| 1998 | About Feistel Schemes with Six (or More) Rounds. Jacques Patarin |
| 1998 | Attacking Triple Encryption. Stefan Lucks |
| 1998 | CS-Cipher. Jacques Stern, Serge Vaudenay |
| 1998 | Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. David A. Wagner |
| 1998 | Cryptanalysis of TWOPRIME. Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey |
| 1998 | Cryptanalytic Attacks on Pseudorandom Number Generators. John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall |
| 1998 | Differential Cryptanalysis of KHF. David A. Wagner |
| 1998 | Differential Cryptanalysis of the ICE Encryption Algorithm. Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen |
| 1998 | Fast Hashing and Stream Encryption with PANAMA. Joan Daemen, Craig S. K. Clapp |
| 1998 | Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings Serge Vaudenay |
| 1998 | Higher Order Differential Attak of CAST Cipher. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko |
| 1998 | JEROBOAM. Hervé Chabanne, Emmanuel Michon |
| 1998 | Joint Hardware / Software Design of a Fast Stream Cipher. Craig S. K. Clapp |
| 1998 | MRD Hashing. Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes |
| 1998 | Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. Adam L. Young, Moti Yung |
| 1998 | New Constructions for Secure Hash Functions. William Aiello, Stuart Haber, Ramarathnam Venkatesan |
| 1998 | New Results in Linear Cryptanalysis of RC5. Ali Aydin Selçuk |
| 1998 | On the Design and Security of RC2. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw |
| 1998 | On the Security of the Hashing Scheme Based on SL Kanat S. Abdukhalikov, Chul Kim |
| 1998 | Serpent: A New Block Cipher Proposal. Eli Biham, Ross J. Anderson, Lars R. Knudsen |
| 1998 | The First Two Rounds of MD4 are Not One-Way. Hans Dobbertin |