| 2009 | A Framework for Universally Composable Non-committing Blind Signatures. Masayuki Abe, Miyako Ohkubo |
| 2009 | A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Anja Lehmann, Stefano Tessaro |
| 2009 | Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings Mitsuru Matsui |
| 2009 | Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? Mathias Herrmann, Alexander May |
| 2009 | Cache-Timing Template Attacks. Billy Bob Brumley, Risto M. Hakala |
| 2009 | Cascade Encryption Revisited. Peter Gazi, Ueli M. Maurer |
| 2009 | Cryptanalysis of the Square Cryptosystems. Olivier Billet, Gilles Macario-Rat |
| 2009 | Efficient Public Key Encryption Based on Ideal Lattices. Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa |
| 2009 | Factoring Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen |
| 2009 | Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. Vadim Lyubashevsky |
| 2009 | Foundations of Non-malleable Hash and One-Way Functions. Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi |
| 2009 | Group Encryption: Non-interactive Realization in the Standard Model. Julien Cathalo, Benoît Libert, Moti Yung |
| 2009 | Hedged Public-Key Encryption: How to Protect against Bad Randomness. Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek |
| 2009 | Hierarchical Predicate Encryption for Inner-Products. Tatsuaki Okamoto, Katsuyuki Takashima |
| 2009 | How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta |
| 2009 | Improved Cryptanalysis of Skein. Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici |
| 2009 | Improved Generic Algorithms for 3-Collisions. Antoine Joux, Stefan Lucks |
| 2009 | Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
| 2009 | Linearization Framework for Collision Attacks: Application to CubeHash and MD6. Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin |
| 2009 | MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. Florian Mendel, Christian Rechberger, Martin Schläffer |
| 2009 | Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls |
| 2009 | Non-malleable Statistically Hiding Commitment from Any One-Way Function. Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma |
| 2009 | On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. Jonathan Katz, Arkady Yerukhimovich |
| 2009 | On the Analysis of Cryptographic Assumptions in the Generic Ring Model. Tibor Jager, Jörg Schwenk |
| 2009 | On the Power of Two-Party Quantum Cryptography. Louis Salvail, Christian Schaffner, Miroslava Sotáková |
| 2009 | PSS Is Secure against Random Fault Attacks. Jean-Sébastien Coron, Avradip Mandal |
| 2009 | Preimages for Step-Reduced SHA-2. Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang |
| 2009 | Proofs of Storage from Homomorphic Identification Protocols. Giuseppe Ateniese, Seny Kamara, Jonathan Katz |
| 2009 | Quantum-Secure Coin-Flipping and Applications. Ivan Damgård, Carolin Lunemann |
| 2009 | Rebound Attack on the Full Lane Compression Function. Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer |
| 2009 | Rebound Distinguishers: Results on the Full Whirlpool Compression Function. Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer |
| 2009 | Related-Key Cryptanalysis of the Full AES-192 and AES-256. Alex Biryukov, Dmitry Khovratovich |
| 2009 | Secure Multi-party Computation Minimizing Online Rounds. Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung |
| 2009 | Secure Two-Party Computation Is Practical. Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams |
| 2009 | Security Bounds for the Design of Code-Based Cryptosystems. Matthieu Finiasz, Nicolas Sendrier |
| 2009 | Security Notions and Generic Constructions for Client Puzzles. Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi |
| 2009 | Signature Schemes with Bounded Leakage Resilience. Jonathan Katz, Vinod Vaikuntanathan |
| 2009 | Simple Adaptive Oblivious Transfer without Random Oracle. Kaoru Kurosawa, Ryo Nojima |
| 2009 | Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. Jonathan Katz, Vinod Vaikuntanathan |
| 2009 | The Intel AES Instructions Set and the SHA-3 Candidates. Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw |
| 2009 | The Key-Dependent Attack on Block Ciphers. Xiaorui Sun, Xuejia Lai |
| 2009 | Zero Knowledge in the Random Oracle Model, Revisited. Hoeteck Wee |