| 2008 | A Fast and Cache-Timing Resistant Implementation of the AES. Robert Könighofer |
| 2008 | A Latency-Free Election Scheme. Kristian Gjøsteen |
| 2008 | A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Onur Aciiçmez, Werner Schindler |
| 2008 | Aggregate Message Authentication Codes. Jonathan Katz, Andrew Y. Lindell |
| 2008 | An Efficient Protocol for Fair Secure Two-Party Computation. Mehmet S. Kiraz, Berry Schoenmakers |
| 2008 | Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
| 2008 | Boosting AES Performance on a Tiny Processor Core. Stefan Tillich, Christoph Herbst |
| 2008 | CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Eike Kiltz, Yevgeniy Vahlis |
| 2008 | Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Pierre-Alain Fouque, Gaëtan Leurent |
| 2008 | Efficient Fully-Simulatable Oblivious Transfer. Andrew Y. Lindell |
| 2008 | Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo |
| 2008 | Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval |
| 2008 | Fault Analysis Study of IDEA. Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede |
| 2008 | Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu |
| 2008 | Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
| 2008 | Legally-Enforceable Fairness in Secure Two-Party Computation. Andrew Y. Lindell |
| 2008 | Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. Praveen Gauravaram, John Kelsey |
| 2008 | Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. Ping Yu, Stephen R. Tate |
| 2008 | Program Obfuscation and One-Time Programs. Shafi Goldwasser |
| 2008 | Public-Key Encryption with Non-interactive Opening. Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek |
| 2008 | RFID Security: Tradeoffs between Security and Efficiency. Ivan Damgård, Michael Østergaard Pedersen |
| 2008 | Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro |
| 2008 | Security of NMACand HMACBased on Non-malleability. Marc Fischlin |
| 2008 | Separation Results on the "One-More" Computational Problems. Emmanuel Bresson, Jean Monnerat, Damien Vergnaud |
| 2008 | Small Secret Key Attack on a Variant of RSA (Due to Takagi). Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa |
| 2008 | Super-Efficient Verification of Dynamic Outsourced Databases. Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos |
| 2008 | Susceptibility of UHF RFID Tags to Electromagnetic Analysis. Thomas Plos |
| 2008 | Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings Tal Malkin |