin |
| 1999 | Factoring N = p Dan Boneh, Glenn Durfee, Nick Howgrave-Graham |
| 1999 | Fast Correlation Attacks Based on Turbo Code Techniques. Thomas Johansson, Fredrik Jönsson |
| 1999 | Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. Subhamoy Maitra, Palash Sarkar |
| 1999 | Information Theoretically Secure Communication in the Limited Storage Space Model. Yonatan Aumann, Michael O. Rabin |
| 1999 | Information-Theoretic Cryptography. Ueli M. Maurer |
| 1999 | Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. Mihir Bellare, Amit Sahai |
| 1999 | Oblivious Transfer with Adaptive Queries. Moni Naor, Benny Pinkas |
| 1999 | On Concurrent Zero-Knowledge with Pre-processing. Giovanni Di Crescenzo, Rafail Ostrovsky |
| 1999 | On the Security Properties of OAEP as an All-or-Nothing Transform. Victor Boyko |
| 1999 | On the Security of RSA Padding. Jean-Sébastien Coron, David Naccache, Julien P. Stern |
| 1999 | Robust Distributed Multiplicaton with out Interaction. Masayuki Abe |
| 1999 | SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. Mark Etzel, Sarvar Patel, Zulfikar Ramzan |
| 1999 | Secure Integration of Asymmetric and Symmetric Encryption Schemes. Eiichiro Fujisaki, Tatsuaki Okamoto |
| 1999 | Separability and Efficiency for Generic Group Signature Schemes. Jan Camenisch, Markus Michels |
| 1999 | Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. Mihir Bellare, Oded Goldreich, Hugo Krawczyk |
| 1999 | The All-or-Nothing Nature of Two-Party Secure Computation. Amos Beimel, Tal Malkin, Silvio Micali |
| 1999 | The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. Phong Q. Nguyen, Jacques Stern |
| 1999 | Towards Sound Approaches to Counteract Power-Analysis Attacks. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi |
| 1999 | Truncated Differentials and Skipjack. Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner |
| 1999 | Two Party RSA Key Generation. Niv Gilboa |
| 1999 | UMAC: Fast and Secure Message Authentication. John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway |
| 1999 | Weakness in Quaternion Signatures. Don Coppersmith |