| 2008 | A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya |
| 2008 | A Practical Attack on KeeLoq. Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel |
| 2008 | Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings Nigel P. Smart |
| 2008 | Almost-Everywhere Secure Computation. Juan A. Garay, Rafail Ostrovsky |
| 2008 | Collisions for the LPS Expander Graph Hash Function. Jean-Pierre Tillich, Gilles Zémor |
| 2008 | David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. Tal Moran, Gil Segev |
| 2008 | Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs |
| 2008 | Efficient Non-interactive Proof Systems for Bilinear Groups. Jens Groth, Amit Sahai |
| 2008 | Efficient Sequential Aggregate Signed Data. Gregory Neven |
| 2008 | Efficient Two Party and Multi Party Computation Against Covert Adversaries. Vipul Goyal, Payman Mohassel, Adam D. Smith |
| 2008 | HB Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin |
| 2008 | Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves. Benjamin A. Smith |
| 2008 | Isolated Proofs of Knowledge and Isolated Zero Knowledge. Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
| 2008 | Key Recovery on Hidden Monomial Multivariate Schemes. Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern |
| 2008 | New Constructions for UC Secure Computation Using Tamper-Proof Hardware. Nishanth Chandran, Vipul Goyal, Amit Sahai |
| 2008 | New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Lei Wang, Kazuo Ohta, Noboru Kunihiro |
| 2008 | Obfuscating Point Functions with Multibit Output. Ran Canetti, Ronny Ramzi Dakdouk |
| 2008 | On the Indifferentiability of the Sponge Construction. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche |
| 2008 | Precise Concurrent Zero Knowledge. Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
| 2008 | Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Jonathan Katz, Amit Sahai, Brent Waters |
| 2008 | Predicting Lattice Reduction. Nicolas Gama, Phong Q. Nguyen |
| 2008 | Protocols and Lower Bounds for Failure Localization in the Internet. Boaz Barak, Sharon Goldberg, David Xiao |
| 2008 | Proving Tight Security for Rabin-Williams Signatures. Daniel J. Bernstein |
| 2008 | Second Preimage Attacks on Dithered Hash Functions. Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer |
| 2008 | Security/Efficiency Tradeoffs for Permutation-Based Hashing. Phillip Rogaway, John P. Steinberger |
| 2008 | Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves. Hao Chen, Ronald Cramer, Robbert de Haan, Ignacio Cascudo Pueyo |
| 2008 | Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. Jens Groth, Yuval Ishai |
| 2008 | The Twin Diffie-Hellman Problem and Applications. David Cash, Eike Kiltz, Victor Shoup |
| 2008 | Threshold RSA for Dynamic and Ad-Hoc Groups. Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin |
| 2008 | Towards Key-Dependent Message Security in the Standard Model. Dennis Hofheinz, Dominique Unruh |
| 2008 | Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. Kaoru Kurosawa, Kazuhiro Suzuki |
| 2008 | Zero-Knowledge Sets with Short Proofs. Dario Catalano, Dario Fiore, Mariagrazia Messina |