| 2009 | A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang |
| 2009 | Algebraic Attack on the MQQ Public Key Cryptosystem. Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner |
| 2009 | An Analysis of the Compact XSL Attack on BES and Embedded SMS4. Jiali Choy, Huihui Yap, Khoongming Khoo |
| 2009 | An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. Wenting Jin, Jing Xu |
| 2009 | Anonymizer-Enabled Security and Privacy for RFID. Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
| 2009 | Asymptotically Optimal and Private Statistical Estimation. Adam D. Smith |
| 2009 | Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. Nitesh Saxena, Md. Borhan Uddin |
| 2009 | Building Secure Networked Systems with Code Attestation. Adrian Perrig |
| 2009 | Computing on Encrypted Data. Craig Gentry |
| 2009 | Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu |
| 2009 | Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings Juan A. Garay, Atsuko Miyaji, Akira Otsuka |
| 2009 | DepenDNS: Dependable Mechanism against DNS Cache Poisoning. Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin |
| 2009 | Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu |
| 2009 | Ensuring Authentication of Digital Information Using Cryptographic Accumulators. Christophe Tartary |
| 2009 | Extensions of the Cube Attack Based on Low Degree Annihilators. Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk |
| 2009 | Fully Robust Tree-Diffie-Hellman Group Key Exchange. Timo Brecher, Emmanuel Bresson, Mark Manulis |
| 2009 | Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. Benoît Libert, Damien Vergnaud |
| 2009 | HPAKE : Password Authentication Secure against Cross-Site User Impersonation. Xavier Boyen |
| 2009 | Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider |
| 2009 | Improving the Rainbow Attack by Reusing Colours. Martin Ågren, Thomas Johansson, Martin Hell |
| 2009 | Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang |
| 2009 | MIBS: A New Lightweight Block Cipher. Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki |
| 2009 | Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
| 2009 | Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez |
| 2009 | On Cryptographic Schemes Based on Discrete Logarithms and Factoring. Marc Joye |
| 2009 | On the Complexity of Computing Discrete Logarithms over Algebraic Tori. Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya |
| 2009 | On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. Mario Cagalj, Nitesh Saxena, Ersin Uzun |
| 2009 | Privacy-Preserving Relationship Path Discovery in Social Networks. Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos |
| 2009 | Private-Key Hidden Vector Encryption with Key Confidentiality. Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
| 2009 | RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. Chong Hee Kim, Gildas Avoine |
| 2009 | Relinkable Ring Signature. Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi |
| 2009 | Saturation Attack on the Block Cipher HIGHT. Peng Zhang, Bing Sun, Chao Li |
| 2009 | Short Hash-Based Signatures for Wireless Sensor Networks. Erik Dahmen, Christoph Krauß |
| 2009 | Side Channel Cube Attack on PRESENT. Lin Yang, Meiqin Wang, Siyuan Qiao |
| 2009 | Transferable Constant-Size Fair E-Cash. Georg Fuchsbauer, David Pointcheval, Damien Vergnaud |
| 2009 | Verifying Anonymous Credential Systems in Applied Pi Calculus. Xiangxi Li, Yu Zhang, Yuxin Deng |