Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver Shai Halevi OriginalPaper 17 June 1999 Pages: 77 - 89
Bucket Hashing and Its Application to Fast Message Authentication Phillip Rogaway OriginalPaper 17 June 1999 Pages: 91 - 115
Translucent Cryptography—An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer Mihir BellareRonald L. Rivest OriginalPaper 17 June 1999 Pages: 117 - 139
Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic N. P. Smart OriginalPaper 17 June 1999 Pages: 141 - 151