| 2009 | A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. Kan Yasuda |
| 2009 | A Leakage-Resilient Mode of Operation. Krzysztof Pietrzak |
| 2009 | A New Randomness Extraction Paradigm for Hybrid Encryption. Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung |
| 2009 | A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. Jan Camenisch, Nishanth Chandran, Victor Shoup |
| 2009 | A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. François-Xavier Standaert, Tal Malkin, Moti Yung |
| 2009 | Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). Craig Gentry, Brent Waters |
| 2009 | Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings Antoine Joux |
| 2009 | Asymmetric Group Key Agreement. Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer |
| 2009 | Breaking RSA Generically Is Equivalent to Factoring. Divesh Aggarwal, Ueli M. Maurer |
| 2009 | Cryptanalysis of MDC-2. Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen |
| 2009 | Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan |
| 2009 | Cryptography without (Hardly Any) Secrets ? Shafi Goldwasser |
| 2009 | Cube Attacks on Tweakable Black Box Polynomials. Itai Dinur, Adi Shamir |
| 2009 | Double-Base Number System for Multi-scalar Multiplications. Christophe Doche, David R. Kohel, Francesco Sica |
| 2009 | ECM on Graphics Cards. Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang |
| 2009 | Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. Steven D. Galbraith, Xibin Lin, Michael Scott |
| 2009 | Finding Preimages in Full MD5 Faster Than Exhaustive Search. Yu Sasaki, Kazumaro Aoki |
| 2009 | Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields. Takakazu Satoh |
| 2009 | Key Agreement from Close Secrets over Unsecured Channels. Bhavana Kanukurthi, Leonid Reyzin |
| 2009 | On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Praveen Gauravaram, Lars R. Knudsen |
| 2009 | On the Portability of Generalized Schnorr Proofs. Jan Camenisch, Aggelos Kiayias, Moti Yung |
| 2009 | On the Security Loss in Cryptographic Reductions. Chi-Jen Lu |
| 2009 | On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. Guilhem Castagnos, Fabien Laguillaumie |
| 2009 | On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. Eike Kiltz, Krzysztof Pietrzak |
| 2009 | Optimal Randomness Extraction from a Diffie-Hellman Element. Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
| 2009 | Order-Preserving Symmetric Encryption. Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill |
| 2009 | Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. Mihir Bellare, Dennis Hofheinz, Scott Yilek |
| 2009 | Practical Chosen Ciphertext Secure Encryption from Factoring. Dennis Hofheinz, Eike Kiltz |
| 2009 | Realizing Hash-and-Sign Signatures under Standard Assumptions. Susan Hohenberger, Brent Waters |
| 2009 | Resettably Secure Computation. Vipul Goyal, Amit Sahai |
| 2009 | Salvaging Merkle-Damgård for Practical Applications. Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton |
| 2009 | Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. Mihir Bellare, Thomas Ristenpart |
| 2009 | Smashing SQUASH-0. Khaled Ouafi, Serge Vaudenay |
| 2009 | Traitors Collaborating in Public: Pirates 2.0. Olivier Billet, Duong Hieu Phan |
| 2009 | Verifiable Random Functions from Identity-Based Key Encapsulation. Michel Abdalla, Dario Catalano, Dario Fiore |