| 2005 | A New Class of Single Cycle T-Functions. Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han |
| 2005 | A New Distinguisher for Clock Controlled Stream Ciphers. Håkan Englund, Thomas Johansson |
| 2005 | A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. Joan Daemen, Vincent Rijmen |
| 2005 | A Side-Channel Analysis Resistant Description of the AES S-Box. Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen |
| 2005 | Analysis of the Bit-Search Generator and Sequence Compression Techniques. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell |
| 2005 | Analysis of the Non-linear Part of Mugi. Alex Biryukov, Adi Shamir |
| 2005 | Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity. Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra |
| 2005 | DPA Attacks and S-Boxes. Emmanuel Prouff |
| 2005 | F-FCSR: Design of a New Class of Stream Ciphers. François Arnault, Thierry P. Berger |
| 2005 | Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers Henri Gilbert, Helena Handschuh |
| 2005 | How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. Tetsu Iwata, Kaoru Kurosawa |
| 2005 | How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. Mitsuru Matsui, Sayaka Fukuda |
| 2005 | Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. Eli Biham, Louis Granboulan, Phong Q. Nguyen |
| 2005 | Narrow T-Functions. Magnus Daum |
| 2005 | New Applications of T-Functions in Block Ciphers and Hash Functions. Alexander Klimov, Adi Shamir |
| 2005 | New Attacks Against Reduced-Round Versions of IDEA. Pascal Junod |
| 2005 | New Combined Attacks on Block Ciphers. Eli Biham, Orr Dunkelman, Nathan Keller |
| 2005 | Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell |
| 2005 | Preimage and Collision Attacks on MD2. Lars R. Knudsen, John Erik Mathiassen |
| 2005 | Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel |
| 2005 | SMASH - A Cryptographic Hash Function. Lars R. Knudsen |
| 2005 | Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee |
| 2005 | Small Scale Variants of the AES. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw |
| 2005 | Some Attacks on the Bit-Search Generator. Martin Hell, Thomas Johansson |
| 2005 | The ANF of the Composition of Addition and Multiplication mod 2 An Braeken, Igor A. Semaev |
| 2005 | The Poly1305-AES Message-Authentication Code. Daniel J. Bernstein |
| 2005 | Two Attacks Against the HBB Stream Cipher. Antoine Joux, Frédéric Muller |
| 2005 | Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. Alexander Maximov |
| 2005 | Two-Pass Authenticated Encryption Faster Than Generic Composition. Stefan Lucks |
| 2005 | Unbiased Random Sequences from Quasigroup String Transformations. Smile Markovski, Danilo Gligoroski, Ljupco Kocarev |