| 2008 | A Framework for Efficient and Composable Oblivious Transfer. Chris Peikert, Vinod Vaikuntanathan, Brent Waters |
| 2008 | Adaptive One-Way Functions and Applications. Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan |
| 2008 | Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings David A. Wagner |
| 2008 | Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. Martijn Stam |
| 2008 | Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. Dimitar Jetchev, Ramarathnam Venkatesan |
| 2008 | Bug Attacks. Eli Biham, Yaniv Carmeli, Adi Shamir |
| 2008 | Circular-Secure Encryption from Decision Diffie-Hellman. Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky |
| 2008 | Collusion-Free Protocols in the Mediated Model. Joël Alwen, Abhi Shelat, Ivan Visconti |
| 2008 | Communication Complexity in Algebraic Two-Party Protocols. Rafail Ostrovsky, William E. Skeith III |
| 2008 | Compression from Collisions, or Why CRHF Combiners Have a Long Output. Krzysztof Pietrzak |
| 2008 | Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. Phillip Rogaway, John P. Steinberger |
| 2008 | Cryptanalysis of MinRank. Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret |
| 2008 | Cryptanalysis of the GOST Hash Function. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt |
| 2008 | Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations. Manoj Prabhakaran, Mike Rosulek |
| 2008 | Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart |
| 2008 | Distributed Private Data Analysis: Simultaneously Solving How and What. Amos Beimel, Kobbi Nissim, Eran Omri |
| 2008 | Dynamic Threshold Public-Key Encryption. Cécile Delerablée, David Pointcheval |
| 2008 | Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. Yevgeniy Dodis, Victor Shoup, Shabsi Walfish |
| 2008 | Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. Payman Mohassel, Enav Weinreb |
| 2008 | Founding Cryptography on Oblivious Transfer - Efficiently. Yuval Ishai, Manoj Prabhakaran, Amit Sahai |
| 2008 | Improved Bounds on Security Reductions for Discrete Log Based Signatures. Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam |
| 2008 | Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. Helena Handschuh, Bart Preneel |
| 2008 | New Efficient Attacks on Statistical Disclosure Control Mechanisms. Cynthia Dwork, Sergey Yekhanin |
| 2008 | New State Recovery Attack on RC4. Alexander Maximov, Dmitry Khovratovich |
| 2008 | Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems. Chris Peikert, Vinod Vaikuntanathan |
| 2008 | On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. Alexandra Boldyreva, Serge Fehr, Adam O'Neill |
| 2008 | On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
| 2008 | One-Time Programs. Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum |
| 2008 | Preimages for Reduced SHA-0 and SHA-1. Christophe De Cannière, Christian Rechberger |
| 2008 | Programmable Hash Functions and Their Applications. Dennis Hofheinz, Eike Kiltz |
| 2008 | Public-Key Locally-Decodable Codes. Brett Hemenway, Rafail Ostrovsky |
| 2008 | Scalable Multiparty Computation with Nearly Optimal Work and Resilience. Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam D. Smith |
| 2008 | The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin |