| 1999 | A Cryptographic Application of Weil Descent. Steven D. Galbraith, Nigel P. Smart |
| 1999 | A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System. Helen Donelan, Timothy O'Farrell |
| 1999 | A Unified Code. Xian Liu, Patrick Guy Farrell, Colin Boyd |
| 1999 | Advanced Encryption Standard (AES) - An Update. Lars R. Knudsen |
| 1999 | An Encoding Scheme for Dual Level Access to Broadcasting Networks. Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney |
| 1999 | An Overview of the Isoperimetric Method in Coding Theory. Jean-Pierre Tillich, Gilles Zémor |
| 1999 | Applications of Exponential Sums in Communications Theory. Kenneth G. Paterson |
| 1999 | Catastrophicity Test for Time-Varying Convolutional Encoders. Conor O'Donoghue, Cyril J. Burkley |
| 1999 | Coding Applications in Satellite Communication Systems. Sean McGrath |
| 1999 | Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics. Edgar Martínez-Moro, F. Javier Galán-Simón, Miguel A. Borges-Trenard, Mijail Borges-Quintana |
| 1999 | Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings Michael Walker |
| 1999 | Delegated Decryption. Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen |
| 1999 | Designs, Intersecting Families, and Weight of Boolean Functions. Eric Filiol |
| 1999 | Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. Chan Yeob Yeun |
| 1999 | Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. Renato Menicocci, Jovan Dj. Golic |
| 1999 | Enhanced Image Coding for Noisy Channels. Paul Chippendale, Cagri C. Tanriover, Bahram Honary |
| 1999 | Fast and Space-Efficient Adaptive Arithmetic Coding. Boris Ryabko, Andrei Fionov |
| 1999 | Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions. Enes Pasalic, Thomas Johansson |
| 1999 | Graph Decoding of Array Error-Correcting Codes. Patrick Guy Farrell, Seyed H. Razavi |
| 1999 | Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems. M. Anwarul Hasan |
| 1999 | Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes. Min-seok Oh, Peter Sweeney |
| 1999 | New Self-Dual Codes over GF(5). Stelios Georgiou, Christos Koukouvinos |
| 1999 | On Efficient Decoding of Alternant Codes over a Commutative Ring. Graham H. Norton, Ana Salagean |
| 1999 | On the Combined Fermat/Lucas Probable Prime Test. Siguna Müller |
| 1999 | On the Cryptanalysis of Nonlinear Sequences. Solomon W. Golomb |
| 1999 | Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. George I. Davida, Yair Frankel |
| 1999 | Photograph Signatures for the Protection of Identification Documents. Bruno Bellamy, John S. Mason, Michael Ellis |
| 1999 | Rectangular Basis of a Linear Code. Johannes Maucher, Vladimir Sidorenko, Martin Bossert |
| 1999 | Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes. Jihye Gwak, Sooyoung Kim Shin, Hyung-Myung Kim |
| 1999 | Robust Protocol for Generating Shared RSA Parameters. Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi |
| 1999 | Securing Aeronautical Telecommunications. Simon Blake-Wilson |
| 1999 | Some Applications of Bounds for Designs to the Cryptography. Svetla Nikova, Ventzislav Nikov |
| 1999 | Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes. Stephan Wesemeyer, Peter Sweeney, David R. B. Burgess |
| 1999 | Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography. Roger Fischlin, Jean-Pierre Seifert |
| 1999 | The Piling-Up Lemma and Dependent Random Variables. Zsolt Kukorelly |
| 1999 | Weaknesses in Shared RSA Key Generation Protocols. Simon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith |