| 2009 | Abstraction in Cryptography. Ueli M. Maurer |
| 2009 | Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings Shai Halevi |
| 2009 | Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Ignacio Cascudo Pueyo, Hao Chen, Ronald Cramer, Chaoping Xing |
| 2009 | Batch Binary Edwards. Daniel J. Bernstein |
| 2009 | Collusion-Free Multiparty Computation in the Mediated Model. Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti |
| 2009 | Computational Differential Privacy. Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan |
| 2009 | Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. Ueli M. Maurer, Stefano Tessaro |
| 2009 | Cryptanalysis of C2. Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz |
| 2009 | Distinguisher and Related-Key Attack on the Full AES-256. Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic |
| 2009 | Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Brent Waters |
| 2009 | Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. Benny Applebaum, David Cash, Chris Peikert, Amit Sahai |
| 2009 | How Risky Is the Random-Oracle Model? Gaëtan Leurent, Phong Q. Nguyen |
| 2009 | How to Encipher Messages on a Small Domain. Ben Morris, Phillip Rogaway, Till Stegers |
| 2009 | How to Hash into Elliptic Curves. Thomas Icart |
| 2009 | Improving the Security of Quantum Protocols via Commit-and-Open. Ivan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner |
| 2009 | Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. Joël Alwen, Yevgeniy Dodis, Daniel Wichs |
| 2009 | Linear Algebra with Sub-linear Zero-Knowledge Arguments. Jens Groth |
| 2009 | Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Kazumaro Aoki, Yu Sasaki |
| 2009 | Merkle Puzzles Are Optimal - An Boaz Barak, Mohammad Mahmoody-Ghidary |
| 2009 | Message Authentication Codes from Unpredictable Block Ciphers. Yevgeniy Dodis, John P. Steinberger |
| 2009 | New Birthday Attacks on Some MACs Based on Block Ciphers. Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang |
| 2009 | On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem. Vadim Lyubashevsky, Daniele Micciancio |
| 2009 | On the Amortized Complexity of Zero-Knowledge Protocols. Ronald Cramer, Ivan Damgård |
| 2009 | On the Composition of Public-Coin Zero-Knowledge Protocols. Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikström |
| 2009 | Position Based Cryptography. Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky |
| 2009 | Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann |
| 2009 | Privacy-Enhancing Auctions Using Rational Cryptography. Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos |
| 2009 | Private Mutual Authentication and Conditional Oblivious Transfer. Stanislaw Jarecki, Xiaomin Liu |
| 2009 | Probabilistically Checkable Arguments. Yael Tauman Kalai, Ran Raz |
| 2009 | Public-Key Cryptosystems Resilient to Key Leakage. Moni Naor, Gil Segev |
| 2009 | Randomizable Proofs and Delegatable Anonymous Credentials. Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham |
| 2009 | Reconstructing RSA Private Keys from Random Key Bits. Nadia Heninger, Hovav Shacham |
| 2009 | Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger |
| 2009 | Short and Stateless Signatures from the RSA Assumption. Susan Hohenberger, Brent Waters |
| 2009 | Smooth Projective Hashing for Conditionally Extractable Commitments. Michel Abdalla, Céline Chevalier, David Pointcheval |
| 2009 | Solving Hidden Number Problem with One Bit Oracle and Advice. Adi Akavia |
| 2009 | Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou |
| 2009 | The Group of Signed Quadratic Residues and Applications. Dennis Hofheinz, Eike Kiltz |
| 2009 | The Round Complexity of Verifiable Secret Sharing Revisited. Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan |
| 2009 | Utility Dependence in Correct and Fair Rational Secret Sharing. Gilad Asharov, Yehuda Lindell |