| 2009 | A New Family of Hyper-Bent Boolean Functions in Polynomial Form. Sihem Mesnager |
| 2009 | A New Protocol for the Nearby Friend Problem. Sanjit Chatterjee, Koray Karabina, Alfred Menezes |
| 2009 | An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. Steven D. Galbraith, Raminder S. Ruprai |
| 2009 | Another Glance at Double-Length Hashing. Onur Özen, Martijn Stam |
| 2009 | Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. Nuttapong Attrapadung, Hideki Imai |
| 2009 | Bivium as a Mixed-Integer Linear Programming Problem. Julia Borghoff, Lars R. Knudsen, Mathias Stolpe |
| 2009 | Cache Timing Analysis of LFSR-Based Stream Ciphers. Gregor Leander, Erik Zenner, Philip Hawkes |
| 2009 | Certificate-Free Attribute Authentication. Dalia Khader, Liqun Chen, James H. Davenport |
| 2009 | Codes as Modules over Skew Polynomial Rings. Delphine Boucher, Felix Ulmer |
| 2009 | Comparing with RSA. Julien Cathalo, David Naccache, Jean-Jacques Quisquater |
| 2009 | Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings Matthew Geoffrey Parker |
| 2009 | Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems. Martin Geisler, Nigel P. Smart |
| 2009 | Double-Exponentiation in Factor-4 Groups and Its Applications. Koray Karabina |
| 2009 | Geometric Ideas for Cryptographic Equation Solving in Even Characteristic. Sean Murphy, Maura B. Paterson |
| 2009 | Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. Hao Chen, San Ling, Carles Padró, Huaxiong Wang, Chaoping Xing |
| 2009 | Mass Formula for Even Codes over. Koichi Betsumiya, Rowena Alma L. Betty, Akihiro Munemasa |
| 2009 | On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions. Yves Edel, Alexander Pott |
| 2009 | On Higher Weights and Code Existence. Hans Georg Schaathun |
| 2009 | On Linear Codes from Maximal Curves. Stefania Fanali |
| 2009 | On Linear Cryptanalysis with Many Linear Approximations. Benoît Gérard, Jean-Pierre Tillich |
| 2009 | On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel. Eirik Rosnes |
| 2009 | On the Classification of Self-dual -Codes. Masaaki Harada, Akihiro Munemasa |
| 2009 | Optimal Recovery of Secret Keys from Weak Side Channel Traces. Werner Schindler, Colin D. Walter |
| 2009 | Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé |
| 2009 | Practical Zero-Knowledge Proofs for Circuit Evaluation. Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi |
| 2009 | Provably Secure Code-Based Threshold Ring Signatures. Léonard Dallot, Damien Vergnaud |
| 2009 | Security of Cyclic Double Block Length Hash Functions. Ewan Fleischmann, Michael Gorski, Stefan Lucks |
| 2009 | Subspace Codes. Azadeh Khaleghi, Danilo Silva, Frank R. Kschischang |
| 2009 | The Rayleigh Quotient of Bent Functions. Lars Eirik Danielsen, Matthew Geoffrey Parker, Patrick Solé |