| 1998 | A Group Signature Scheme with Improved Efficiency. Jan Camenisch, Markus Michels |
| 1998 | A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. Julien P. Stern |
| 1998 | A Study on the Proposed Korean Digital Signature Algorithm. Chae Hoon Lim, Pil Joong Lee |
| 1998 | Adaptively Secure Oblivious Transfer. Donald Beaver |
| 1998 | Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings Kazuo Ohta, Dingyi Pei |
| 1998 | An Attack on RSA Given a Small Fraction of the Private Key Bits. Dan Boneh, Glenn Durfee, Yair Frankel |
| 1998 | Analysis Methods for (Alleged) RC4. Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege |
| 1998 | Audio and Optical Cryptography. Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
| 1998 | Bounds and Constructions for Multireceiver Authentication Codes. Reihaneh Safavi-Naini, Huaxiong Wang |
| 1998 | Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii |
| 1998 | Cryptanalysis in Prime Order Subgroups of Wenbo Mao, Chae Hoon Lim |
| 1998 | Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye |
| 1998 | Cryptanalysis of the Original McEliece Cryptosystem. Anne Canteaut, Nicolas Sendrier |
| 1998 | Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F Yasuyuki Sakai, Kouichi Sakurai |
| 1998 | ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). Burton S. Kaliski Jr. |
| 1998 | Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. Henri Cohen, Atsuko Miyaji, Takatoshi Ono |
| 1998 | Efficient Fair Exchange with Verifiable Confirmation of Signatures. Liqun Chen |
| 1998 | Efficient Implementation of Schoof's Algorithm. Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama |
| 1998 | Elliptic Curve Discrete Logarithms and the Index Calculus. Joseph H. Silverman, Joe Suzuki |
| 1998 | Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). Mike Burmester, Yvo Desmedt, Jennifer Seberry |
| 1998 | Fair Off-Line e-cash Made Easy. Yair Frankel, Yiannis Tsiounis, Moti Yung |
| 1998 | Generating RSA Moduli with a Predetermined Portion. Arjen K. Lenstra |
| 1998 | Generation of Shared RSA Keys by Two Parties. Guillaume Poupard, Jacques Stern |
| 1998 | Improved Truncated Differential Attacks on SAFER. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye |
| 1998 | Improving the Security of the McEliece Public-Key Cryptosystem. Hung-Min Sun |
| 1998 | ML-Sequences over Rings Wen Feng Qi, Jun-Hui Yang, Jing Jun Zhou |
| 1998 | Off-Line Fair Payment Protocols Using Convertible Signatures. Colin Boyd, Ernest Foo |
| 1998 | Optimal Resistance Against the Davies and Murphy Attack. Thomas Pornin |
| 1998 | Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. Thomas Johansson |
| 1998 | Some Bounds and a Construction for Secure Broadcast Encryption. Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester |
| 1998 | Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Stefan Wolf |
| 1998 | The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. Phong Q. Nguyen, Jacques Stern |
| 1998 | Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam |