| 2009 | A Brief History of Security Models for Confidentiality. Alexander W. Dent |
| 2009 | An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. Daisuke Moriyama, Tatsuaki Okamoto |
| 2009 | Anonymous Conditional Proxy Re-encryption without Random Oracle. Liming Fang, Willy Susilo, Jiandong Wang |
| 2009 | Anonymous Signatures Revisited. Vishal Saraswat, Aaram Yun |
| 2009 | Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
| 2009 | Chosen-Ciphertext Secure RSA-Type Cryptosystems. Benoît Chevallier-Mames, Marc Joye |
| 2009 | Comparing Berkant Ustaoglu |
| 2009 | Efficient Non-interactive Universally Composable String-Commitment Schemes. Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka |
| 2009 | GUC-Secure Set-Intersection Computation. Yuan Tian, Hao Zhang |
| 2009 | How to Prove Security of a Signature with a Tighter Security Reduction. Fuchun Guo, Yi Mu, Willy Susilo |
| 2009 | Identity-Based Verifiably Encrypted Signatures without Random Oracles. Lei Zhang, Qianhong Wu, Bo Qin |
| 2009 | Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? Man Ho Au, Willy Susilo, Yi Mu |
| 2009 | On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka |
| 2009 | Oracle Separation in the Non-uniform Model. Ahto Buldas, Sven Laur, Margus Niitsoo |
| 2009 | Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. E. Dongna, Qingfeng Cheng, Chuangui Ma |
| 2009 | Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings Josef Pieprzyk, Fangguo Zhang |
| 2009 | Self-enforcing Private Inference Control. Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao |
| 2009 | Server-Controlled Identity-Based Authenticated Key Exchange. Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li |
| 2009 | Spatial Encryption under Simpler Assumption. Muxin Zhou, Zhenfu Cao |
| 2009 | Symbolic Methods for Provable Security. Bogdan Warinschi |
| 2009 | Twin Signature Schemes, Revisited. Sven Schäge |
| 2009 | Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. Keita Xagawa, Keisuke Tanaka |