| 2005 | A General Construction for Simultaneous Signing and Encrypting. John Malone-Lee |
| 2005 | A Key Encapsulation Mechanism for NTRU. Martijn Stam |
| 2005 | A Trellis-Based Bound on (2, 1)-Separating Codes. Hans Georg Schaathun, Gérard D. Cohen |
| 2005 | Abstract Models of Computation in Cryptography. Ueli M. Maurer |
| 2005 | An Algebraic Framework for Cipher Embeddings. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw |
| 2005 | Complexity Estimates for the F Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin |
| 2005 | Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. Andrey Sidorenko, Berry Schoenmakers |
| 2005 | Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings Nigel P. Smart |
| 2005 | Domain Expansion of MACs: Alternative Uses of the FIL-MAC. Ueli M. Maurer, Johan Sjödin |
| 2005 | Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. Mustapha Hedabou |
| 2005 | Efficient Identity-Based Key Encapsulation to Multiple Parties. Manuel Barbosa, Pooya Farshim |
| 2005 | Exploiting Coding Theory for Collision Attacks on SHA-1. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2005 | Generalized Strong Extractors and Deterministic Privacy Amplification. Robert König, Ueli M. Maurer |
| 2005 | Hash Based Digital Signature Schemes. C. Dods, Nigel P. Smart, Martijn Stam |
| 2005 | Improved Decoding of Interleaved AG Codes. Andrew Brown, Lorenz Minder, Amin Shokrollahi |
| 2005 | Non-interactive Designated Verifier Proofs and Undeniable Signatures. Caroline Kudla, Kenneth G. Paterson |
| 2005 | Normality of Vectorial Functions. An Braeken, Christopher Wolf, Bart Preneel |
| 2005 | On Threshold Self-healing Key Distribution Schemes. Germán Sáez |
| 2005 | On the Automatic Construction of Indistinguishable Operations. Manuel Barbosa, Dan Page |
| 2005 | Pairing-Based Cryptography at High Security Levels. Neal Koblitz, Alfred Menezes |
| 2005 | Pairings on Elliptic Curves over Finite Commutative Rings. Steven D. Galbraith, James F. McKee |
| 2005 | Partial Key Recovery Attacks on XCBC, TMAC and OMAC. Chris J. Mitchell |
| 2005 | Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics. Woo Tae Kim, Se H. Kang, Eon Kyeong Joo |
| 2005 | Probabilistic Algebraic Attacks. An Braeken, Bart Preneel |
| 2005 | Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon |
| 2005 | Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. Liqun Chen, Zhaohui Cheng |
| 2005 | Tessellation Based Multiple Description Coding. Canhui Cai, Jing Chen |
| 2005 | The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. Kamel Bentahar |
| 2005 | The Physically Observable Security of Signature Schemes. Alexander W. Dent, John Malone-Lee |
| 2005 | Unconditionally Secure Information Authentication in Presence of Erasures. Goce Jakimoski |