| 2005 | A Failure-Friendly Design Principle for Hash Functions. Stefan Lucks |
| 2005 | A Near-Practical Attack Against B Mode of HBB. Joydip Mitra |
| 2005 | A Practical Attack on the Fixed RC4 in the WEP Mode. Itsik Mantin |
| 2005 | A Related-Key Rectangle Attack on the Full KASUMI. Eli Biham, Orr Dunkelman, Nathan Keller |
| 2005 | A Sender Verifiable Mix-Net and a New Proof of a Shuffle. Douglas Wikström |
| 2005 | A Simple Threshold Authenticated Key Exchange from Short Secrets. Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
| 2005 | Adapting Density Attacks to Low-Weight Knapsacks. Phong Q. Nguyen, Jacques Stern |
| 2005 | Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings Bimal K. Roy |
| 2005 | An Analysis of the XSL Algorithm. Carlos Cid, Gaëtan Leurent |
| 2005 | Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. Pascal Paillier, Damien Vergnaud |
| 2005 | Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? David Jao, Stephen D. Miller, Ramarathnam Venkatesan |
| 2005 | Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. Craig Gentry, David Molnar, Zulfikar Ramzan |
| 2005 | Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater |
| 2005 | Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains. Vassil S. Dimitrov, Laurent Imbert, Pradeep Kumar Mishra |
| 2005 | Errors in Computational Complexity Proofs for Protocols. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
| 2005 | Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
| 2005 | Fast Computation of Large Distributions and Its Cryptographic Applications. Alexander Maximov, Thomas Johansson |
| 2005 | Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation. Vladimir Kolesnikov |
| 2005 | Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. Nuttapong Attrapadung, Hideki Imai |
| 2005 | Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
| 2005 | Linear Cryptanalysis of the TSC Family of Stream Ciphers. Frédéric Muller, Thomas Peyrin |
| 2005 | Modular Security Proofs for Key Agreement Protocols. Caroline Kudla, Kenneth G. Paterson |
| 2005 | New Applications of Time Memory Data Tradeoffs. Jin Hong, Palash Sarkar |
| 2005 | New Improvements of Davies-Murphy Cryptanalysis. Sébastien Kunz-Jacques, Frédéric Muller |
| 2005 | Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes. Zhifang Zhang, Mulan Liu, Liangliang Xiao |
| 2005 | Privacy-Preserving Graph Algorithms in the Semi-honest Model. Justin Brickell, Vitaly Shmatikov |
| 2005 | Quantum Anonymous Transmissions. Matthias Christandl, Stephanie Wehner |
| 2005 | Revealing Additional Information in Two-Party Computations. Andreas Jakoby, Maciej Liskiewicz |
| 2005 | Server-Aided Verification: Theory and Practice. Marc Girault, David Lefranc |
| 2005 | Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. Renato Renner, Stefan Wolf |
| 2005 | Some Attacks Against a Double Length Hash Proposal. Lars R. Knudsen, Frédéric Muller |
| 2005 | Spreading Alerts Quietly and the Subgroup Escape Problem. James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy |
| 2005 | Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
| 2005 | Universally Anonymizable Public-Key Encryption. Ryotaro Hayashi, Keisuke Tanaka |
| 2005 | Universally Convertible Directed Signatures. Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud |
| 2005 | Updatable Zero-Knowledge Databases. Moses D. Liskov |
| 2005 | Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. Martin Hirt, Jesper Buus Nielsen |
| 2005 | Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. Toru Nakanishi, Nobuo Funabiki |