| 2006 | Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers Bart Preneel, Stafford E. Tavares |
| 2005 | A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. David Molnar, Andrea Soppera, David A. Wagner |
| 2005 | A Space Efficient Backdoor in RSA and Its Applications. Adam L. Young, Moti Yung |
| 2005 | Accelerated Verification of ECDSA Signatures. Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone |
| 2005 | An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. Jiang Wu, Ruizhong Wei |
| 2005 | An Attack on CFB Mode Encryption as Used by OpenPGP. Serge Mister, Robert J. Zuccherato |
| 2005 | An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim |
| 2005 | Analysis of a SHA-256 Variant. Hirotaka Yoshida, Alex Biryukov |
| 2005 | Breaking a New Hash Function Design Strategy Called SMASH. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2005 | Conditional Estimators: An Effective Attack on A5/1. Elad Barkan, Eli Biham |
| 2005 | Cryptanalysis of the F-FCSR Stream Cipher Family. Éliane Jaulmes, Frédéric Muller |
| 2005 | Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F Joachim von zur Gathen, Jamshid Shokrollahi |
| 2005 | Fault Attacks on Combiners with Memory. Frederik Armknecht, Willi Meier |
| 2005 | Impact of Rotations in SHA-1 and Related Hash Functions. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2005 | Improved Time-Memory Trade-Offs with Multiple Data. Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar |
| 2005 | Minimality of the Hamming Weight of the Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger |
| 2005 | New Observation on Camellia. Duo Lei, Chao Li, Keqin Feng |
| 2005 | On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. An Braeken, Joseph Lano |
| 2005 | Pairing-Friendly Elliptic Curves of Prime Order. Paulo S. L. M. Barreto, Michael Naehrig |
| 2005 | Parallelizable Authentication Trees. William Eric Hall, Charanjit S. Jutla |
| 2005 | Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sang-Jae Moon |
| 2005 | Proving the Security of AES Substitution-Permutation Network. Thomas Baignères, Serge Vaudenay |
| 2005 | Reducing Time Complexity in RFID Systems. Gildas Avoine, Etienne Dysli, Philippe Oechslin |
| 2005 | Rekeying Issues in the MUGI Stream Cipher. Matthew Henricksen, Ed Dawson |
| 2005 | SPA Resistant Left-to-Right Integer Recodings. Nicolas Thériault |
| 2005 | Tree-Based Key Distribution Patterns. Jooyoung Lee, Douglas R. Stinson |