- Jacques Patarin. On Linear Systems of Equations with Distinct Variables and small Block Size. In Proceedings of ICISC. décembre 2005.
- Jacques Patarin and Audrey Montreuil. Benes and Butterfly Schemes Revisited. In Proceedings of ICISC. décembre 2005.
- Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DECIM, a new stream cipher for hardware applications. In Proceedings of Symmetric Key Encryption Workshop. mai 2005.
- Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DECIM, a new Stream Cipher for Hardware applications. ECRYPT Stream Cipher Project Report 2005/027, 2005.
- Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. Sosemanuk, a fast software-oriented stream cipher. ECRYPT Stream Cipher Project Report 2005/027, 2005.
- Nicolas Courtois and Louis Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks. IACR ePrint Archive, 2005/204, 2005.
- Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris J Mitchell. Analysis of the Bit-Search Generator and Sequence Compression Techniques. In Fast Software Encryption 3557. 2005, 196-214.
- Olivier Billet and Henri Gilbert. Resistance of SNOW 2.0 Against Algebraic Attacks. In Topics in Cryptology-CT-RSA 3376. 2005, 19-28.
- Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. SOSEMANUK, a fast software-oriented stream cipher. In Proceedings of Symmetric Key Encryption Workshop. 2005.
- Nicolas Courtois and Louis Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks. In Proceedings of ICISC. 2005.
- Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller and Pierre-Michel Ricordel. Cryptanalysis of the Tractable Rational Map Cryptosystem. In Proceedings of Public Key Cryptography. 2005, 258-274.
- Antoine Joux and Frédéric Muller. Two Attacks Against the HBB Stream Cipher. In Proceedings of FSE. 2005, 330-341.
- Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, C Lemuet and William Jalby. Collisions of SHA-0 and Reduced SHA-1. In Proceedings of EUROCRYPT. 2005, 36-57.
- Michael Quisquater, Bart Preneel and Jean-Jacques Vandewalle. Spectral Characterization of Cryptographic Boolean Functions Satifying the (Extended) Propagation Criterium of Degree $l$ and Order $k$. Information Processing letters 93(1):25-28, 2005.
- Louis Goubin and Jacques Patarin. Le hasard, une idée, un concept, un outil. Chapter La génération d’aléas sur ordinateur, L’Harmattan, 2005.
- Olivier Billet. Cryptologie Multivariable. UVSQ, 2005.
Publications équipe CRYPTO 2005