| 1999 | A Note on the Limits of Collusion-Resistant Watermarks. Funda Ergün, Joe Kilian, Ravi Kumar |
| 1999 | Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding Jacques Stern |
| 1999 | An Analysis of Exponentiation Based on Formal Languages. Luke O'Connor |
| 1999 | An Efficient Ran Canetti, Shafi Goldwasser |
| 1999 | Coin-Based Anonymous Fingerprinting. Birgit Pfitzmann, Ahmad-Reza Sadeghi |
| 1999 | Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai |
| 1999 | Computationally Private Information Retrieval with Polylogarithmic Communication. Christian Cachin, Silvio Micali, Markus Stadler |
| 1999 | Conditional Oblivious Transfer and Timed-Release Encryption. Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramakrishnan Rajagopalan |
| 1999 | Cryptanalysis of RSA with Private Key Dan Boneh, Glenn Durfee |
| 1999 | Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Eli Biham, Alex Biryukov, Adi Shamir |
| 1999 | Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. Lars R. Knudsen, Willi Meier |
| 1999 | Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki |
| 1999 | Distributed Pseudo-random Functions and KDCs. Moni Naor, Benny Pinkas, Omer Reingold |
| 1999 | Efficient Communication-Storage Tradeoffs for Multicast Encryption. Ran Canetti, Tal Malkin, Kobbi Nissim |
| 1999 | Efficient Multiparty Computations Secure Against an Adaptive Adversary. Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin |
| 1999 | Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino |
| 1999 | Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. Thomas Johansson, Fredrik Jönsson |
| 1999 | Lower Bounds for Oblivious Transfer Reductions. Yevgeniy Dodis, Silvio Micali |
| 1999 | New Public Key Cryptosystems Based on the Dependent-RSA Problems. David Pointcheval |
| 1999 | On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. Ivan Damgård, Joe Kilian, Louis Salvail |
| 1999 | On the Concurrent Composition of Zero-Knowledge Proofs. Ransom Richardson, Joe Kilian |
| 1999 | On the Performance of Hyperelliptic Cryptosystems. Nigel P. Smart |
| 1999 | Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. Jan Camenisch, Markus Michels |
| 1999 | Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications. Marc Fischlin |
| 1999 | Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Pascal Paillier |
| 1999 | Resistance Against General Iterated Attacks. Serge Vaudenay |
| 1999 | S-boxes with Controllable Nonlinearity. Jung Hee Cheon, Seongtaek Chee, Choonsik Park |
| 1999 | Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. Yongge Wang, Yvo Desmedt |
| 1999 | Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
| 1999 | Secure Hash-and-Sign Signatures Without the Random Oracle. Rosario Gennaro, Shai Halevi, Tal Rabin |
| 1999 | Software Performance of Universal Hash Functions. Wim Nevelsteen, Bart Preneel |
| 1999 | Unbalanced Oil and Vinegar Signature Schemes. Aviad Kipnis, Jacques Patarin, Louis Goubin |
| 1999 | XOR and Non-XOR Differential Probabilities. Philip Hawkes, Luke O'Connor |