| 2008 | A Design for a Physical RNG with Robust Entropy Estimators. Wolfgang Killmann, Werner Schindler |
| 2008 | A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis. Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
| 2008 | A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases. Arash Reyhani-Masoleh |
| 2008 | A Real-World Attack Breaking A5/1 within Hours. Timo Gendrullis, Martin Novotný, Andy Rupp |
| 2008 | A Very Compact Hardware Implementation of the MISTY1 Block Cipher. Dai Yamamoto, Jun Yajima, Kouichi Itoh |
| 2008 | A Vision for Platform Security. Ernie Brickell |
| 2008 | Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain |
| 2008 | Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Stefan Tillich, Christoph Herbst |
| 2008 | Binary Edwards Curves. Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi |
| 2008 | Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir |
| 2008 | Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings Elisabeth Oswald, Pankaj Rohatgi |
| 2008 | Divided Backend Duplication Methodology for Balanced Dual Rail Routing. Karthik Baddam, Mark Zwolinski |
| 2008 | Efficient Helper Data Key Extractor on FPGAs. Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls |
| 2008 | Exploiting the Power of GPUs for Asymmetric Cryptography. Robert Szerwinski, Tim Güneysu |
| 2008 | Fast Digital TRNG Based on Metastable Ring Oscillator. Ihor V. Vasyltsov, Eduard Hambardzumyan, Young-Sik Kim, Bohdan Karpinskyy |
| 2008 | Hash Functions and RFID Tags: Mind the Gap. Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin |
| 2008 | High-Performance Concurrent Error Detection Scheme for AES Hardware. Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki |
| 2008 | Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. Philipp Grabher, Johann Großschädl, Dan Page |
| 2008 | Multiple-Differential Side-Channel Collision Attacks on AES. Andrey Bogdanov |
| 2008 | Mutual Information Analysis. Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel |
| 2008 | Perturbating RSA Public Keys: An Improved Attack. Alexandre Berzati, Cécile Canovas, Louis Goubin |
| 2008 | Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede |
| 2008 | RFID and Its Vulnerability to Faults. Michael Hutter, Jörn-Marc Schmidt, Thomas Plos |
| 2008 | RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. David Vigilant |
| 2008 | RSA-Past, Present, Future. Adi Shamir |
| 2008 | Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. Colin D. Walter |
| 2008 | The Carry Leakage on the Randomized Exponent Countermeasure. Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi |
| 2008 | Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf |
| 2008 | Ultra High Performance ECC over NIST Primes on Commercial FPGAs. Tim Güneysu, Christof Paar |
| 2008 | Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. François-Xavier Standaert, Cédric Archambeau |