| 2005 | A Fast Correlation Attack on the Shrinking Generator. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao |
| 2005 | A Generic Conversion with Optimal Redundancy. Yang Cui, Kazukuni Kobara, Hideki Imai |
| 2005 | A New Two-Party Identity-Based Authenticated Key Agreement. Noel McCullagh, Paulo S. L. M. Barreto |
| 2005 | A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. An Braeken, Christopher Wolf, Bart Preneel |
| 2005 | A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
| 2005 | Accumulators from Bilinear Pairings and Applications. Lan Nguyen |
| 2005 | Choosing Parameter Sets forwithand. Nick Howgrave-Graham, Joseph H. Silverman, William Whyte |
| 2005 | Computing the Tate Pairing. Michael Scott |
| 2005 | CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck |
| 2005 | Design and Analysis of Password-Based Key Derivation Functions. Frances F. Yao, Yiqun Lisa Yin |
| 2005 | Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. Tsz Hon Yuen, Victor K. Wei |
| 2005 | Foundations of Group Signatures: The Case of Dynamic Groups. Mihir Bellare, Haixia Shi, Chong Zhang |
| 2005 | Hard Bits of the Discrete Log with Applications to Password Authentication. Philip D. MacKenzie, Sarvar Patel |
| 2005 | Hold Your Sessions: An Attack on Java Session-Id Generation. Zvi Gutterman, Dahlia Malkhi |
| 2005 | Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Dan Boneh, Jonathan Katz |
| 2005 | Malicious Cryptography: Kleptographic Aspects. Adam L. Young, Moti Yung |
| 2005 | New Minimal Weight Representations for Left-to-Right Window Methods. James A. Muir, Douglas R. Stinson |
| 2005 | On Tolerant Cryptographic Constructions. Amir Herzberg |
| 2005 | Proofs for Two-Server Password Authentication. Michael Szydlo, Burton S. Kaliski Jr. |
| 2005 | Resistance of SNOW 2.0 Against Algebraic Attacks. Olivier Billet, Henri Gilbert |
| 2005 | Side-Channel Leakage of Masked CMOS Gates. Stefan Mangard, Thomas Popp, Berndt M. Gammel |
| 2005 | Simple Password-Based Encrypted Key Exchange Protocols. Michel Abdalla, David Pointcheval |
| 2005 | Sub-linear Queries Statistical Databases: Privacy with Power. Cynthia Dwork |
| 2005 | Time-Selective Convertible Undeniable Signatures. Fabien Laguillaumie, Damien Vergnaud |
| 2005 | Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings Alfred Menezes |
| 2005 | Update on SHA-1. Vincent Rijmen, Elisabeth Oswald |