| 2008 | A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen |
| 2008 | A Very Compact "Perfectly Masked" S-Box for AES. David Canright, Lejla Batina |
| 2008 | An Authentication Scheme Based on the Twisted Conjugacy Problem. Vladimir Shpilrain, Alexander Ushakov |
| 2008 | Analysis of EAP-GPSK Authentication Protocol. John C. Mitchell, Arnab Roy, Paul D. Rowe, Andre Scedrov |
| 2008 | Anonymity in Transferable E-cash. Sébastien Canard, Aline Gouget |
| 2008 | Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung |
| 2008 | Attacking Reduced Round SHA-256. Somitra Kumar Sanadhya, Palash Sarkar |
| 2008 | Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta |
| 2008 | Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen |
| 2008 | Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. Ramnath Prasad, Nitesh Saxena |
| 2008 | Generic Constructions of Stateful Public Key Encryption and Their Applications. Joonsang Baek, Jianying Zhou, Feng Bao |
| 2008 | Generic Security-Amplifying Methods of Ordinary Digital Signatures. Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong |
| 2008 | Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. Yevgeniy Dodis, Prashant Puniya |
| 2008 | Improved Conditional E-Payments. Marina Blanton |
| 2008 | Multi-factor Authenticated Key Exchange. David Pointcheval, Sébastien Zimmer |
| 2008 | New Differential-Algebraic Attacks and Reparametrization of Rainbow. Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng |
| 2008 | On the Effectiveness of Internal Patching Against File-Sharing Worms. Liang Xie, Hui Song, Sencun Zhu |
| 2008 | On the Security of the CCM Encryption Mode and of a Slight Variant. Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer |
| 2008 | PPAA: Peer-to-Peer Anonymous Authentication. Patrick P. Tsang, Sean W. Smith |
| 2008 | PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. Ghaith Hammouri, Berk Sunar |
| 2008 | Peeking Through the Cloud: DNS-Based Estimation and Its Applications. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos |
| 2008 | Pushback for Overlay Networks: Protecting Against Malicious Insiders. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis |
| 2008 | Repelling Detour Attack Against Onions with Re-encryption. Marek Klonowski, Miroslaw Kutylowski, Anna Lauks |
| 2008 | Replay Attack in a Fair Exchange Protocol. Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep-Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
| 2008 | Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. Nikita Borisov, Soumyadeb Mitra |
| 2008 | Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. Frank Stajano, Daniel Cvrcek, Matt Lewis |
| 2008 | The Security of EPC Gen2 Compliant RFID Protocols. Mike Burmester, Breno de Medeiros |
| 2008 | Traceable Privacy of Recent Provably-Secure RFID Protocols. Khaled Ouafi, Raphael C.-W. Phan |
| 2008 | Traceable and Retrievable Identity-Based Encryption. Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
| 2008 | TrapdoorSanitizable Signatures and Their Application to Content Protection. Sébastien Canard, Fabien Laguillaumie, Michel Milhau |
| 2008 | wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. Brian King |