| 1999 | Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings Stafford E. Tavares, Henk Meijer |
| 1998 | A Lattice-Based Public-Key Cryptosystem. Jin-Yi Cai, Thomas W. Cusick |
| 1998 | A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta |
| 1998 | A Timing Attack on RC5. Helena Handschuh, Howard M. Heys |
| 1998 | An Accurate Evaluation of Maurer's Universal Test. Jean-Sébastien Coron, David Naccache |
| 1998 | Authenticated Diffie-Hellman Key Agreement Protocols. Simon Blake-Wilson, Alfred Menezes |
| 1998 | Computational Alternatives to Random Number Generators. David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay |
| 1998 | Cryptanalysis of ORYX. David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier |
| 1998 | Cryptanalysis of RC4-like Ciphers. Serge Mister, Stafford E. Tavares |
| 1998 | Cryptanalysis of SPEED. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner |
| 1998 | Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. Phong Q. Nguyen, Jacques Stern |
| 1998 | Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine. Jens-Peter Kaps, Christof Paar |
| 1998 | Faster Attacks on Elliptic Curve Cryptosystems. Michael J. Wiener, Robert J. Zuccherato |
| 1998 | Feistel Ciphers with L Serge Vaudenay |
| 1998 | Higher Order Differential Attack Using Chosen Higher Order Differences. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko |
| 1998 | IDEA: A Cipher For Multimedia Architectures? Helger Lipmaa |
| 1998 | Improved Algorithms for Elliptic Curve Arithmetic in GF(2 Julio López, Ricardo Dahab |
| 1998 | Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir |
| 1998 | Key Preassigned Traceability Schemes for Broadcast Encryption. Douglas R. Stinson, Ruizhong Wei |
| 1998 | Key-Dependent S-Box Manipulations. Sandy Harris, Carlisle M. Adams |
| 1998 | Mix-Based Electronic Payments. Markus Jakobsson, David M'Raïhi |
| 1998 | On Maximum Non-averaged Differential Probability. Kazumaro Aoki |
| 1998 | On the Twofish Key Schedule. Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall |
| 1998 | Over the Air Service Provisioning. Sarvar Patel |
| 1998 | Storage-Efficient Finite Field Basis Conversion. Burton S. Kaliski Jr., Yiqun Lisa Yin |
| 1998 | The Nonhomomorphicity of Boolean Functions. Xian-Mo Zhang, Yuliang Zheng |
| 1998 | Toward Provable Security of Substitution-Permutation Encryption Networks. Zhi-Guo Chen, Stafford E. Tavares |
| 1998 | Verifiable Partial Sharing of Integer Fractions. Wenbo Mao |