| 2005 | 3-Move Undeniable Signature Scheme. Kaoru Kurosawa, Swee-Huay Heng |
| 2005 | A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. Ludovic Perret |
| 2005 | A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. Johannes Blömer, Alexander May |
| 2005 | Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings Ronald Cramer |
| 2005 | Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. Claude Crépeau, Daniel Gottesman, Adam D. Smith |
| 2005 | Collisions of SHA-0 and Reduced SHA-1. Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby |
| 2005 | Compact E-Cash. Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya |
| 2005 | Computational Indistinguishability Between Quantum States and Its Cryptographic Application. Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami |
| 2005 | Cryptanalysis of the Hash Functions MD4 and RIPEMD. Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu |
| 2005 | Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract). Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek |
| 2005 | Differential Cryptanalysis for Multivariate Schemes. Pierre-Alain Fouque, Louis Granboulan, Jacques Stern |
| 2005 | Efficient Identity-Based Encryption Without Random Oracles. Brent Waters |
| 2005 | Floating-Point LLL Revisited. Phong Q. Nguyen, Damien Stehlé |
| 2005 | Fuzzy Identity-Based Encryption. Amit Sahai, Brent Waters |
| 2005 | Group Signatures with Efficient Concurrent Join. Aggelos Kiayias, Moti Yung |
| 2005 | Hierarchical Identity Based Encryption with Constant Size Ciphertext. Dan Boneh, Xavier Boyen, Eu-Jin Goh |
| 2005 | How to Break MD5 and Other Hash Functions. Xiaoyun Wang, Hongbo Yu |
| 2005 | Mercurial Commitments with Applications to Zero-Knowledge Sets. Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin |
| 2005 | On Robust Combiners for Oblivious Transfer and Other Primitives. Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen |
| 2005 | On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. John Black, Martin Cochran, Thomas Shrimpton |
| 2005 | One-Way Chain Based Broadcast Encryption Schemes. Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo |
| 2005 | Partial Key Exposure Attacks on RSA up to Full Size Exponents. Matthias Ernst, Ellen Jochemsz, Alexander May, Benne de Weger |
| 2005 | Practical Cryptography in High Dimensional Tori. Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff |
| 2005 | Predicting and Distinguishing Attacks on RC4 Keystream Generator. Itsik Mantin |
| 2005 | Public Traceability in Traitor Tracing Schemes. Hervé Chabanne, Duong Hieu Phan, David Pointcheval |
| 2005 | Reducing Complexity Assumptions for Statistically-Hiding Commitment. Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
| 2005 | Related-Key Boomerang and Rectangle Attacks. Eli Biham, Orr Dunkelman, Nathan Keller |
| 2005 | Second Preimages on n-Bit Hash Functions for Much Less than 2 John Kelsey, Bruce Schneier |
| 2005 | Secure Remote Authentication Using Biometric Data. Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith |
| 2005 | Smooth Projective Hashing and Two-Message Oblivious Transfer. Yael Tauman Kalai |
| 2005 | Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. Daniel J. Bernstein |
| 2005 | Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup |
| 2005 | The RSA Group is Pseudo-Free. Daniele Micciancio |
| 2005 | Universally Composable Password-Based Key Exchange. Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie |