| 2009 | A More Compact AES. David Canright, Dag Arne Osvik |
| 2009 | A New Approach for FCSRs. François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse |
| 2009 | An Efficient Residue Group Multiplication for the eta Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, Tsuyoshi Takagi |
| 2009 | An Improved Recovery Algorithm for Decayed AES Key Schedule Images. Alex Tsow |
| 2009 | BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Tetsu Iwata, Kan Yasuda |
| 2009 | Compact McEliece Keys from Goppa Codes. Rafael Misoczki, Paulo S. L. M. Barreto |
| 2009 | Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Yu Sasaki |
| 2009 | Cryptanalysis of Dynamic SHA(2). Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel |
| 2009 | Cryptanalysis of Hash Functions with Structures. Dmitry Khovratovich |
| 2009 | Cryptanalysis of the Full MMB Block Cipher. Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
| 2009 | Cryptanalysis of the LANE Hash Function. Shuang Wu, Dengguo Feng, Wenling Wu |
| 2009 | Differential Fault Analysis of Rabbit. Aleksandar Kircanski, Amr M. Youssef |
| 2009 | Format-Preserving Encryption. Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers |
| 2009 | Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey |
| 2009 | Highly Regular Marc Joye |
| 2009 | Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer |
| 2009 | Improved Integral Attacks on MISTY1. Xiaorui Sun, Xuejia Lai |
| 2009 | Information Theoretically Secure Multi Party Set Intersection Re-visited. Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
| 2009 | More on Key Wrapping. Rosario Gennaro, Shai Halevi |
| 2009 | More on the Security of Linear RFID Authentication Protocols. Matthias Krause, Dirk Stegemann |
| 2009 | New Cryptanalysis of Irregularly Decimated Stream Ciphers. Bin Zhang |
| 2009 | New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128. Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, Ghadamali Bagherikaram |
| 2009 | On Repeated Squarings in Binary Fields. Kimmo U. Järvinen |
| 2009 | Optimization Strategies for Hardware-Based Cofactorization. Daniel Loebenberger, Jens Putzka |
| 2009 | Practical Collisions for SHAMATA-256. Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer |
| 2009 | Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang |
| 2009 | Real Traceable Signatures. Sherman S. M. Chow |
| 2009 | Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini |
| 2009 | Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. Kenji Ohkuma |