| 2009 | A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento |
| 2009 | A Statistical Saturation Attack against the Block Cipher PRESENT. Baudoin Collard, François-Xavier Standaert |
| 2009 | Adaptive-ID Secure Revocable Identity-Based Encryption. Benoît Libert, Damien Vergnaud |
| 2009 | Adaptively Secure Two-Party Computation with Erasures. Andrew Y. Lindell |
| 2009 | An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
| 2009 | Attacks on the DECT Authentication Mechanisms. Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel |
| 2009 | Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. David Galindo |
| 2009 | Communication-Efficient Private Protocols for Longest Common Subsequence. Matthew K. Franklin, Mark A. Gondree, Payman Mohassel |
| 2009 | Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1. Andrew Y. Lindell |
| 2009 | Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values. Tomas Toft |
| 2009 | Cryptanalysis of CTC2. Orr Dunkelman, Nathan Keller |
| 2009 | Divisible On-Line/Off-Line Signatures. Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang |
| 2009 | Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu |
| 2009 | Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. Thomas Plos |
| 2009 | Fault Analysis Attack against an AES Prototype Chip Using RSL. Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta |
| 2009 | Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin |
| 2009 | Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor |
| 2009 | Key Insulation and Intrusion Resilience over a Public Channel. Mihir Bellare, Shanshan Duan, Adriana Palacio |
| 2009 | Key-Private Proxy Re-encryption. Giuseppe Ateniese, Karyn Benson, Susan Hohenberger |
| 2009 | Local Sequentiality Does Not Help for Concurrent Composition. Andrew Y. Lindell |
| 2009 | Practical Attacks on Masked Hardware. Thomas Popp, Mario Kirschbaum, Stefan Mangard |
| 2009 | Practical Short Signature Batch Verification. Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen |
| 2009 | Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
| 2009 | Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Matthieu Rivain |
| 2009 | Short Redactable Signatures Using Random Trees. Ee-Chien Chang, Chee Liang Lim, Jia Xu |
| 2009 | Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee |
| 2009 | Speeding up Collision Search for Byte-Oriented Hash Functions. Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic |
| 2009 | Square, a New Multivariate Encryption Scheme. Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen |
| 2009 | Statistically Hiding Sets. Manoj Prabhakaran, Rui Xue |
| 2009 | Strengthening Security of RSA-OAEP. Alexandra Boldyreva |
| 2009 | Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings Marc Fischlin |
| 2009 | Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. Giuseppe Ateniese, Paolo Gasti |