| 1998 | A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
| 1998 | A Formal Treatment of Remotely Keyed Encryption. Matt Blaze, Joan Feigenbaum, Moni Naor |
| 1998 | A New Public-Key Cryptosystem as Secure as Factoring. Tatsuaki Okamoto, Shigenori Uchiyama |
| 1998 | A Practical Mix. Markus Jakobsson |
| 1998 | A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. Eiichiro Fujisaki, Tatsuaki Okamoto |
| 1998 | Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding Kaisa Nyberg |
| 1998 | Auto-Recoverable Auto-Certifiable Cryptosystems. Adam L. Young, Moti Yung |
| 1998 | Breaking RSA May Not Be Equivalent to Factoring. Dan Boneh, Ramarathnam Venkatesan |
| 1998 | Combinatorial Bounds for Broadcast Encryption. Michael Luby, Jessica Staddon |
| 1998 | Computing Discrete Logarithms with Quadratic Number Rings. Damian Weber |
| 1998 | Cryptanalysis of the ANSI X9.52 CBCM Mode. Eli Biham, Lars R. Knudsen |
| 1998 | Differential-Linear Weak Key Classes of IDEA. Philip Hawkes |
| 1998 | Divertible Protocols and Atomic Proxy Cryptography. Matt Blaze, Gerrit Bleumer, Martin Strauss |
| 1998 | Easy Come - Easy Go Divisible Cash. Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis |
| 1998 | Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z Noboru Kunihiro, Kenji Koyama |
| 1998 | Fast Batch Verification for Modular Exponentiation and Digital Signatures. Mihir Bellare, Juan A. Garay, Tal Rabin |
| 1998 | Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? Daniel R. Simon |
| 1998 | Generic Constructions for Secure and Efficient Confirmer Signature Schemes. Markus Michels, Markus Stadler |
| 1998 | Heuristic Design of Cryptographically Strong Balanced Boolean Functions. William Millan, Andrew J. Clark, Ed Dawson |
| 1998 | Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity. Eric Filiol, Caroline Fontaine |
| 1998 | How to Improve an Exponentiation Black-Box. Gérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor |
| 1998 | Improved Algorithms for Isomorphisms of Polynomials. Jacques Patarin, Louis Goubin, Nicolas T. Courtois |
| 1998 | Improved Cryptanalysis of RC5. Alex Biryukov, Eyal Kushilevitz |
| 1998 | Lower Bounds on Generic Algorithms in Groups. Ueli M. Maurer, Stefan Wolf |
| 1998 | Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. Mihir Bellare, Ted Krovetz, Phillip Rogaway |
| 1998 | New Results on Multi-Receiver Authentication Codes. Reihaneh Safavi-Naini, Huaxiong Wang |
| 1998 | On Finding Small Solutions of Modular Multivariate Polynomial Equations. Charanjit S. Jutla |
| 1998 | On the Foundations of Oblivious Transfer. Christian Cachin |
| 1998 | On the Propagation Criterion of Degree l and Order k. Claude Carlet |
| 1998 | Optimistic Fair Exchange of Digital Signatures (Extended Abstract). N. Asokan, Victor Shoup, Michael Waidner |
| 1998 | Optimum Traitor Tracing and Asymmetric Schemes. Kaoru Kurosawa, Yvo Desmedt |
| 1998 | Quorum-Based Secure Multi-party Computation. Donald Beaver, Avishai Wool |
| 1998 | Secret Sharing Schemes with Bipartite Access Structure. Carles Padró, Germán Sáez |
| 1998 | Secure Communications in Minimal Connectivity Models. Matthew K. Franklin, Rebecca N. Wright |
| 1998 | Secure and Efficient Metering. Moni Naor, Benny Pinkas |
| 1998 | Securing Threshold Cryptosystems against Chosen Ciphertext Attack. Victor Shoup, Rosario Gennaro |
| 1998 | Security Analysis of a Practical "on the fly" Authentication and Signature Generation. Guillaume Poupard, Jacques Stern |
| 1998 | Security of an Identity-Based Cryptosystem and the Related Reductions. Tatsuaki Okamoto, Shigenori Uchiyama |
| 1998 | Specialized Integer Factorization. Don Coppersmith |
| 1998 | Speeding up Discrete Log and Factoring Based Schemes via Precomputations. Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan |
| 1998 | Strengthened Security for Blind Signatures. David Pointcheval |
| 1998 | The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. Mariusz H. Jakubowski, Ramarathnam Venkatesan |
| 1998 | Towards a Better Understanding of One-Wayness: Facing Linear Permutations. Alain P. Hiltgen |
| 1998 | Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. Masayuki Abe |
| 1998 | Visual Cryptanalysis. Adi Shamir |