| 1988 | A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract). Shin-ichi Kawamura, Kyoko Hirano |
| 1988 | A Generalized Birthday Attack. Marc Girault, Robert Cohen, Mireille Campana |
| 1988 | A Measure of Semiequivocation. Andrea Sgarro |
| 1988 | A New Class of Nonlinear Functions for Running-key Generators (Extended Abstract). Shu Tezuka |
| 1988 | A New Probabilistic Encryption Scheme. He Jingmin, Lu Kaicheng |
| 1988 | A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. Louis C. Guillou, Jean-Jacques Quisquater |
| 1988 | A Probabilistic Primality test Based on the Properties of Certain Generalized Lucas Numbers. Adina di Porto, Piero Filipponi |
| 1988 | A Smart Card Implementation of the Fiat-Shamir Identification Scheme. Hans-Joachim Knobloch |
| 1988 | A Universal Algorithm for Homophonic Coding. Christoph G. Günther |
| 1988 | Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings Christoph G. Günther |
| 1988 | An Interactive Data Exchange Protocol Based on Discrete Exponentiation. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
| 1988 | An Observation on the Security of McEliece's Public-Key Cryptosystem. Pil Joong Lee, Ernest F. Brickell |
| 1988 | Anonymous and Verifiable Registration in Databases. Jørgen Brandt, Ivan Damgård, Peter Landrock |
| 1988 | Authentication Codes with Multiple Arbiters (Extended Abstract). Ernest F. Brickell, Douglas R. Stinson |
| 1988 | Cryptanalysis of F.E.A.L. Bert den Boer |
| 1988 | Efficient Zero-Knowledge Identification Scheme for Smart Cards. Thomas Beth |
| 1988 | Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. David Chaum |
| 1988 | Factorization of Large Integers on a Massively Parallel Computer. James A. Davis, Diane B. Holdridge |
| 1988 | Fast Correlation Attacks on Stream Ciphers (Extended Abstract). Willi Meier, Othmar Staffelbach |
| 1988 | Fast Exponentiation in Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
| 1988 | Fast RSA-Hardware: Dream or Reality? Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts |
| 1988 | How to Break Okamoto's Cryptosystem by Reducing Lattice Bases. Brigitte Vallée, Marc Girault, Philippe Toffin |
| 1988 | Key Agreements Based on Function Composition. Rainer A. Rueppel |
| 1988 | Linear Recurring m-Arrays. Dongdai Lin, Mulan Liu |
| 1988 | Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. William G. Chambers, Dieter Gollmann |
| 1988 | Manipulations and Errors, Detection and Localization. Philippe Godlewski, Paul Camion |
| 1988 | On the Construction of Random Number Generators and Random Function Generators. Claus-Peter Schnorr |
| 1988 | Passports and Visas Versus IDS (Extended Abstract). George I. Davida, Yvo Desmedt |
| 1988 | Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. Svein J. Knapskog |
| 1988 | Proof of Massey's Conjectured Algorithm. Cunsheng Ding |
| 1988 | Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications. Raouf N. Gorgui-Naguib, Satnam Singh Dlay |
| 1988 | Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. Tsutomu Matsumoto, Hideki Imai |
| 1988 | Security of Improved Identity-Based Conference Key Distribution Systems. Kenji Koyama, Kazuo Ohta |
| 1988 | Some Applications of Multiple Key Ciphers. Colin Boyd |
| 1988 | Some Constructions for Authentication-Secrecy Codes. Marijke De Soete |
| 1988 | Some New Classes of Geometric Threshold Schemes. Marijke De Soete, Klaus Vedder |
| 1988 | Subliminal-Free Authentication and Signature (Extended Abstract). Yvo Desmedt |
| 1988 | Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. Eiji Okamoto |
| 1988 | The Probabilistic Theory of Linear Complexity. Harald Niederreiter |
| 1988 | Windmill Generators: A Generalization and an Observation of How Many There Are. Ben J. M. Smeets, William G. Chambers |
| 1988 | Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. Gustavus J. Simmons, George B. Purdy |