| 2005 | A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar |
| 2005 | A Universally Composable Secure Channel Based on the KEM-DEM Framework. Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
| 2005 | Adaptive Security of Symbolic Encryption. Daniele Micciancio, Saurabh Panjwani |
| 2005 | Adaptively-Secure, Non-interactive Public-Key Encryption. Ran Canetti, Shai Halevi, Jonathan Katz |
| 2005 | Characterizing Ideal Weighted Threshold Secret Sharing. Amos Beimel, Tamir Tassa, Enav Weinreb |
| 2005 | Chosen-Ciphertext Security of Multiple Encryption. Yevgeniy Dodis, Jonathan Katz |
| 2005 | Comparing Two Notions of Simulatability. Dennis Hofheinz, Dominique Unruh |
| 2005 | Cryptography in Subgroups of Z Jens Groth |
| 2005 | Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. Moni Naor, Asaf Nussboim, Eran Tromer |
| 2005 | Entropic Security and the Encryption of High Entropy Messages. Yevgeniy Dodis, Adam D. Smith |
| 2005 | Error Correction in the Bounded Storage Model. Yan Zong Ding |
| 2005 | Evaluating 2-DNF Formulas on Ciphertexts. Dan Boneh, Eu-Jin Goh, Kobbi Nissim |
| 2005 | Fair-Zero Knowledge. Matt Lepinski, Silvio Micali, Abhi Shelat |
| 2005 | Further Simplifications in Proactive RSA Signatures. Stanislaw Jarecki, Nitesh Saxena |
| 2005 | Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Jonathan Katz, Yehuda Lindell |
| 2005 | Hardness Amplification of Weakly Verifiable Puzzles. Ran Canetti, Shai Halevi, Michael Steiner |
| 2005 | How to Securely Outsource Cryptographic Computations. Susan Hohenberger, Anna Lysyanskaya |
| 2005 | Keyword Search and Oblivious Pseudorandom Functions. Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold |
| 2005 | On Hardness Amplification of One-Way Functions. Henry C. Lin, Luca Trevisan, Hoeteck Wee |
| 2005 | On the Relationships Between Notions of Simulation-Based Security. Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan |
| 2005 | Optimal Error Correction Against Computationally Bounded Noise. Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson |
| 2005 | Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. Shafi Goldwasser, Dmitriy Kharchenko |
| 2005 | Public-Key Steganography with Active Attacks. Michael Backes, Christian Cachin |
| 2005 | Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation. Manoj Prabhakaran, Amit Sahai |
| 2005 | Secure Computation of the Mean and Related Statistics. Eike Kiltz, Gregor Leander, John Malone-Lee |
| 2005 | Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. Ronald Cramer, Ivan Damgård, Yuval Ishai |
| 2005 | Sufficient Conditions for Collision-Resistant Hashing. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky |
| 2005 | The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. Minh-Huyen Nguyen |
| 2005 | The Universal Composable Security of Quantum Key Distribution. Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim |
| 2005 | Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings Joe Kilian |
| 2005 | Toward Privacy in Public Databases. Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam D. Smith, Hoeteck Wee |
| 2005 | Universally Composable Privacy Amplification Against Quantum Adversaries. Renato Renner, Robert König |
| 2005 | Upper and Lower Bounds on Black-Box Steganography. Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell |