| 2008 | A (Second) Preimage Attack on the GOST Hash Function. Florian Mendel, Norbert Pramstaller, Christian Rechberger |
| 2008 | A Meet-in-the-Middle Attack on 8-Round AES. Hüseyin Demirci, Ali Aydin Selçuk |
| 2008 | A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. Kan Yasuda |
| 2008 | A Unified Approach to Related-Key Attacks. Eli Biham, Orr Dunkelman, Nathan Keller |
| 2008 | Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee |
| 2008 | Algebraic and Slide Attacks on KeeLoq. Nicolas T. Courtois, Gregory V. Bard, David A. Wagner |
| 2008 | An Improved Security Bound for HCTR. Debrup Chakraborty, Mridul Nandi |
| 2008 | Bit-Pattern Based Integral Attack. Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson |
| 2008 | Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff |
| 2008 | Collisions for Step-Reduced SHA-256. Ivica Nikolic, Alex Biryukov |
| 2008 | Collisions on SHA-0 in One Hour. Stéphane Manuel, Thomas Peyrin |
| 2008 | Cryptanalysis of LASH. Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang |
| 2008 | Differential Fault Analysis of Trivium. Michal Hojsík, Bohuslav Rudolf |
| 2008 | Efficient Reconstruction of RC4 Keys from Internal States. Eli Biham, Yaniv Carmeli |
| 2008 | Entropy of the Internal State of an FCSR in Galois Representation. Andrea Röck |
| 2008 | Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
| 2008 | Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers Kaisa Nyberg |
| 2008 | Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. Blandine Debraize, Louis Goubin |
| 2008 | How to Encrypt with a Malicious Random Number Generator. Seny Kamara, Jonathan Katz |
| 2008 | Impossible Differential Cryptanalysis of CLEFIA. Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo |
| 2008 | Improved Indifferentiability Security Analysis of chopMD Hash Function. Donghoon Chang, Mridul Nandi |
| 2008 | MD4 is Not One-Way. Gaëtan Leurent |
| 2008 | New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger |
| 2008 | New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. Subhamoy Maitra, Goutam Paul |
| 2008 | New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Eli Biham |
| 2008 | On the Salsa20 Core Function. Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater |
| 2008 | Post-Processing Functions for a Biased Physical Random Number Generator. Patrick Lacharme |
| 2008 | SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. Adi Shamir |
| 2008 | SWIFFT: A Modest Proposal for FFT Hashing. Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen |
| 2008 | Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. EunJin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
| 2008 | The Hash Function Family LAKE. Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan |