| 2009 | A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson |
| 2009 | A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou |
| 2009 | Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo |
| 2009 | An Efficient Identity-Based Online/Offline Encryption Scheme. Joseph K. Liu, Jianying Zhou |
| 2009 | Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud |
| 2009 | Attacking ECDSA-Enabled RFID Devices. Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer |
| 2009 | Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. MoonShik Lee, Daegun Ma, Minjae Seo |
| 2009 | Broadcast Attacks against Lattice-Based Cryptosystems. Thomas Plantard, Willy Susilo |
| 2009 | Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte |
| 2009 | Collision Attack on Boole. Florian Mendel, Tomislav Nad, Martin Schläffer |
| 2009 | Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Seiko Arita, Koji Tsurudome |
| 2009 | Cryptanalysis of CubeHash. Eric Brier, Thomas Peyrin |
| 2009 | Cryptanalysis of Twister. Florian Mendel, Christian Rechberger, Martin Schläffer |
| 2009 | Dual-Policy Attribute Based Encryption. Nuttapong Attrapadung, Hideki Imai |
| 2009 | Efficient Deniable Authentication for Signatures. Jean Monnerat, Sylvain Pasini, Serge Vaudenay |
| 2009 | Efficient Robust Private Set Intersection. Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung |
| 2009 | Fast Packet Classification Using Condition Factorization. Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan |
| 2009 | Fragility of the Robust Security Network: 802.11 Denial of Service. Martin Eian |
| 2009 | Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. Mark Manulis |
| 2009 | Homomorphic MACs: MAC-Based Integrity for Network Coding. Shweta Agrawal, Dan Boneh |
| 2009 | How to Compare Profiled Side-Channel Attacks?. François-Xavier Standaert, François Koeune, Werner Schindler |
| 2009 | How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto |
| 2009 | Integrity Protection for Revision Control. Christian Cachin, Martin Geisler |
| 2009 | Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. Lei Liu, Songqing Chen |
| 2009 | Novel Precomputation Schemes for Elliptic Curve Cryptosystems. Patrick Longa, Catherine H. Gebotys |
| 2009 | Partial Key Exposure Attack on CRT-RSA. Santanu Sarkar, Subhamoy Maitra |
| 2009 | Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. Jörg Lenhard, Karsten Loesing, Guido Wirtz |
| 2009 | Practical Secure Evaluation of Semi-private Functions. Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider |
| 2009 | Secure Hamming Distance Based Computation and Its Applications. Ayman Jarrous, Benny Pinkas |
| 2009 | Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. Nitesh Saxena, Md. Borhan Uddin |
| 2009 | Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. Cas J. F. Cremers |
| 2009 | Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. Emmanuel Prouff, Matthieu Rivain |
| 2009 | Tracing and Revoking Pirate Rebroadcasts. Aggelos Kiayias, Serdar Pehlivanoglu |