| 2008 | A CCA Secure Hybrid Damgård's ElGamal Encryption. Yvo Desmedt, Duong Hieu Phan |
| 2008 | A Tamper-Evident Voting Machine Resistant to Covert Channels. Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen |
| 2008 | A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. Sebastian Gajek |
| 2008 | Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. Ahto Buldas, Margus Niitsoo |
| 2008 | Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups. Zhengqin Luo |
| 2008 | Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
| 2008 | Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
| 2008 | Efficient and Provably Secure Certificateless Multi-receiver Signcryption. S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan |
| 2008 | Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao |
| 2008 | How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin |
| 2008 | Leaky Random Oracle (Extended Abstract). Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta |
| 2008 | On Proofs of Security for DAA Schemes. Liqun Chen, Paul Morrissey, Nigel P. Smart |
| 2008 | On the Equivalence of Generic Group Models. Tibor Jager, Jörg Schwenk |
| 2008 | Optimal Online/Offline Signature: How to Sign a Message without Online Computation. Fuchun Guo, Yi Mu |
| 2008 | Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai |
| 2008 | Relationship of Three Cryptographic Channels in the UC Framework. Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
| 2008 | Round Optimal Universally Composable Oblivious Transfer Protocols. Huafei Zhu |
| 2008 | Round-Optimal Blind Signatures from Waters Signatures. Kristian Gjøsteen, Lillian Kråkmo |
| 2008 | Secure Proxy Multi-signature Scheme in the Standard Model. Zhenhua Liu, Yupu Hu, Hua Ma |
| 2008 | Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. Wei Du, Mingxing He |
| 2008 | Server-Aided Verification Signatures: Definitions and New Constructions. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang |
| 2008 | The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
| 2008 | Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. Peeter Laud, Long Ngo |
| 2008 | Timed-Release Encryption Revisited. Sherman S. M. Chow, Siu-Ming Yiu |
| 2008 | Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Atsushi Mitsuda, Tetsu Iwata |
| 2008 | Universally Composable Security Analysis of TLS. Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk |