| 2000 | Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings Howard M. Heys, Carlisle M. Adams |
| 1999 | A Universal Encryption Standard. Helena Handschuh, Serge Vaudenay |
| 1999 | Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. Serge Vaudenay |
| 1999 | Efficient Evaluation of Security against Generalized Interpolation Attack. Kazumaro Aoki |
| 1999 | Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. Detlef Hühnlein |
| 1999 | Elliptic Curve Pseudorandom Sequence Generators. Guang Gong, Thomas A. Berson, Douglas R. Stinson |
| 1999 | Guesswork and Variation Distance as Measures of Cipher Security. John O. Pliam |
| 1999 | Improving and Extending the Lim/Lee Exponentiation Algorithm. Biljana Cubaleska, Andreas Rieke, Thomas Hermann |
| 1999 | Key-Schedule Cryptanalysis of DEAL. John Kelsey, Bruce Schneier |
| 1999 | Modeling Linear Characteristics of Substitution-Permutation Networks. Liam Keliher, Henk Meijer, Stafford E. Tavares |
| 1999 | Photuris: Design Criteria. William Allen Simpson |
| 1999 | Protecting a Mobile Agent's Route against Collusions. Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali |
| 1999 | Pseudonym Systems. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf |
| 1999 | Security of E2 against Truncated Differential Cryptanalysis. Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda |
| 1999 | Software Optimization of Decorrelation Module. Fabrice Noilhan |
| 1999 | Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. Yuliang Zheng, Xian-Mo Zhang |
| 1999 | Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. Douglas R. Stinson, Ruizhong Wei |
| 1999 | Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. John Kelsey, Bruce Schneier, Niels Ferguson |