| 2005 | A Formal Treatment of Onion Routing. Jan Camenisch, Anna Lysyanskaya |
| 2005 | A Practical Attack on a Braid Group Based Cryptographic Protocol. Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov |
| 2005 | A Quantum Cipher with Near Optimal Key-Recycling. Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail |
| 2005 | Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings Victor Shoup |
| 2005 | An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. Benoît Chevallier-Mames |
| 2005 | Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. Alexandra Boldyreva, Marc Fischlin |
| 2005 | Authenticating Pervasive Devices with Human Protocols. Ari Juels, Stephen A. Weis |
| 2005 | Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. Ronald Cramer, Serge Fehr, Martijn Stam |
| 2005 | Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Dan Boneh, Craig Gentry, Brent Waters |
| 2005 | Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. Marc Fischlin |
| 2005 | Composition Does Not Imply Adaptive Security. Krzysztof Pietrzak |
| 2005 | Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. Ivan Damgård, Yuval Ishai |
| 2005 | Efficient Collision Search Attacks on SHA-0. Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin |
| 2005 | Finding Collisions in the Full SHA-1. Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu |
| 2005 | Generic Transformation for Scalable Broadcast Encryption Schemes. Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim |
| 2005 | HMQV: A High-Performance Secure Diffie-Hellman Protocol. Hugo Krawczyk |
| 2005 | Impossibility and Feasibility Results for Zero Knowledge with Public Keys. Joël Alwen, Giuseppe Persiano, Ivan Visconti |
| 2005 | Improved Security Analyses for CBC MACs. Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway |
| 2005 | Merkle-Damgård Revisited: How to Construct a Hash Function. Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya |
| 2005 | New Monotones and Lower Bounds in Unconditional Two-Party Computation. Stefan Wolf, Jürg Wullschleger |
| 2005 | On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró |
| 2005 | On the Discrete Logarithm Problem on Algebraic Tori. Robert Granger, Frederik Vercauteren |
| 2005 | On the Generic Insecurity of the Full Domain Hash. Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak |
| 2005 | One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. Thomas Holenstein, Renato Renner |
| 2005 | Pebbling and Proofs of Work. Cynthia Dwork, Moni Naor, Hoeteck Wee |
| 2005 | Privacy-Preserving Set Operations. Lea Kissner, Dawn Xiaodong Song |
| 2005 | Private Searching on Streaming Data. Rafail Ostrovsky, William E. Skeith III |
| 2005 | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
| 2005 | Secure Communications over Insecure Channels Based on Short Authenticated Strings. Serge Vaudenay |
| 2005 | Secure Computation Without Authentication. Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin |
| 2005 | Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. Omer Barkol, Yuval Ishai |
| 2005 | Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. Kun Peng, Colin Boyd, Ed Dawson |
| 2005 | The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. Yi Lu, Willi Meier, Serge Vaudenay |
| 2005 | Unconditional Characterizations of Non-interactive Zero-Knowledge. Rafael Pass, Abhi Shelat |