| 1990 | Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings Shafi Goldwasser |
| 1988 | "Practical IP" <= MA. Gilles Brassard, Ivan Damgård |
| 1988 | A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. Louis C. Guillou, Jean-Jacques Quisquater |
| 1988 | A Basic Theory of Public and Private Cryptosystems. Charles Rackoff |
| 1988 | A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. Michael Lucks |
| 1988 | A Family of Jacobians Suitable for Discrete Log Cryptosystems. Neal Koblitz |
| 1988 | A Modification of the Fiat-Shamir Scheme. Kazuo Ohta, Tatsuaki Okamoto |
| 1988 | A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm. Oded Goldreich, Eyal Kushilevitz |
| 1988 | A Secure Audio Teleconference System. David G. Steer, Leo Strawczynski, Whitfield Diffie, Michael J. Wiener |
| 1988 | A Universal Problem in Secure and Verifiable Distributed Computation. Ming-Deh A. Huang, Shang-Hua Teng |
| 1988 | Abuses in Cryptography and How to Fight Them. Yvo Desmedt |
| 1988 | An Abstract Theory of Computer Viruses. Leonard M. Adleman |
| 1988 | An Improvement of the Fiat-Shamir Identification and Signature Scheme. Silvio Micali, Adi Shamir |
| 1988 | Aperiodic Linear Complexities of de Bruijn Sequences. Richard T. C. Kwok, Maurice Beale |
| 1988 | Bounds and Constructions for Authentication-Secrecy Codes with Splitting. Marijke De Soete |
| 1988 | Computation of Approximate L-th Roots Modulo Marc Girault, Philippe Toffin, Brigitte Vallée |
| 1988 | Developing Ethernet Enhanced-Security System. B. J. Herbison |
| 1988 | Diffie-Hellman is as Strong as Discrete Log for Certain Primes. Bert den Boer |
| 1988 | Efficient, Perfect Random Number Generators. Silvio Micali, Claus-Peter Schnorr |
| 1988 | Everything Provable is Provable in Zero-Knowledge. Michael Ben-Or, Oded Goldreich, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway |
| 1988 | Generalized Secret Sharing and Monotone Functions. Josh Cohen Benaloh, Jerry Leichter |
| 1988 | How To Sign Given Any Trapdoor Function. Mihir Bellare, Silvio Micali |
| 1988 | How to (Really) Share a Secret. Gustavus J. Simmons |
| 1988 | Intractable Problems in Number Theory. Eric Bach |
| 1988 | Limits on the Provable Consequences of One-way Permutations. Russell Impagliazzo, Steven Rudich |
| 1988 | Non-Interactive Zero-Knowledge with Preprocessing. Alfredo De Santis, Silvio Micali, Giuseppe Persiano |
| 1988 | On Generating Solved Instances of Computational Problems. Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra |
| 1988 | On the Existence of Pseudorandom Generators. Oded Goldreich, Hugo Krawczyk, Michael Luby |
| 1988 | On the Linear Syndrome Method in Cryptanalysis. Kencheng Zeng, Minqiang Huang |
| 1988 | On the McEliece Public-Key Cryptosystem. Johan van Tilburg |
| 1988 | On the Power of 1-way Functions (Abstract). Stuart A. Kurtz, Stephen R. Mahaney, James S. Royer |
| 1988 | On the Randomness of Legendre and Jacobi Sequences. Ivan Damgård |
| 1988 | Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. Ivan Damgård |
| 1988 | Proving Security Against Chosen Cyphertext Attacks. Manuel Blum, Paul Feldman, Silvio Micali |
| 1988 | Secret Error-Correcting Codes (SECC). Tzonelih Hwang, T. R. N. Rao |
| 1988 | Speeding Up Secret Computations with Insecure Auxiliary Devices. Tsutomu Matsumoto, Koki Kato, Hideki Imai |
| 1988 | The Application of Smart Cards for RSA Digital Signatures in a Network Comprising both Interactive and Store-and-Foreward Facilities. J. R. Sherwood, V. A. Gallo |
| 1988 | The Detection of Cheaters in Threshold Schemes. Ernest F. Brickell, Douglas R. Stinson |
| 1988 | The Noisy Oracle Problem. Uriel Feige, Adi Shamir, Moshe Tennenholtz |
| 1988 | The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition. Réjane Forré |
| 1988 | Untraceable Electronic Cash. David Chaum, Amos Fiat, Moni Naor |
| 1988 | Weakening Security Assumptions and Oblivious Transfer (Abstract). Claude Crépeau, Joe Kilian |
| 1988 | Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen |
| 1988 | Zero-Knowledge With Finite State Verifiers. Cynthia Dwork, Larry J. Stockmeyer |