| 2008 | A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit |
| 2008 | Attacking and Defending the McEliece Cryptosystem. Daniel J. Bernstein, Tanja Lange, Christiane Peters |
| 2008 | Cryptanalysis of Rational Multivariate Public Key Cryptosystems. Jintai Ding, John Wagner |
| 2008 | Digital Signatures Out of Second-Preimage Resistant Hash Functions. Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
| 2008 | Explicit Hard Instances of the Shortest Vector Problem. Johannes Buchmann, Richard Lindner, Markus Rückert |
| 2008 | MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann |
| 2008 | McEliece Cryptosystem Implementation: Theory and Practice. Bhaskar Biswas, Nicolas Sendrier |
| 2008 | Merkle Tree Traversal Revisited. Johannes Buchmann, Erik Dahmen, Michael Schneider |
| 2008 | Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii |
| 2008 | On the Power of Quantum Encryption Keys. Akinori Kawachi, Christopher Portmann |
| 2008 | Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings Johannes Buchmann, Jintai Ding |
| 2008 | Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang |
| 2008 | Secure PRNGs from Specialized Polynomial Maps over Any . Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang |
| 2008 | Side Channels in the McEliece PKC. Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan |
| 2008 | Square-Vinegar Signature Scheme. John Baena, Crystal Clough, Jintai Ding |
| 2008 | Syndrome Based Collision Resistant Hashing. Matthieu Finiasz |