| 2009 | Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer. Yehuda Lindell, Hila Zarosim |
| 2009 | An Optimally Fair Coin Toss. Tal Moran, Moni Naor, Gil Segev |
| 2009 | Authenticated Adversarial Routing. Yair Amir, Paul Bunn, Rafail Ostrovsky |
| 2009 | Black-Box Constructions of Two-Party Protocols from One-Way Functions. Rafael Pass, Hoeteck Wee |
| 2009 | Chosen-Ciphertext Security via Correlated Products. Alon Rosen, Gil Segev |
| 2009 | Complete Fairness in Multi-party Computation without an Honest Majority. S. Dov Gordon, Jonathan Katz |
| 2009 | Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation. Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek |
| 2009 | Composability and On-Line Deniability of Authentication. Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish |
| 2009 | Composing Quantum Protocols in a Classical Environment. Serge Fehr, Christian Schaffner |
| 2009 | Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. Stanislaw Jarecki, Xiaomin Liu |
| 2009 | Fairness with an Honest Minority and a Rational Majority. Shien Jin Ong, David C. Parkes, Alon Rosen, Salil P. Vadhan |
| 2009 | Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms. James Cook, Omid Etesami, Rachel Miller, Luca Trevisan |
| 2009 | Hierarchical Identity Based Encryption with Polynomially Many Levels. Craig Gentry, Shai Halevi |
| 2009 | How Efficient Can Memory Checking Be?. Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod Vaikuntanathan |
| 2009 | LEGO for Two-Party Secure Computation. Jesper Buus Nielsen, Claudio Orlandi |
| 2009 | Non-malleable Obfuscation. Ran Canetti, Mayank Varia |
| 2009 | Oblivious Transfer from Weak Noisy Channels. Jürg Wullschleger |
| 2009 | On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols. Iftach Haitner, Alon Rosen, Ronen Shaltiel |
| 2009 | On the (Im)Possibility of Key Dependent Encryption. Iftach Haitner, Thomas Holenstein |
| 2009 | Predicate Privacy in Encryption Systems. Emily Shen, Elaine Shi, Brent Waters |
| 2009 | Proofs of Retrievability via Hardness Amplification. Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs |
| 2009 | Purely Rational Secret Sharing (Extended Abstract). Silvio Micali, Abhi Shelat |
| 2009 | Realistic Failures in Secure Multi-party Computation. Vassilis Zikas, Sarah Hauser, Ueli M. Maurer |
| 2009 | Secret Sharing and Non-Shannon Information Inequalities. Amos Beimel, Ilan Orlov |
| 2009 | Secure Arithmetic Computation with No Honest Majority. Yuval Ishai, Manoj Prabhakaran, Amit Sahai |
| 2009 | Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security. Robin Künzler, Jörn Müller-Quade, Dominik Raub |
| 2009 | Security Amplification for InteractiveCryptographic Primitives. Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
| 2009 | Simple, Black-Box Constructions of Adaptively Secure Protocols. Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
| 2009 | Simulation-Based Concurrent Non-malleable Commitments and Decommitments. Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
| 2009 | Simultaneous Hardcore Bits and Cryptography against Memory Attacks. Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan |
| 2009 | Some Recent Progress in Lattice-Based Cryptography. Chris Peikert |
| 2009 | The Differential Privacy Frontier (Extended Abstract). Cynthia Dwork |
| 2009 | Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings Omer Reingold |
| 2009 | Towards a Theory of Extractable Functions. Ran Canetti, Ronny Ramzi Dakdouk |
| 2009 | Universally Composable Multiparty Computation with Partially Isolated Parties. Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
| 2009 | Weak Verifiable Random Functions. Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum, Vinod Vaikuntanathan |