| 2009 | Algebraic Techniques in Differential Cryptanalysis. Martin R. Albrecht, Carlos Cid |
| 2009 | An Efficient State Recovery Attack on X-FCSR-256. Paul Stankovski, Martin Hell, Thomas Johansson |
| 2009 | Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. Kazuhiko Minematsu |
| 2009 | Blockcipher-Based Hashing Revisited. Martijn Stam |
| 2009 | Cryptanalysis of RadioGatún. Thomas Fuhr, Thomas Peyrin |
| 2009 | Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad |
| 2009 | Cryptanalysis of the LAKE Hash Family. Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang |
| 2009 | Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir |
| 2009 | Enhanced Target Collision Resistant Hash Functions Revisited. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu |
| 2009 | Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers Orr Dunkelman |
| 2009 | Fast and Secure CBC-Type MAC Algorithms. Mridul Nandi |
| 2009 | HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. Tetsu Iwata, Kan Yasuda |
| 2009 | Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen |
| 2009 | Intel's New AES Instructions for Enhanced Performance and Security. Shay Gueron |
| 2009 | Key Collisions of the RC4 Stream Cipher. Mitsuru Matsui |
| 2009 | MAC Reforgeability. John Black, Martin Cochran |
| 2009 | Meet-in-the-Middle Attacks on SHA-3 Candidates. Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann |
| 2009 | Multidimensional Extension of Matsui's Algorithm 2. Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
| 2009 | New Cryptanalysis of Block Ciphers with Low Algebraic Degree. Bing Sun, Longjiang Qu, Chao Li |
| 2009 | New Distinguishing Attack on MAC Using Secret-Prefix Method. Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang |
| 2009 | On the Security of Tandem-DM. Ewan Fleischmann, Michael Gorski, Stefan Lucks |
| 2009 | Practical Collisions for EnRUPT. Sebastiaan Indesteege, Bart Preneel |
| 2009 | Preimage Attacks on Reduced Tiger and SHA-2. Takanori Isobe, Kyoji Shibutani |
| 2009 | Revisiting the IDEA Philosophy. Pascal Junod, Marco Macchetti |
| 2009 | The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |