| 2005 | A Traitor Tracing Scheme Based on RSA for Fast Decryption. John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee |
| 2005 | An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. Hsiao-Ying Lin, Wen-Guey Tzeng |
| 2005 | Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings John Ioannidis, Angelos D. Keromytis, Moti Yung |
| 2005 | Badger - A Fast and Provably Secure MAC. Martin Boesgaard, Thomas Christensen, Erik Zenner |
| 2005 | Building Reliable Mix Networks with Fair Exchange. Michael K. Reiter, Xiaofeng Wang, Matthew K. Wright |
| 2005 | Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Raphael Chung-Wei Phan, Bok-Min Goi |
| 2005 | Digital Signatures Do Not Guarantee Exclusive Ownership. Thomas Pornin, Julien P. Stern |
| 2005 | Dynamic k-Times Anonymous Authentication. Lan Nguyen, Reihaneh Safavi-Naini |
| 2005 | Efficient Anonymous Roaming and Its Security Analysis. Guomin Yang, Duncan S. Wong, Xiaotie Deng |
| 2005 | Efficient Constructions for One-Way Hash Chains. Yih-Chun Hu, Markus Jakobsson, Adrian Perrig |
| 2005 | Efficient Identity Based Ring Signature. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui |
| 2005 | Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia |
| 2005 | Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. SeongHan Shin, Kazukuni Kobara, Hideki Imai |
| 2005 | IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. Abdulrahman Alharby, Hideki Imai |
| 2005 | Identity Based Encryption Without Redundancy. Benoît Libert, Jean-Jacques Quisquater |
| 2005 | Indexing Information for Data Forensics. Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia |
| 2005 | Intrusion-Resilient Secure Channels. Gene Itkis, Robert McNerney, Scott Russell |
| 2005 | Messin' with Texas Deriving Mother's Maiden Names Using Public Records. Virgil Griffith, Markus Jakobsson |
| 2005 | Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji |
| 2005 | Model Generalization and Its Implications on Intrusion Detection. Zhuowei Li, Amitabha Das, Jianying Zhou |
| 2005 | N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Jin Wook Byun, Dong Hoon Lee |
| 2005 | New Signature Schemes with Coupons and Tight Reduction. Benoît Chevallier-Mames |
| 2005 | Non-interactive Zero-Knowledge Arguments for Voting. Jens Groth |
| 2005 | OACerts: Oblivious Attribute Certificates. Jiangtao Li, Ninghui Li |
| 2005 | Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. Flavio D. Garcia, Jaap-Henk Hoepman |
| 2005 | Optimal Asymmetric Encryption and Signature Paddings. Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval |
| 2005 | Privacy Preserving Keyword Searches on Remote Encrypted Data. Yan-Cheng Chang, Michael Mitzenmacher |
| 2005 | Quantifying Security in Hybrid Cellular Networks. Markus Jakobsson, Liu Yang |
| 2005 | Rainbow, a New Multivariable Polynomial Signature Scheme. Jintai Ding, Dieter Schmidt |
| 2005 | Robust Key Extraction from Physical Uncloneable Functions. Boris Skoric, Pim Tuyls, W. Ophey |
| 2005 | SCARE of the DES. Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette |
| 2005 | Searching for High-Value Rare Events with Uncheatable Grid Computing. Wenliang Du, Michael T. Goodrich |
| 2005 | Short Signature and Universal Designated Verifier Signature Without Random Oracles. Rui Zhang, Jun Furukawa, Hideki Imai |
| 2005 | Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon |
| 2005 | Thompson's Group and Public Key Cryptography. Vladimir Shpilrain, Alexander Ushakov |
| 2005 | Two-Server Password-Only Authenticated Key Exchange. Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor |