| 2008 | A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting. Jason Keller, Joe Kilian |
| 2008 | A Modular Security Analysis of the TLS Handshake Protocol. Paul Morrissey, Nigel P. Smart, Bogdan Warinschi |
| 2008 | A New Attack on the LEX Stream Cipher. Orr Dunkelman, Nathan Keller |
| 2008 | Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings Josef Pieprzyk |
| 2008 | Ambiguous Optimistic Fair Exchange. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo |
| 2008 | An Improved Impossible Differential Attack on MISTY1. Orr Dunkelman, Nathan Keller |
| 2008 | An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. Claude Carlet, Keqin Feng |
| 2008 | Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. Ueli M. Maurer, Stefano Tessaro |
| 2008 | Breaking the F-FCSR-H Stream Cipher in Real Time. Martin Hell, Thomas Johansson |
| 2008 | Chosen Ciphertext Security with Optimal Ciphertext Overhead. Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
| 2008 | Compact Proofs of Retrievability. Hovav Shacham, Brent Waters |
| 2008 | Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
| 2008 | Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. Jung-Keun Lee, Dong Hoon Lee, Sangwoo Park |
| 2008 | Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. Goichiro Hanaoka, Kaoru Kurosawa |
| 2008 | Efficient Protocols for Set Membership and Range Proofs. Jan Camenisch, Rafik Chaabouni, Abhi Shelat |
| 2008 | Generalized Identity Based and Broadcast Encryption Schemes. Dan Boneh, Michael Hamburg |
| 2008 | Graph Design for Secure Multiparty Computation over Non-Abelian Groups. Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary |
| 2008 | Hash Functions from Sigma Protocols and Improvements to VSH. Mihir Bellare, Todor Ristov |
| 2008 | How to Fill Up Merkle-Damgård Hash Functions. Kan Yasuda |
| 2008 | Limits of Constructive Security Proofs. Michael Backes, Dominique Unruh |
| 2008 | MPC vs. SFE : Unconditional and Computational Security. Martin Hirt, Ueli M. Maurer, Vassilis Zikas |
| 2008 | OAEP Is Secure under Key-Dependent Messages. Michael Backes, Markus Dürmuth, Dominique Unruh |
| 2008 | On the Security of HB# against a Man-in-the-Middle Attack. Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
| 2008 | On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. Christian Schridde, Bernd Freisleben |
| 2008 | Preimage Attacks on 3, 4, and 5-Pass HAVAL. Yu Sasaki, Kazumaro Aoki |
| 2008 | Rigorous and Efficient Short Lattice Vectors Enumeration. Xavier Pujol, Damien Stehlé |
| 2008 | Slide Attacks on a Class of Hash Functions. Michael Gorski, Stefan Lucks, Thomas Peyrin |
| 2008 | Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. Mathias Herrmann, Alexander May |
| 2008 | Some Perspectives on Complexity-Based Cryptography. Andrew Chi-Chih Yao |
| 2008 | Speeding Up the Pollard Rho Method on Prime Fields. Jung Hee Cheon, Jin Hong, Minkyu Kim |
| 2008 | Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang |
| 2008 | Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi |
| 2008 | Towards Robust Computation on Encrypted Data. Manoj Prabhakaran, Mike Rosulek |
| 2008 | Twisted Edwards Curves Revisited. Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson |
| 2008 | Universally Composable Adaptive Oblivious Transfer. Matthew Green, Susan Hohenberger |