| 2009 | Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers Roberto Maria Avanzi, Liam Keliher, Francesco Sica |
| 2008 | A Cache Timing Analysis of HC-256. Erik Zenner |
| 2008 | A Scheme to Base a Hash Function on a Block Cipher. Shoichi Hirose, Hidenori Kuwakado |
| 2008 | A Three-Property-Secure Hash Function. Elena Andreeva, Bart Preneel |
| 2008 | Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers. Côme Berbain, Henri Gilbert, Antoine Joux |
| 2008 | An Improved Fast Correlation Attack on Stream Ciphers. Bin Zhang, Dengguo Feng |
| 2008 | Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques. Charles Bouillaguet, Pierre-Alain Fouque |
| 2008 | Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators. Kyohei Suzuki, Tetsu Iwata |
| 2008 | Building Secure Block Ciphers on Generic Attacks Assumptions. Jacques Patarin, Yannick Seurin |
| 2008 | Collisions and Other Non-random Properties for Step-Reduced SHA-256. Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger |
| 2008 | Counting Functions for the Ramakanth Kavuluru, Andrew Klapper |
| 2008 | Cryptanalysis of Tweaked Versions of SMASH and Reparation. Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer |
| 2008 | Cryptanalysis of a Generic Class of White-Box Implementations. Wil Michiels, Paul Gorissen, Henk D. L. Hollmann |
| 2008 | Distinguishing Multiplications from Squaring Operations. Frédéric Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P. Marnane |
| 2008 | ECC Is Ready for RFID - A Proof in Silicon. Daniel M. Hein, Johannes Wolkerstorfer, Norbert Felber |
| 2008 | Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. Xinxin Fan, Guang Gong, David Jao |
| 2008 | Faster Halvings in Genus 2. Peter Birkner, Nicolas Thériault |
| 2008 | HECC Goes Embedded: An Area-Efficient Implementation of HECC. Junfeng Fan, Lejla Batina, Ingrid Verbauwhede |
| 2008 | Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. Wenling Wu, Lei Zhang, Wentao Zhang |
| 2008 | Lifting and Elliptic Curve Discrete Logarithms. Joseph H. Silverman |
| 2008 | New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256. Meiqin Wang, Xiaoyun Wang, Changhui Hu |
| 2008 | On Software Parallel Implementation of Cryptographic Pairings. Philipp Grabher, Johann Großschädl, Dan Page |
| 2008 | On the Exact Success Rate of Side Channel Analysis in the Gaussian Model. Matthieu Rivain |
| 2008 | Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Jean-Philippe Aumasson, Willi Meier, Florian Mendel |
| 2008 | Preimage Attacks on One-Block MD4, 63-Step MD5 and More. Kazumaro Aoki, Yu Sasaki |
| 2008 | Public Verifiability from Pairings in Secret Sharing Schemes. Somayeh Heidarvand, Jorge L. Villar |
| 2008 | Subquadratic Polynomial Multiplication over Éric Schost, Arash Hariri |
| 2008 | The "Coefficients H" Technique. Jacques Patarin |
| 2008 | The Cryptanalysis of Reduced-Round SMS4. Jonathan Etrog, Matthew J. B. Robshaw |
| 2008 | The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences. Kristin E. Lauter, Katherine E. Stange |