| 1998 | A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. Ronald Cramer, Victor Shoup |
| 1998 | A Simplified Approach to Threshold and Proactive RSA. Tal Rabin |
| 1998 | Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings Hugo Krawczyk |
| 1998 | An Efficient Discrete Log Pseudo Random Generator. Sarvar Patel, Ganapathy S. Sundaram |
| 1998 | An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. Neal Koblitz |
| 1998 | Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). Yonatan Aumann, Michael O. Rabin |
| 1998 | Building PRFs from PRPs. Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier |
| 1998 | Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Daniel Bleichenbacher |
| 1998 | Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. Cynthia Dwork, Amit Sahai |
| 1998 | Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Thomas Jakobson |
| 1998 | Cryptanalysis of the Ajtai-Dwork Cryptosystem. Phong Q. Nguyen, Jacques Stern |
| 1998 | Cryptanalysis of the Chor-Rivest Cryptosystem. Serge Vaudenay |
| 1998 | Cryptanalysis of the Oil & Vinegar Signature Scheme. Aviad Kipnis, Adi Shamir |
| 1998 | Cryptography and the Internet. Steven M. Bellovin |
| 1998 | Differential Collisions in SHA-0. Florent Chabaud, Antoine Joux |
| 1998 | Fast Digital Identity Revocation (Extended Abstract). William Aiello, Sachin Lodha, Rafail Ostrovsky |
| 1998 | Fast RSA-Type Cryptosystem Modulo p Tsuyoshi Takagi |
| 1998 | From Differential Cryptanalysis to Ciphertext-Only Attacks. Alex Biryukov, Eyal Kushilevitz |
| 1998 | From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). Moni Naor, Omer Reingold |
| 1998 | Generalized Birthday Arracks on Unbalanced Feistel Networks. Charanjit S. Jutla |
| 1998 | Identity Escrow. Joe Kilian, Erez Petrank |
| 1998 | Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan |
| 1998 | New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. Dario Catalano, Rosario Gennaro |
| 1998 | On Concrete Security Treatment of Signatures Derived from Identification. Kazuo Ohta, Tatsuaki Okamoto |
| 1998 | On the Existence of 3-Round Zero-Knowledge Protocols. Satoshi Hada, Toshiaki Tanaka |
| 1998 | Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. Daniel V. Bailey, Christof Paar |
| 1998 | Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. Takeshi Shimoyama, Toshinobu Kaneko |
| 1998 | Quantum Bit Commitment from a Physical Assumption. Louis Salvail |
| 1998 | Relations Among Notions of Security for Public-Key Encryption Schemes. Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
| 1998 | Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
| 1998 | Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest |
| 1998 | The Solution of McCurley's Discrete Log Challenge. Damian Weber, Thomas F. Denny |
| 1998 | Threshold Traitor Tracing. Moni Naor, Benny Pinkas |
| 1998 | Time-Stamping with Binary Linking Schemes. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson |
| 1998 | Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). Matthias Fitzi, Martin Hirt, Ueli M. Maurer |
| 1998 | Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? Ronald Cramer, Ivan Damgård |