| 1991 | Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings Ivan Damgård |
| 1990 | A Cryptographic Library for the Motorola DSP56000. Stephen R. Dussé, Burton S. Kaliski Jr. |
| 1990 | A Known Plaintext Attack on Two-Key Triple Encryption. Paul C. van Oorschot, Michael J. Wiener |
| 1990 | A New Trapdoor in Knapsacks. Valtteri Niemi |
| 1990 | A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. Jovan Dj. Golic, Miodrag J. Mihaljevic |
| 1990 | A Proposal for a New Block Encryption Standard. Xuejia Lai, James L. Massey |
| 1990 | A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. Ingemar Ingemarsson, Gustavus J. Simmons |
| 1990 | A Provably-Secure Strongly-Randomized Cipher. Ueli M. Maurer |
| 1990 | A Remark on a Signature Scheme Where Forgery Can Be Proved. Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner |
| 1990 | A Remark on the Efficiency of Identification Schemes. Mike Burmester |
| 1990 | An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number. Marc Girault |
| 1990 | An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. Ernest F. Brickell, Kevin S. McCurley |
| 1990 | Confirmation that Some Hash Functions Are Not Collision Free. Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata |
| 1990 | Constructions of Bent Functions and Difference Sets. Kaisa Nyberg |
| 1990 | Correlation Functions of Geometric Sequences. Agnes Hui Chan, Mark Goresky, Andrew Klapper |
| 1990 | Correlation Properties of Combiners with Memory in Stream Ciphers. Willi Meier, Othmar Staffelbach |
| 1990 | Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers. Jacques Stern, Philippe Toffin |
| 1990 | Cryptosystem for Group Oriented Cryptography. Tzonelih Hwang |
| 1990 | Distributed Primality Proving and the Primality of (2 François Morain |
| 1990 | Essentially l-Fold Secure Authentication Systems. Albrecht Beutelspacher, Ute Rosenbaum |
| 1990 | Experimental Quantum Cryptography. Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John A. Smolin |
| 1990 | Exponentiating Faster with Addition Chains. Yacov Yacobi |
| 1990 | Factoring With Two Large Primes. Arjen K. Lenstra, Mark S. Manasse |
| 1990 | Fast Signature Generation With a Fiat Shamir-Like Scheme. H. Ong, Claus-Peter Schnorr |
| 1990 | General Public Key Residue Cryptosystems and Mental Poker Protocols. Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii |
| 1990 | How to Construct Pseudorandom Permutations from Single Pseudorandom Functions. Josef Pieprzyk |
| 1990 | Implementation of a Key Exchange Protocol Using Some Real Quadratic Fields. Renate Scheidler, Johannes Buchmann, Hugh C. Williams |
| 1990 | Inverting the Pseudo Exponentiation. Fritz Bauspieß, Hans-Joachim Knobloch, Peer Wichmann |
| 1990 | Lower Bounds for Authentication Codes With Splitting. Andrea Sgarro |
| 1990 | Lower Bounds for the Linear Complexity of Sequences over Residue Rings. Zong-Duo Dai, Thomas Beth, Dieter Gollmann |
| 1990 | Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama |
| 1990 | Oblivous Transfer Protecting Secrecy. Bert den Boer |
| 1990 | On an Implementation of the Mohan-Adiga Algorithm. Gisela Meister |
| 1990 | On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. Ben J. M. Smeets, Peter Vanroose, Zhe-Xian Wan |
| 1990 | On the Construction of Run Permuted Sequences. Cees J. A. Jansen |
| 1990 | On the Design of Provably Secure Cryptographic Hash Functions. Alfredo De Santis, Moti Yung |
| 1990 | On the Importance of Memory Resources in the Security of Key Exchange Protocols. George I. Davida, Yvo Desmedt, René Peralta |
| 1990 | Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer |
| 1990 | Propagation Characteristics of Boolean Functions. Bart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle |
| 1990 | Properties of Binary Functions. Sheelagh Lloyd |
| 1990 | Provably Secure Key-Updating Schemes in Identity-Based Systems. Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii |
| 1990 | Public-Randomness in Public Key Cryptography. Alfredo De Santis, Giuseppe Persiano |
| 1990 | Software Run-Time Protection: A Cryptographic Issue. Josep Domingo-Ferrer |
| 1990 | The Linear Complexity Profile and the Jump Complexity of Keystream Sequences. Harald Niederreiter |
| 1990 | The MD4 Message Digest Algorithm (Abstract). Burton S. Kaliski Jr. |
| 1990 | VICTOR an Efficient RSA Hardware Implementation. Holger Orup, Erik Svendsen, Erik Andreasen |
| 1990 | Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? Jan-Hendrik Evertse, Eugène van Heyst |
| 1990 | Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions. Mike Burmester |
| 1990 | Zero-Knowledge Undeniable Signatures. David Chaum |