Cryptology ePrint Archive: Listing for 2026
Regex
2026/648 (PDF ) Synthesis of RTL-based Characterization Programs for Fault Injection Jonah Alle Monne, Guillaume Bouffard, Damien Couroussé, Mathieu Jan
2026/647 (PDF ) SSLE-DAG: A High-Throughput Proof-of-Stake Consensus Protocol Combining an Adaptive DAG with a Single Secret Leader Election Tomas Hladky, Martin Peresini, Juraj Mariani, Ivan Homoliak
2026/646 (PDF ) On Optimal Information-Theoretic Security in Symmetric Encryption under Low-Entropy Keys Haibo Cheng, Haijie Su, Dongyi Li, Wenting Li, Ping Wang
2026/645 (PDF ) Toward Provable Security in Anamorphic Extension: New Constructions and Analysis Nabanita Chakraborty, Ratna Dutta
2026/644 (PDF ) Ordered Multi-Signatures from the DL Assumption Keisuke Hara, Keisuke Tanaka, Masayuki Tezuka
2026/643 (PDF ) FOVA: Fast One-Shot Verifiable Aggregation for Federated Learning Yin Zhu, Junqing Gong, Kai Zhang, Shay Gueron, Haifeng Qian
2026/642 (PDF ) SoK: The Weakest-Link Principle in Public Key Infrastructures and Modern Mitigation Strategies Kertis Mwanza, Carsten Köhn
2026/641 (PDF ) HyperVerITAS: Verifying Image Transformations at Scale on Boolean Hypercubes Garrett Greiner, Toshi Mowery, Pratik Soni
2026/640 (PDF ) MIKE (Module Isogeny Key Exchange): An ἰχθύς introduction Damien Robert
2026/639 (PDF ) Synchronous BFT with Provability and Fast Path for the Age of Blockchains Ittai Abraham, Kartik Nayak, Ling Ren, Ertem Nusret Tas
2026/638 (PDF ) THED: Threshold Dilithium from FHE Jai Hyun Park, Alain Passelègue, Damien Stehlé
2026/637 (PDF ) VeriRAG: Efficient Zero-Knowledge Proofs for Verifiable Retrieval-Augmented Generation Chenqi Lin, Yubo Cui, Zhelei Zhou, Cheng Hong, Yufei Wang, Zhaohui Chen, Meng Li
2026/636 (PDF ) From LFSRs to LFGs: Periodicity and Structural Transformations in Stream Ciphers Shivarama K. N, Susil Kumar Bishoi, Vadiraja Bhatta G. R., Vashek Matyas
2026/635 (PDF ) Low-Stack HAETAE for Memory-Constrained Microcontrollers Gustavo Banegas, YoungBeom Kim, Seog Chung Seo, Christine van Vredendaal
2026/634 (PDF ) PlasmaBlind: A Private Layer 2 With Instant Client-Side Proving Pierre Daix-Moreux, Chengru Zhang
2026/633 (PDF ) Progressive Sieving-Style Information-Set Decoding Algorithm Tong Yu, Haodong Jiang, Hong Wang, Rongmao Chen, Qingfeng Cheng, Xinyi Huang, Yuefei Zhu
2026/632 (PDF ) A tight security analysis of the FIPS-205 standard (SLH-DSA) Dai Chi Do, Quoc Toan Nguyen, Phong Quang Trieu, Ba Danh Vu
2026/631 (PDF ) Rethinking r-PKP: a New Formulation for the Relaxed Permuted Kernel Problem Giuseppe D'Alconzo, Andrea Gangemi, Lorenzo Romano, Giuliano Romeo
2026/630 (PDF ) Asymptotic Analysis of Ternary Sparse LWE Byoungchan Chi, Nathan Cho, Jiseung Kim, Changmin Lee
2026/629 (PDF ) Towards Formal Security Proofs of MQOM Haruhisa Kosuge, Keita Xagawa
2026/628 (PDF ) Fast and Compact Lattice-Based Registration-Based Encryption Tianwei Zhang, Xiuquan Ding, Giulio Malavolta, Nico Döttling
2026/627 (PDF ) Efficient and Parallel Implementation of Isogeny-based Deterministic Group Actions Weize Wang, Yi-Fu Lai, Kaizhan Lin, Yunlei Zhao
2026/626 (PDF ) Deep Learning-Assisted Improved Differential Fault Attacks on Lightweight Stream Ciphers Kok Ping Lim, Dongyang Jia, Iftekhar Salam
2026/625 (PDF ) Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations Ryan Babbush, Adam Zalcman, Craig Gidney, Michael Broughton, Tanuj Khattar, Hartmut Neven, Thiago Bergamaschi, Justin Drake, Dan Boneh
2026/624 (PDF ) Weak-key cryptanalysis of Blink Tim Beyne
2026/623 (PDF ) Bad Benchmarks and a Fourier-Analytic Framework for Characterizing the (Un)Hideability of Combinational-Logic Circuits Animesh Chhotaray, Kollin Labowski, Thomas Shrimpton
2026/622 (PDF ) Locally Computable High Independence Hashing Yevgeniy Dodis, Shachar Lovett, Daniel Wichs
2026/621 (PDF ) Efficient Conflict-Free NTT Hardware Architecture with Single-Port RAMs: Applications to ML-DSA Henrique S. Ogawa, Thales B. Paiva, Marcos A. Simplicio Jr, Syed M. Hafiz, Bahattin Yildiz
2026/620 (PDF ) AHAB: Asynchronous, High-throughput, Adaptively-secure, Batched Threshold Schnorr Signatures Victor Shoup
2026/619 (PDF ) Breaking the One-Way Property of a SHA-3 Implementation via Fault Injection: Key Recovery Attacks on Post-Quantum Digital Signatures Mona Sobhani, Sönke Jendral, Elena Dubrova, Mats Näslund
2026/618 (PDF ) CAGP: A Quantum Canary Address Generation Protocol Ghazaleh Keshavarzkalhori, Roger Sala-Mimó, Jordi Herrera-Joancomartí, Cristina Pérez-Solà
2026/617 (PDF ) Scaling of Memory and Bandwidth Requirements of Post-Quantum Signatures with Message Size Falko Strenzke
2026/616 (PDF ) On the properties of arithmetic crosscorrelation for sequences with coprime periods Feifei Yan, Pinhui Ke
2026/615 (PDF ) On the Security of MPC-in-the-Head Signatures with Correlated GGM Trees Thibauld Feneuil, Matthieu Rivain
2026/614 (PDF ) Attacks on Sparse LWE and Sparse LPN with new Sample-Time tradeoffs Shashwat Agrawal, Amitabha Bagchi, Rajendra Kumar
2026/613 (PDF ) Haechi: Simple Commitment-based Keyless In-person Verifiable Elections Jiwon Kim, Michael Naehrig, Olivier Pereira, Josh Benaloh
2026/612 (PDF ) Improving ML Attacks on LWE with Data Repetition and Stepwise Regression Alberto Alfarano, Eshika Saxena, Emily Wenger, François Charton, Kristin Lauter
2026/611 (PDF ) A Comparative Evaluation of DATA and Microwalk for Detecting Constant-Time Violations in Cryptographic Libraries Dominik Schneider, Paul Fuchs, Kerstin Lemke-Rust
2026/610 (PDF ) Concrete Estimation of Correctness and IND-CPA-D Security for FHE via Rare Event Simulation Mathieu Ballandras, Jean-Baptiste Orfila, Samuel Tap
2026/609 (PDF ) Post-Quantum Blockchains with Agility in Mind Manuel B. Santos, Danno Ferrin, Ron Kahat, Michael Lodder
2026/608 (PDF ) Can Adaptive Communication Graphs Lower the Bottleneck Complexity of (Secure) Multiparty Computation? Lisa Kohl, Pierre Meyer, Divya Ravi, Nicolas Resch
2026/607 (PDF ) Refined Approx-SVP Rank Reduction Conditions and Adaptive Lattice Reduction for MSIS Security Estimation Xiaohan Zhang, Zijian Zhou, Longjiang Qu
2026/606 (PDF ) PD-Net: Learning Device-Invariant Representations for Heterogeneous Cross-Device Side-Channel Attacks Dalin He, Wei Cheng, Yuejun Liu, Jingdian Ming, Yongbin Zhou
2026/605 (PDF ) Adaptively-Secure Proxy Re-Encryption with Tight Security Chen Qian, Shuo Chen, Shuai Han
2026/604 (PDF ) CatCrypt: From Rust to Cryptographic Security in Lean Bas Spitters
2026/603 (PDF ) Oblivious SpaceSaving: Heavy-Hitter Detection over Fully Homomorphic Encryption Sohaib .., Divyakant Agrawal, Amr El Abbadi
2026/602 (PDF ) Confidential Transfers for Multi-Purpose Tokens on the XRP Ledger Murat Cenk, Aanchal Malhotra, Joseph A. Akinyele
2026/601 (PDF ) Cryptanalysis of the Lightweight Stream Cipher RRSC Shivarama K. N., Susil Kumar Bishoi
2026/600 (PDF ) Hadal: Centralized Label DP Training without a Trusted Party James Choncholas, Stanislav Peceny, Amit Agarwal, Mariana Raykova, Baiyu Li, Karn Seth
2026/599 (PDF ) Proving modern code-based dual attacks with second-order techniques Charles Meyer-Hilfiger
2026/598 (PDF ) Triangulating Meet-in-the-Middle Attack Boxin Zhao, Qingliang Hou, Lingyue Qin, Xiaoyang Dong
2026/597 (PDF ) Efficiency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction Towa Toyooka, Yohei Watanabe, Mitsugu Iwamoto
2026/596 (PDF ) Gryphes: Hybrid Proofs for Modular SNARKs with Applications to zkRollups Jiajun Xin, Samuel Cheung On Tin, Christodoulos Pappas, Yongjin Huang, Dimitrios Papadopoulos
2026/595 (PDF ) Registration-Optimized Dynamic Group Time-based One-time Passwords for Mobile Access Jiaqing Guo, Xuelian Cao, Zengpeng Li, Yong Zhou, Zheng Yang, Jianying Zhou
2026/594 (PDF ) Efficient Compilers for Verifiable Dynamic Searchable Symmetric Encryption Chaya Ganesh, Sikhar Patranabis, Raja Rakshit Varanasi
2026/593 (PDF ) Three-Move Blind Signatures in Pairing-Free Groups Yanbo Chen
2026/592 (PDF ) Performance Analysis of Parameterizable HQC Hardware Architecture Nishant Pandey, Sanjay Deshpande, Dixit Dutt Bohra, Debapriya Basu Roy, Dip Sankar Banerjee, Jakub Szefer
2026/591 (PDF ) A Note on HCTR++ Mustafa Khairallah
2026/590 (PDF ) On the Security of Constraint-Friendly Map-to-Curve Relations Youssef El Housni, Benedikt Bünz
2026/589 (PDF ) FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme Joshua Babb, Brandon Goodell, Rigo Salazar, Freeman Slaughter, Luke Szramowski
2026/588 (PDF ) Tailored Limb Counts, Faster Arithmetic: Improved TMVP Decompositions for Curve5453 and Curve6071 Murat Cenk, N. Gamze Orhon Kılıç, Halil Kemal Taşkın, Oğuz Yayla
2026/587 (PDF ) Speeding Up Sum-Check Proving (Extended Version) Quang Dao, Zachary DeStefano, Suyash Bagad, Yuval Domb, Justin Thaler
2026/586 (PDF ) Bulletproofs*: Verifier-Efficient Arithmetic Circuit Proofs via Folding Emanuele Scala, Daniele Bartoli
2026/585 (PDF ) Format-Preserving Compression-Tolerating Authenticated Encryption for Images Alexandra Boldyreva, Kaishuo Cheng, Jehad Hussein
2026/584 (PDF ) Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP Martin Bach, Vukašin Karadžić, Lukas Knittel, Robert Merget, Jean Paul Degabriele
2026/583 (PDF ) SoK: Updatable Public-Key Encryption Mark Manulis, Daniel Slamanig, Federico Valbusa
2026/582 (PDF ) FrozenTRU: Cold Boot Attacks on NTRU-Based Hash-and-Sign Signatures Hiroto Kaihara, Mehdi Tibouchi, Masayuki Abe
2026/581 (PDF ) vkproof: Succinct verification of indexed verifying keys using modular compilation and polynomial fingerprinting Antonio Mejias Gil, Xueqin Zhao
2026/580 (PDF ) Exploiting noisy single-bit leakage in ML-DSA Kaveh Bashiri, Jan Geuenich, Johannes Mittmann
2026/579 (PDF ) PRIVADA: Private user-centric Data Aggregation Betul Askin Ozdemir, Beyza Bozdemir, Ionut Groza, Melek Önen
2026/578 (PDF ) How Much Verifier's Dilemma and Staking Pools Adversely Affect Decentralization of Ethereum PoS under Realistic Operational Costs? (Extended Version) Ivan Homoliak, Martin Hruby, Martin Peresini, Kristian Kostal, Daria Smuseva
2026/577 (PDF ) Two Decades of Identity-Based Identification Schemes- A Survey on Challenges and Advances Apurva Kiran Vangujar, Paolo Palmieri, Ji-Jian Chin, Swee-Huay Heng
2026/576 (PDF ) Radical 3-isogenies for the ideal class group actions on $(2, \varepsilon)$-structures Masaomi Shibata, Hiroshi Onuki, Tsuyoshi Takagi
2026/575 (PDF ) RoKoko: Lattice-based Succinct Arguments, a Committed Refinement Michael Klooss, Russell W. F. Lai, Ngoc Khanh Nguyen, Michał Osadnik, Lorenzo Tucci
2026/574 (PDF ) A Universal Blinder: One-round Blind Signatures from FHE Dan Boneh, Jaehyung Kim
2026/573 (PDF ) Two-Party BBS+ Signature in Two Passes Xiaofei Wu, Tian Qiu, Guofeng Tang, Yuqing Niu, Bowen Jiang, Jun Zhou, Haiyang Xue, Guomin Yang
2026/572 (PDF ) Earpicks: Tightly Secure Two-Round Multi- and Threshold Signatures Renas Bacho, Yanbo Chen
2026/571 (PDF ) Playing Tag with Okamoto-Schnorr: Three-Move Pairing-Free Blind Signatures from DDH Rutchathon Chairattana-Apirom, Michael Reichle, Stefano Tessaro
2026/570 (PDF ) iToken: One-Time-Use Anonymous Token with Issuance Hiding Zengpeng Li, Xiangyu Su, Dongfang Wei, Guangyu Liao, Mei Wang
2026/569 (PDF ) Hybrid KEM Constructions from Classical PKEs and Post-Quantum KEMs Biming Zhou, Yukai Zhang, Haodong Jiang, Yunlei Zhao
2026/568 (PDF ) Low-Depth Construction of Grover Oracles from Fully Functional Quantum Circuits Behzad Abdolmaleki, Jiaqi Gu
2026/567 (PDF ) Accurate Parameter Estimates for Punctured Key Recovery Linear Attacks TIm Beyne, Antonio Flórez-Gutiérrez, Yosuke Todo
2026/566 (PDF ) Secret-Shared Shuffle from Authenticated Correlations Xiangfu Song, Xiaojian Liang, Ye Dong, Jianli Bai, Pu Duan, Changyu Dong, Tianwei Zhang, Ee-Chien Chang
2026/565 (PDF ) Zeeperio: Verifying Governmental Elections with Ethereum Aikamdeep Malhotra, Aleksander Essex, Jeremy Clark
2026/564 (PDF ) TAPAS: Efficient Two-Server Asymmetric Private Aggregation Beyond Prio(+) Harish Karthikeyan, Antigoni Polychroniadou
2026/563 (PDF ) Optimizing FROST for Message Capacity Philipp Jovanovic, Ben Riva, Arnab Roy
2026/562 (PDF ) New Approaches to Zero-Knowledge SNARG Constructions Chaya Ganesh, Mor Weiss
2026/561 (PDF ) SynCirc: Efficient Synthesis of Depth-Optimized Circuits from High-Level Languages (Extended Version) Arpita Patra, Joachim Schmidt, Thomas Schneider, Ajith Suresh, Hossein Yalame
2026/560 (PDF ) High-Order Galois Automorphisms for TNFS Linear Algebra Haetham Al Aswad, Cécile Pierrot, Emmanuel Thomé
2026/559 (PDF ) PrivaDE: Privacy-preserving Data Evaluation for Blockchain-based Data Marketplaces Wan Ki Wong, Sahel Torkamani, Michele Ciampi, Rik Sarkar
2026/558 (PDF ) Cryptanalysis of four arbitrated quantum signature schemes Pierre-Alain Jacqmin, Jean Liénardy
2026/557 (PDF ) On Post-Quantum Signature with Message Recovery from Hash-and-Sign in QROM Bohang Chen, Shuai Han, Shengli Liu
2026/556 (PDF ) TP-NTT: Batch NTT Hardware with Application to Relinearization Emre Koçer, Tolun Tosun, Beren Aydoğan, Erkay Savaş, Furkan Turan, Ingrid Verbauwhede
2026/555 (PDF ) Improved Issuer Hiding for BBS-based Anonymous Credentials Nesrine Kaaniche, Seyni Kane, Maryline Laurent, Jacques Traoré
2026/554 (PDF ) PrivaLean: Low-Latency and High-Accuracy System for Secure 2PC Inference Jinghao Zhao, Hongwei Yang, Bobo Wang, Lichunxi Yang, Juncheng Li, Xiangrui Zeng, Meng Hao, Desheng Wang, Hui He, Weizhe Zhang
2026/553 (PDF ) Graph-based Asynchrony with Quasilinear Complexity for Any Linear Verifiable Secret Sharing Scheme Hugo Delavenne, Lola-Baie Mallordy
2026/552 (PDF ) NI-DKG: Non-Interactive Distributed Key Generation Using Blockchain and Zero-Knowledge Proofs Alex Kampa, Pau Escrich, Marta Bellés-Muñoz, Roger Baig
2026/551 (PDF ) Succinct Verification of Lattice-Based Compressed $\Sigma$-Protocols via Delegated Proofs of Correct Folding of Cryptographically Generated Public Parameters Anders Kallesøe
2026/550 (PDF ) Solving the Linear Code Equivalence Problem from Single Codeword Matching Magali Bardet, Charles Brion, Ayoub Otmani, Mohamed Saeed, Nicolas Sendrier
2026/549 (PDF ) Look Ahead! Practical CCA-secure Steganography: Cover-Source Switching meets Lattice Gaussian Sampling Russell W. F. Lai, Ivy K. Y. Woo, Hoover H. F. Yin
2026/548 (PDF ) Post-Quantum Cryptography from Quantum Stabilizer Decoding Jonathan Z. Lu, Alexander Poremba, Yihui Quek, Akshar Ramkumar
2026/547 (PDF ) Dialga: A Family of Low-Latency Tweakable Block Ciphers using Multiple Linear Layers (Full Version) Subhadeep Banik, Tatsuya Ishikawa, Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu, Kazuma Nakata, Mostafizar Rahman, Kosei Sakamoto
2026/546 (PDF ) Hyperelliptic Gluing Isogeny Diffie–Hellman (HGIDH): A Genus-2 Gluing Isogeny Key-Exchange Nouhou Abdou Idris, Mustapha Hedabou
2026/545 (PDF ) Aggregator-Based Voting using proof of Partition Marius Lombard-Platet, Doron Zarchy
2026/544 (PDF ) HARE: Compact HQC via Distance-Informed Erasure Decoding Tianrui Wang, Qicheng Teng, Anyu Wang, Jun Zhang, Bo Pang, Chunhuan Zhao, Sihuang Hu, Xiaoyun Wang
2026/543 (PDF ) MTSF --- Market-Theoretic Security Framework: A Unified Paradigm For The Art Of Proving and Disproving Security Basker Palaniswamy, Paolo Palmieri
2026/542 (PDF ) VERIDP: Verifiable Differentially Private Training Behzad Abdolmaleki, Amir R. Asadi, Vahid R. Asadi, Stefan Köpsell, Bhavish Mohee, Nahid Roustaeifar, Maryam Zarezadeh
2026/541 (PDF ) Towards Verifiable AI with Lightweight Cryptographic Proofs of Inference Pranay Anchuri, Matteo Campanelli, Paul Cesaretti, Rosario Gennaro, Tushar M. Jois, Hasan S. Kayman, Tugce Ozdemir
2026/540 (PDF ) Ticket to Hide: Private, Practical Proofs of Provenance for TLS Ryan Little, Daniel S. Roche, Mayank Varia
2026/539 (PDF ) Orca And Dolphin: Efficient Bivariate And Multilinear Polynomial Commitment Schemes Under Standard Assumptions Helger Lipmaa
2026/538 (PDF ) Proof-Carrying Data via Holography Accumulation Nikitas Paslis, Carla Ràfols, Alexandros Zacharakis
2026/537 (PDF ) Cheap Digit Decomposition and Large Plaintext Spaces in FHEW using Phase Splitting Leonard Schild, Aysajan Abidin, Bart Preneel
2026/536 (PDF ) Exploring the Boundary: Discriminative Model-based Parameter Search for Fault Injection Ju-Hwan Kim, Dong-Guk Han
2026/535 (PDF ) Improved Related-Key Differential Neural Distinguishers for SPN Block Ciphers Chuchu Ge, Qichun Wang
2026/534 (PDF ) Ciphertext-Policy ABE for $\mathsf{NC}^1$ Circuits with Constant-Size Ciphertexts from Succinct LWE Jiaqi Liu, Yuanyi Zhang, Fang-Wei Fu
2026/533 (PDF ) A Maliciously-Secure Post-Quantum OPRF from Crypto Dark Matter Diego F. Aranha, Aron van Baarsen, Adam Blatchley Hansen, Kent Nielsen, Peter Scholl
2026/532 (PDF ) S-two Whitepaper Dan Carmon, Lior Goldberg, Ulrich Haböck, Leonardo Lerer, Ilya Lesokhin, Shahar Papini, Shahar Samocha
2026/531 (PDF ) A Review of IC Logical Reverse Engineering Techniques Kevin Xu, Lucas Daudt Franck, Samuel Pagliarini
2026/530 (PDF ) Balthazar Wallet: Making Password Authentication Practical on Web3 via OPAQUE and Privacy-Preserving Smart Contracts Tomas Krajci, Samuel Oleksak, Ivan Homoliak
2026/529 (PDF ) Benchmarking Exported Key Material from Commercial QKD Systems Using SENTRY-Q: A Model-Based Output Validator Darshit Suratwala, Matvey Romanowski, Orr Dunkelman, Elham Amini, Jean-Pierre Seifert
2026/528 (PDF ) Full Secret Key Recovery of First-order Masked Crystals-Kyber implementation using multiple distinct chosen-ciphertexts Souhayl Ben El Haj Soulami, Yann Connan, Sylvain Duquesne
2026/527 (PDF ) QR-UOV without Rejection Sampling: Security Analysis and High-Speed Implementation Hiroshi Amagasa, Hiroki Furue, Rei Ueno, Naofumi Homma
2026/526 (PDF ) Broken By Design: A Longitudinal Analysis of Cryptographic Failures in Alipay Mobile Payment Infrastructure Jiqiang Feng
2026/525 (PDF ) SoK: Understanding zkVM: From Research to Practice Yunbo Yang, Yuejia Cheng, Haibo Tang, Guomin Yang, Bingsheng Zhang, Kui Ren
2026/524 (PDF ) Distance of RAA Codes over Large Finite Fields (with Applications in zkSNARKs and PCGs) Pariya Akhiani, Yupeng Zhang
2026/523 (PDF ) RISC-V based Vectorization of Classic McEliece Key Generation Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens
2026/522 (PDF ) X3DH with Deniable Authentication without Trusted Third Parties Stanislaw Jarecki, Phillip Nazarian, Apurva Rai
2026/521 (PDF ) UniMSM: An Efficient and Flexible Hardware Accelerator for Multi-Scalar Multiplication Kaixuan Wang, Yifan Yanggong, Chenti Baixiao, Xiaoyu Yang, Lei Wang
2026/520 (PDF ) Sparse optimisation and quantum-inspired encoding for ransomware detection Elodie Mutombo Ngoie, Mike Wa Nkongolo
2026/519 (PDF ) A Generalized Partial Exposure Lattice Attack Against an RSA variant Based on Cubic Pell Curves Michel Seck, Hortense Boudjou Tchapgnouo
2026/518 (PDF ) ${{\mathsf{SMA}^2\mathsf{RT}}}$ : Secret-Metadata Attribute-based Anonymous Rate-limited Tokens Anna Lysyanskaya, Eileen Nolan
2026/517 (PDF ) Multi-Instance Security Degradation of Code-Based KEMs Alexander May, Gabriel Sá Diogo
2026/516 (PDF ) Towards Compact UOV-Based MQ Signatures: Rectangular and Lifted Whipping Structures Quang-Duc Nguyen, Minh Hieu Nguyen
2026/515 (PDF ) Privacy at your Fingertips: Enabling Rapid Client-Side Operations in Fully Homomorphic Encryption Aikata Aikata, Florian Krieger, Sujoy Sinha Roy
2026/514 (PDF ) Secure Matrix Invertibility Testing over Fields of Small Order or Characteristics Seungwoo Han, Jooyoung Lee, Seungmin Park, Mincheol Son
2026/513 (PDF ) zkBSA: Auditable and Compliant Stealth Addresses for Blockchains Siyuan Zheng, Zhe Han
2026/512 (PDF ) Securely Scaling Autonomy: The Role of Cryptography in Future Unmanned Aircraft Systems (UAS) Paul Rochford, William J Buchanan, Rich Macfarlane, Madjid Tehrani
2026/511 (PDF ) Human-Extractable ZK Proofs of Knowledge: A Solution to Dark DAOs Zeyuan Yin, Leiyuan Tian, Bingsheng Zhang, Kui Ren
2026/510 (PDF ) FHorgEt: A Cryptographic Solution for Secure Machine Unlearning David Balbás, Dario Fiore, Georgios Raikos, Damien Robissout, Claudio Soriente
2026/509 (PDF ) PUFF: Maximally Proactive Security for Free in Perfectly Secure MPC with Guaranteed Output Delivery Jiarui Li, Mengzhen Zou, Guidong Li, Guoyan Zhang, Chen Qian
2026/508 (PDF ) Schnorr Blind Signatures and Signed ElGamal KEM in Algebraic Group Action Model Dung Hoang Duong, Willy Susilo, Chuanqi Zhang
2026/507 (PDF ) Practically Efficient Linear-Time Protocols for Server-Aided Private Set Union and Third Party Private Set Operations Foo Yee Yeo, Jason H. M. Ying
2026/506 (PDF ) Unclonable Encryption in the Haar Random Oracle Model James Bartusek, Eli Goldin
2026/505 (PDF ) SCALE-FL: Scalable Cryptography-based Aggregation with Lightweight Enclaves for Federated Learning Micah Brody, Antonia Januszewicz, Jiachen Zhao, Nirajan Koirala, Taeho Jung
2026/504 (PDF ) Compression And Decompression Under FHE Using Error-Correcting Codes and Copy-And-Recurse Adi Akavia, Hayim Shaul, Ofer Shayevitz
2026/503 (PDF ) SwiftSNNI: Optimized Scheduling for Secure Neural Network Inference (SNNI) on Multi-Core Systems Kanwal Batool, Saleem Anwar, Francesco Regazzoni, Andy Pimentel, Zoltán Ádám Mann
2026/502 (PDF ) Efficient RLWE based Chosen-Ciphertext Secure Dual-Receiver Encryption and Sender-Binding KEM in the Standard Model Laurin Benz, Robert Brede
2026/501 (PDF ) More Brisés in Ballet: Extending Differential and Linear Cryptanalysis Emanuele Bellini, Gabriele Bellini, Alessandro De Piccoli, Michela Gallone, David Gerault, Yun Ju Huang, Paul Huynh, Matteo Onger, Simone Pelizzola, Andrea Visconti
2026/500 (PDF ) Expander properties of superspecial isogeny digraphs with level structure Thomas Decru, Krijn Reijnders
2026/499 (PDF ) Accelerating FAEST Signatures on ARM: NEON SIMD AES and Parallel VOLE Optimization Seung-Won Lee, Ha-Gyeong Kim, Min-Ho Song, Si-Woo Eum, Hwa-Jeong Seo
2026/498 (PDF ) Bridging Programmability, Efficiency, and Bounded Trust: A Hybrid Privacy-Preserving Smart Contract Framework Youheng Wang, Rujia Li, Zhaoyang Xie, Kaikai Feng, Qingjie Chen, Yang Gao, Sisi Duan
2026/497 (PDF ) Trustworthy Agent Network: Trust in Agent Networks Must Be Baked In, Not Bolted On Yixiang Yao, Yuhang Yao, Xinyi Fan, Jiechao Gao, Jie Wang, Minjia Zhang, Srivatsan Ravi, Carlee Joe-Wong
2026/496 (PDF ) On quadratic equations of $q$-regular tree and their applications in Graph Theory and Cryptography. Vasyl Ustimenko, Tymoteusz Chojecki
2026/495 (PDF ) Linear Code Equivalence via Plücker Coordinates Gessica Alecci, Giuseppe D'Alconzo
2026/494 (PDF ) $\mathsf{GlueLUT}$: Generalized Lookup Table Arguments over Residue Rings via Auxiliary Fields Yuanju Wei, Zhelei Zhou, Xinxuan Zhang, Songyu Wu, Binwu Xiang, Cheng Hong, Yi Deng
2026/493 (PDF ) The SQInstructor: a guide to SQIsign and the Deuring Correspondence with level structures Giacomo Borin, Luca De Feo, Guido Maria Lido, Sina Schaeffler
2026/492 (PDF ) The Landscape of Reusable Garbling Anasuya Acharya, Carmit Hazay, Rahul Satish
2026/491 (PDF ) SoK: Private Transformer-Based Model Inference Yuntian Chen, Tianpei Lu, Zhanyong Tang, Bingsheng Zhang, Zhiying Shi, Yuxiang Luan, Zhuzhu Wang
2026/490 (PDF ) Towards Modeling Cybersecurity Behavior of Humans in Organizations Klaas Ole Kürtz
2026/489 (PDF ) Threshold Oblivious Pseudorandom Functions from Isogeny Group Actions Robi Pedersen
2026/488 (PDF ) SoK: Offline Finding Protocols for Lightweight Location Tracking Akshaya Kumar, Carolina Ortega Pérez, Joseph Jaeger, Thomas Ristenpart, Michael A. Specter
2026/487 (PDF ) Bootstrapping-Free Blind PCS: Achieving Constant Depth and Linear Prover Kexi Huang, Yanpei Guo, Wenjie Qu, Jiaheng Zhang
2026/486 (PDF ) White-Box Attacks on PhotoDNA Perceptual Hash Function Maxime Deryck, Diane Leblanc-Albarel, Bart Preneel
2026/485 (PDF ) SIMD HSS and aHMAC from Interval Encoding with Application to One-Bit-Per-Gate Garbling Jaehyung Kim, Hanjun Li, Huijia Lin, Zeyu Liu
2026/484 (PDF ) Signal Lost (Integrity): The Signal App is More than the Sum of its Protocols Kien Tuong Truong, Noemi Terzo, Kenneth G. Paterson
2026/483 (PDF ) Debt-Aware Bonding Curves: Non-Decreasing Floor Prices and Non-Liquidatable Borrowing Ömer Demirel, Michael Lewkowitz, Tiago Santana
2026/482 (PDF ) Cryptanalysis of Two Alternating Moduli Weak PRFs Kai Hu, Gregor Leander, Håvard Raddum, Arne Sandrib, Aleksei Udovenko
2026/481 (PDF ) Remise: Authorized Anonymous Communication Systems Rohan Ravi, Paritosh Shukla, Adithya Vadapalli
2026/480 (PDF ) CHOPIN: Optimal Pairing-Based Multilinear Polynomial Commitments from Bivariate KZG Juraj Belohorec, Pavel Hubáček, Aleksi Kalsta, Kristýna Mašková
2026/479 (PDF ) Strong Efficiency Lower Bounds for Byzantine Agreement Clément Ducros, Julian Loss, Matthieu Rambaud
2026/478 (PDF ) A Hardware/Software Co-Optimization of HQC Using Tightly-Coupled Accelerators on a 32-bit Ibex Core Seog Chung Seo, YoungBeom Kim
2026/477 (PDF ) DAC-PRE: Practical Anonymous Data Access Scheme Control with Proxy Re-encryption for Implantable Medical Devices Jayaprakash Kar, Xiaoguang Liu, Fagen Li
2026/476 (PDF ) Duty-Free Bits: Projectivizing Garbling Schemes Nakul Khambhati, Anwesh Bhattacharya, David Heath
2026/475 (PDF ) Scaling Fully Secure MPC via Robust Recursive Search and Gap Amplification Matan Hamilis, Ariel Nof
2026/474 (PDF ) Scalable Compliant Privacy on Starknet Lior Goldberg, Maya Dotan, Ittay Dror, Gideon Kaempfer, Nir Levi, Noa Oved, Arad Reder, Anat Veredgorn, Noa Wolfgor
2026/473 (PDF ) PIKE: Faster Isogeny-Based Public Key Encryption with Pairing-Assisted Decryption Shiping Cai, Mingjie Chen, Yi-Fu Lai, Kaizhan Lin
2026/472 (PDF ) Descent into Broken Trust: Uncovering ML-DSA Subkeys with Scarce Leakage and Local Optimization Carsten Schubert, Niklas Julius Müller, Jean-Pierre Seifert, Marian Margraf
2026/471 (PDF ) Lookup Arguments over Rings and Applications to Batch-Verification of RAM Programs Jonathan Bootle, Julia Guskind, Sikhar Patranabis, Katerina Sotiraki
2026/470 (PDF ) Byzantine Consensus in the Partially Authenticated Setting Christoph Lenzen, Julian Loss, Kecheng Shi, Benedikt Wagner
2026/469 (PDF ) A Note on ``Linear-Communication ACSS with Guaranteed Termination and Lower Amortized Bound'' Xiaoyu Ji, Junru Li, Yifan Song
2026/468 (PDF ) Tighter Proofs for PKE-to-KEM Transformations under Average-Case Decryption Error and without $\gamma$-Spread Jinrong Chen, Rongmao Chen, Yi Wang, Haodong Jiang, Cong Peng, Xinyi Huang, Debiao He, Xiaofeng Chen
2026/467 (PDF ) A Note on the Equivalence Between Zero-knowledge and Quantum CSS Codes Noga Ron-Zewi, Mor Weiss
2026/466 (PDF ) Hashing in Generic Groups: Completing the AGM-to-GGM Transfer Taiyu Wang, Cong Zhang, Hong-Sheng Zhou, Xin Wang, Keyu Ji, Zhihong Jia, Li Lin, Changzheng Wei, Ying Yan, Kui Ren, Chun Chen
2026/465 (PDF ) Advanced cryptography from lattice isomorphism—new constructions of IBE and FHE Huck Bennett, Zhengnan Lai, Noah Stephens-Davidowitz
2026/464 (PDF ) Model Extraction of Convolutional Neural Networks with Max-Pooling Haolin Liu, Adrien Siproudhis, Christina Boura, Thomas Peyrin
2026/463 (PDF ) Icefish: Practical zk-SNARKs for Verifiable Genomics Alexander Frolov, Maurice Shih, Rob Patro, Ian Miers
2026/462 (PDF ) Semigroup Action Problems and Their Uses in Post-Quantum Cryptography Joachim Rosenthal, Silvia Sconza
2026/461 (PDF ) Compact HQC with new (un)balance Chaofeng Guan, Lan Luo, Haodong Jiang, Jianhua Hou, Tong Yu, Hong Wang, Kangquan Li, Longjiang Qu
2026/460 (PDF ) A Resource-Efficient Hardware Accelerator for Large-Size NTT via Algorithm–Architecture Co-Design Kaixuan Wang, Yifan Yanggong, Xiaoyu Yang, Chenti Baixiao, Lei Wang
2026/459 (PDF ) Naor-Yung Transform for IND-CCA Probing Security with Lattice Instantiations Katharina Boudgoust, Laurent Imbert, Loïc Masure, Laz Panard
2026/458 (PDF ) The Art of Linearization: From a KZG’s Trick to a General Commitment Framework Janno Siim
2026/457 (PDF ) Adaptively Secure, Universally Composable Distributed Generation of Discrete-Logarithm Based Keys Hanna Ek, Kelsey Melissaris, Lawrence Roy
2026/456 (PDF ) Libra: Pattern-Scheduling Co-Optimization for Cross-Scheme FHE Code Generation over GPGPU Song Bian, Yintai Sun, Zian Zhao, Haowen Pan, Mingzhe Zhang, Zhenyu Guan
2026/455 (PDF ) Asynchronous MPC with Abort Ananya Appan, David Heath, Ling Ren
2026/454 (PDF ) The principal ideal problem for endomorphism rings of superspecial abelian varieties Wouter Castryck, Jonathan Komada Eriksen, Riccardo Invernizzi, Frederik Vercauteren
2026/453 (PDF ) A Quantum-Safe Private Group System for Signal from Key Re-Randomizable Signatures Graeme Connell, Sebastian Faller, Felix Günther, Julia Hesse, Vadim Lyubashevsky, Rolfe Schmidt
2026/452 (PDF ) On the CCA security properties of a class of group-based linearly homomorphic encryption schemes Duong Hieu Phan, Renaud Sirdey, Jean Vacher
2026/451 (PDF ) Oblivious Single Access Machines are Concretely Efficient Sage Pia, Ananya Appan, Maryam Rezapour, Amey Shukla, Nikhil Date, Benjamin Fuller, Ling Ren, David Heath
2026/450 (PDF ) A flexible and polynomial framework for integer arithmetic in CKKS Lorenzo Rovida
2026/449 (PDF ) Short Signatures from DDH without Pairings or Random Oracles Dario Catalano, Valentina Frasca, Emanuele Giunta
2026/448 (PDF ) Interactive Proofs for Batch Polynomial Evaluation Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
2026/447 (PDF ) Trace: Complete Client-Side Account Access Logging Paul Gerhart, Carolina Ortega Pérez, Thomas Ristenpart
2026/446 (PDF ) Survey of isogeny-based signature schemes resistant to Castryck–Decru attack J. S. Bobrysheva, A. S. Zelenetsky, V. V. Davydov
2026/445 (PDF ) Implementation of a post-quantum hybrid group key exchange protocol Tomáš Fabšič, Samuel Klement, Zoltán Raffay, Pavol Zajac
2026/444 (PDF ) Leakage-Diagrams, Importance Sampling, and Composition in the Random Probing Model Vahid Jahandideh, Bart Mennink, Lejla Batina
2026/443 (PDF ) PRISM with a pinch of salt: Simple, Efficient and Strongly Unforgeable Signatures from Isogenies Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski
2026/442 (PDF ) Memory-Efficient Implementation of SMAUG-T and HAETAE Yulim Hyoung, Subeen Cho, Uijae Kim, Minwoo Lee, Hwajeong Seo, Minjoo Sim
2026/441 (PDF ) Fuzzy Private Set Intersection for Real-World Datasets Satvinder Singh, Yanxue Jia, Aniket Kate
2026/440 (PDF ) Performance Analysis of a Thread Pool-Based Parallel Execution Model for Hybrid Post-Quantum TLS 1.3 Handshakes Si-Woo Eum, Min-Ho Song, Hwa-Jeong Seo
2026/439 (PDF ) The OCH Authenticated Encryption Scheme Sanketh Menda, Mihir Bellare, Viet Tung Hoang, Julia Len, Thomas Ristenpart
2026/438 (PDF ) Updatable Private Set Intersection from Symmetric-Key Techniques Junxin Liu, Peihan Miao, Mike Rosulek, Xinyi Shi, Jifeng Wang
2026/437 (PDF ) Efficient Single-Server Stateful PIR Using Format-Preserving Encryption Pranav Shriram Arunachalaramanan, Ling Ren
2026/436 (PDF ) Post-Quantum Anonymous Signatures from the Lattice Isomorphism Group Action Chris van Noorden, Paola de Perthuis
2026/435 (PDF ) Information-Theoretic Strong Traceable Secret Sharing Schemes Oriol Farràs, Miquel Guiot
2026/434 (PDF ) Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions Jonas Janneck, Doreen Riepel
2026/433 (PDF ) Round-Optimal Threshold Blind Signatures without Random Oracles Georg Fuchsbauer, Fabian Regen, Hoeteck Wee
2026/432 (PDF ) Finite Field Arithmetic for ML-KEM Using Zech's Logarithm Masaaki Shirase
2026/431 (PDF ) Revisiting the Security of Sparkle Ojaswi Acharya, Georg Fuchsbauer, Adam O'Neill, Marek Sefranek
2026/430 (PDF ) An attack on the CFS scheme and on TII McEliece challenges Magali Bardet, Axel Lemoine, Jean-Pierre Tillich
2026/429 (PDF ) Efficient Private Range Queries on Public Data Pranav Shriram Arunachalaramanan, Ananya Appan, David Heath, Ling Ren
2026/428 (PDF ) Defending Against Backdoor Attacks in Homomorphically Encrypted Federated Learning Ikhlas Mastour, Imane Haidar, Layth Sliman, Raoudha Ben Djemaa
2026/427 (PDF ) StarHunters— Secure Hybrid Post-Quantum KEMs From IND-CCA2 PKEs Deirdre Connolly, Mike Ounsworth, Sophie Schmieg, Douglas Stebila
2026/426 (PDF ) Post-Quantum Security of Keyed Sum of Permutations and Its Siblings Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi, Amlan Sinha
2026/425 (PDF ) Committing Security of BBB Secure MACs Sougata Mandal, Hrithik Nandi, Amlan Sinha
2026/424 (PDF ) CRISP: Circuit-pRivate Single-Image Steganography with Permutations Shahzad Ahmad, Stefan Rass
2026/423 (PDF ) Coppersmith's Method for Solving Modular Inversion Hidden Number Problem via Determinant-Based Elimination Zhaopeng Ding, Zhaopeng Dai, Baofeng Wu, Rundong Wang, Yanshuo Zhang
2026/422 (PDF ) Threshold Traitor Tracing Revisited: Insider Attacks and Multi-Traitor Tracing Jan Bormet, Sebastian Faust, Hussien Othman
2026/421 (PDF ) Cryptanalysis of Polynomial Learning With Errors (PLWE): A Survey Rahinatou Yuh Njah Nchiwo
2026/420 (PDF ) FALCON with message recovery, a specification Felix Gunther, Vadim Lyubashevsky, Rolfe Schmidt
2026/419 (PDF ) Hermine: An Efficient Lattice-based FROST-like Threshold Signature Giacomo Borin, Sofía Celi, Rafael del Pino, Thomas Espitau, Shuichi Katsumata, Guilhem Niot, Thomas Prest, Kaoru Takemure
2026/418 (PDF ) A White-Box Bootstrapping Approach for High Precision Comparison Over Homomorphic Encryption Deokhwa Hong, Heesoo Lee, Young-Sik Kim, Yongwoo Lee
2026/417 (PDF ) Tweed: Adaptively Secure Lattice-Based Two-Round Threshold Signatures Kaijie Jiang, Stefano Tessaro, Hoeteck Wee, Chenzhi Zhu
2026/416 (PDF ) An Ultra-Robust Privacy Preserving Scheme for Federated Learning using Distributed Homomorphic Encryption Ikhlas Mastour, Layth Sliman, Boussad Ait Salem, Balthazar Bauer, Raoudha Ben Djemaa, Kamel Barkaoui
2026/415 (PDF ) Separating Non-Interactive Classical Verification of Quantum Computation from Falsifiable Assumptions Mohammed Barhoush, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2026/414 (PDF ) Towards Practical Registered ABE: More Efficient, Non-monotone, and CCA-secure Yannis Rouselakis, Junichi Tomida
2026/413 (PDF ) On Best-Possible One-Time Programs Aparna Gupte, Jiahui Liu, Luowen Qian, Justin Raizes, Bhaskar Roberts, Mark Zhandry
2026/412 (PDF ) VisualDedup: Visual Fuzzy Deduplication for Secure Batch Duplicates Detection without Server Aided Shengke Zeng, Zehui Tang, Song Han, Mingxing He
2026/411 (PDF ) A Built-in Crypto Expert for Artificial Intelligence: How Far is the Horizon? Jiasi Weng, Jian Weng, Ming Li
2026/410 (PDF ) Collaborative Incrementally Verifiable Computation Eden Aldema Tshuva, Sanjam Garg, Abhiram Kothapalli, Rotem Oshman, Omkant Pandey, Bhaskar Roberts
2026/409 (PDF ) Cryptanalysis of Poseidon-Based Fiat-Shamir Protocols Hayk Hovhannisyan, Nerses Asaturyan, Gohar Hovhannisyan
2026/408 (PDF ) Smoothing the degree of regularity for polynomial systems Samuel Jaques, Lars Ran, Simona Samardjiska, Melvin Seitner
2026/407 (PDF ) On the Binding Security of KEMs based on RSA and DH Juliane Krämer, Maximiliane Weishäupl, Stefan Winderl
2026/406 (PDF ) Putting the OPTI in Round Optimal IA-MPC in the Plain Model Yashvanth Kondi, Divya Ravi, Jure Sternad, Sophia Yakoubov
2026/405 (PDF ) Group Encryption with Oblivious Traceability Khoa Nguyen, Yanhong Xu, Nam Tran, Willy Susilo, Huaxiong Wang
2026/404 (PDF ) Ultra short signatures with Dragon $HFE_{LL'}$ Jacques Patarin, Jan Vacek
2026/403 (PDF ) On the Need for (Quantum) Memory with Short Outputs Zihan Hao, Zikuan Huang, Qipeng Liu
2026/402 (PDF ) Conditionally Linkable Attribute-Based Signatures Minh Pham, Khoa Nguyen, Slim Bettaieb, Mukul Kulkarni, Willy Susilo
2026/401 (PDF ) NIROPoK-Based Post-Quantum Sidechain Design on Ethereum Hassan Khodaiemehr, Khadijeh Bagheri, Saeid Yazdinejad, Chen Feng
2026/400 (PDF ) Non-interactive Blind Signatures with Threshold Issuance Foteini Baldimtsi, Lucjan Hanzlik, Aayush Yadav
2026/399 (PDF ) What a Wonderful World: zkSNARKs in the Algebraic Group Model are Universally Composable Gaspard Anthoine, Dario Fiore, Mahak Pancholi
2026/398 (PDF ) Orthus: Practical Sublinear Batch-Verification of Lattice Relations from Standard Assumptions Madalina Bolboceanu, Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo, Gregor Seiler
2026/397 (PDF ) Bittersweet Signatures: Bringing LWR to a Picnic for Hardware-Friendly MPC-in-the-Head Brieuc Balon, Gianluca Brian, Sebastian Faust, Carmit Hazay, Elena Micheli, François-Xavier Standaert
2026/396 (PDF ) Anonymity of X-Wing and its Variants Jiawei Bao, Jiaxin Pan
2026/395 (PDF ) How To Make Delegated Payments on Bitcoin: A Question for the AI Agentic Future Jay Taylor, Paul Gerhart, Sri AravindaKrishnan Thyagarajan
2026/394 (PDF ) SQISign on ARM Luca De Feo, Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang
2026/393 (PDF ) VROOM: Accelerating (Almost All) Number-Theoretic Cryptography Using Vectorization and the Residue Number System Simon Langowski, Kaiwen He, Srinivas Devadas
2026/392 (PDF ) Fast cube roots in Fp2 via the algebraic torus Youssef El Housni
2026/391 (PDF ) Zero-Knowledge IOPPs for Constrained Interleaved Codes Alessandro Chiesa, Giacomo Fenzi, Guy Weissenberg
2026/390 (PDF ) Succinct Arguments for BatchQMA and Friends under 6 Rounds Rishab Goyal, Aditya Jain, Shashwatha Mitra GB
2026/389 (PDF ) Towards Accountability for Anonymous Credentials Shailesh Mishra, Martin Burkhart
2026/388 (PDF ) Necessary and Sufficient Conditions for the Existence of Ideal Linear Secret Sharing Schemes for Arbitrary Access Structures Zheng Chen, Qiuxia Xu, Chunming Tang
2026/387 (PDF ) A Comprehensive Break of the Tropical Matrix-Based Signature Scheme Sopan Chavhan, Shrikant Chaudhari
2026/386 (PDF ) Determining those Boolean functions whose restrictions to affine spaces are plateaued Claude Carlet, Darrion Thornburgh
2026/385 (PDF ) Bridging Privacy and Utility: A Verifiable Framework for Data Valuation via Zero-Knowledge Proofs Ruibang Liu, Minyu Chen, Dengji Ma, Guoqiang Li
2026/384 (PDF ) The Structured Generic-Group Model Henry Corrigan-Gibbs, Alexandra Henzinger, David J. Wu
2026/383 (PDF ) HCTR$^{++}$ : A Beyond Birthday Bound Secure HCTR2 Variant Gülnihal Öztürk, Onur Koçak, Oğuz Yayla
2026/382 (PDF ) Multi-key Security in the Quantum World: Revisiting Tweakable Even-Mansour and FX Rentaro Shiba, Tetsu Iwata
2026/381 (PDF ) Multi-Committee MPC: From Unanimous to Identifiable Abort Lichun Li, Hongqing Liu, Jiawei Ni, Chaoping Xing, Chen Yuan
2026/380 (PDF ) Lattice HD Wallets: Post-Quantum BIP32 Hierarchical Deterministic Wallets from Lattice Assumptions Conor Deegan, James Fitzwater, Kamil Doruk Gur, David Nugent
2026/379 (PDF ) Pairing-based Functional Commitments for Circuits with Shorter Parameters David Balbás, Dario Fiore, Russell W. F. Lai
2026/378 (PDF ) Information-Theoretic Network-Agnostic MPC with Polynomial Communication Xiaoyu Ji, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song
2026/377 (PDF ) Perfectly Secure Network-Agnostic MPC Comes for Free Xiaoyu Ji, Chen-Da Liu-Zhang, Yifan Song
2026/376 (PDF ) Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters Lucas Piske, Ni Trieu
2026/375 (PDF ) Liquid Democracy With Two Opposing Factions Krishnendu Chatterjee, Seth Gilbert, Stefan Schmid, Jakub Svoboda, Michelle Yeo
2026/374 (PDF ) WOTS-Tree: Merkle-Optimized Winternitz Signatures for Post-Quantum Bitcoin Javier Mateos
2026/373 (PDF ) Partially Non-Interactive Two-Round Threshold and Multi-Signatures with Tighter and Adaptive Security Yanbo Chen
2026/372 (PDF ) Distributed Monotone-Policy Encryption with Silent Setup from Lattices Abtin Afshar, Rishab Goyal, Saikumar Yadugiri
2026/371 (PDF ) A Modular Approach to Succinct Arguments for QMA James Bartusek, Jiahui Liu, Giulio Malavolta
2026/370 (PDF ) Round-Optimal Byzantine Agreement without Trusted Setup Diana Ghinea, Ivana Klasovitá, Chen-Da Liu-Zhang
2026/369 (PDF ) Issuer-Hiding for BBS Anonymous Credentials via Randomizable Keys Andrea Flamini, Karla Friedrichs, Anja Lehmann
2026/368 (PDF ) Additions, Multiplications, and the Interaction In-Between: Optimizing MPC Protocols via Leveled Linear Secret Sharing Andreas Brüggemann, Thomas Schneider, Maximilian Stillger
2026/367 (PDF ) High-Precision Functional Bootstrapping for CKKS from Fourier Extension Song Bian, Yunhao Fu, Ruiyu Shen, Haowen Pan, Anyu Wang, Zhenyu Guan
2026/366 (PDF ) Careful with the Ring: Enhanced Hybrid Decoding Attacks against Module/Ring-LWE Jianhua Hou, Haodong Jiang
2026/365 (PDF ) Cube and Integral Attacks on ChiLow-32 Shuo Peng, Akram Khalesi, Zahra Ahmadian, Hosein Hadipour, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang
2026/364 (PDF ) SPRINT: New Isogeny Proofs of Knowledge and Isogeny-Based Signatures Thomas den Hollander, Shai Levin, Marzio Mula, Robi Pedersen, Daniel Slamanig, Sebastian A. Spindler
2026/363 (PDF ) LazyArc: Dynamic Out-of-Order Engine for High-Throughput FHE Omar Ahmed, Nektarios Georgios Tsoutsos
2026/362 (PDF ) Janus-FHE: A Side Channel Resilient Framework for High-Degree Homomorphic Encryption on GPUs Kashfia Farheen, Nektarios Georgios Tsoutsos
2026/361 (PDF ) Scytale: A Compiler Framework for Accelerating TFHE with Circuit Bootstrapping Rostin Shokri, Nektarios Georgios Tsoutsos
2026/360 (PDF ) Improved preprocessing for the Crossbred algorithm and application to the MQ problem Damien Vidal, Claire Delaplace, Sorina Ionica
2026/359 (PDF ) Cyclo: Lightweight Lattice-based Folding via Partial Range Checks Albert Garreta, Helger Lipmaa, Urmas Luhaäär, Michał Osadnik
2026/358 (PDF ) Round-Based Approximation of (Higher-Order) Differential-Linear Correlation Kai Hu, Zhongfeng Niu, Meiqin Wang
2026/357 (PDF ) Simulating Noisy Leakage with Bounded Leakage: Simpler, Better, Faster Julien Béguinot, Ananta Mukherjee, Maciej Obresmki, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi
2026/356 (PDF ) Publicly Certifiable Min-Entropy Without Quantum Communication Ofer Casper, Barak Nehoran, Or Sattath
2026/355 (PDF ) Forget-IT: Optimal Good-Case Latency For Information-Theoretic BFT Ittai Abraham, Sourav Das, Yuval Efron, Jovan Komatovic
2026/354 (PDF ) Structural Collapse of the Amutha-Perumal Scheme Based on Duo Circulant Matrices Sopan Chavhan, Shrikant Chaudhari
2026/353 (PDF ) Dual-Syncopation Meet-in-the-Middle Attacks: New Results on SHA-2 and MD5 Jian Guo, Haoran Li, Meicheng Liu, Shichang Wang, Tianyu Zhang
2026/352 (PDF ) Migrating Bitcoin and Ethereum Addresses to the Quantum Blockchain Era Mehmet Sabir Kiraz, Suleyman Kardas
2026/351 (PDF ) Lie algebras and the security of cryptosystems based on classical varieties in disguise Wouter Castryck, Mingjie Chen, Péter Kutas, Jun Bo Lau, Alexander Lemmens, Mickael Montessinos
2026/350 (PDF ) Hybridization of Cryptographic Primitives: A Generalized Framework for Adaptive Security Zahra Seyedi, Eckhard Pfluegel, Shahzad Ahmad, Willie Kouam, Stefan Rass
2026/349 (PDF ) Multipath PA-PUFs generate all Boolean functions R Radheshwar, Dibyendu Roy, Pantelimon Stanica
2026/348 (PDF ) Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols Shan Chen, Kaige Pan, Olga Sanina
2026/347 (PDF ) Relaxed Modular PCS from Arbitrary PCS and Applications to SNARKs for Integers Alireza Shirzad, Sriram Sridhar, Dimitrios Papadopoulos, Charalampos Papamanthou
2026/346 (PDF ) Lighthouse: Single-Server Secure Aggregation with $O(1)$ Server-Committee Communication at Scale Sanjam Garg, Alireza Kavousi, Dimitris Kolonelos, Erkan Tairi, Zhipeng Wang
2026/345 (PDF ) Zebra: Arithmetic Garbled RAM for Large Words from DCR Tianyao Gu, Ashrujit Ghoshal, Elaine Shi
2026/344 (PDF ) Area-Efficient LUT-Based Multipliers for AMD Versal FPGAs Zetao Miao, Xander Pottier, Jonas Bertels, Wouter Legiest, Ingrid Verbauwhede
2026/343 (PDF ) PaCMan - Partition-Code Masking for Combined Security Fabian Buschkowski, Jakob Feldtkeller, Tim Güneysu, Elisabeth Krahmer, Jan Richter-Brockmann, Pascal Sasdrich
2026/342 (PDF ) Improved Reduction from RLWE to MP-LWE Rahinatou Yuh Njah Nchiwo, Alice Pellet-Mary
2026/341 (PDF ) Syndrome Decoding with Hints Letizia D'Achille, Andre Esser, Nicolai Kraus
2026/340 (PDF ) Improving Neural-Inspired Integral Distinguishers via a Linear-Algebraic Approach Yunjae Hwang, Insung Kim, Sunyeop Kim, Myungkyu Lee, Hanbeom Shin, Deukjo Hong, Seokhie Hong, Dongjae Lee, Jaechul Sung, Byoungjin Seok
2026/339 (PDF ) $\mathsf{Spectra}$: Interval-Agnostic Vector Range Argument for Unstructured Range Assertions Hao Gao, Qianhong Wu, Bo Qin, Fudong Wu, Zhenyang Ding, Zhiguo Wan
2026/338 (PDF ) Is it Really Broken? The Failure of DL-SCA Scoring Metrics under Non-Uniform Priors Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou, Rémi Strullu
2026/337 (PDF ) Efficient, UC-secure and Publicly Auditable MPC from OLE & VOLE-in-the-head Carsten Baum, Chiara-Marie Zok
2026/336 (PDF ) How to Build a Short-Input Random Oracle from Public Random Permutations Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Bart Mennink, Hrithik Nandi, Yaobin Shen
2026/335 (PDF ) Sumcheck-based zkSNARKs are Non-Malleable Antonio Faonio, Luigi Russo
2026/334 (PDF ) Tripling on Hessian curves via isogeny decomposition Thomas Decru, Sabrina Kunzweiler
2026/333 (PDF ) A Cryptographic Framework for Proof of Personhood Arka Rai Choudhuri, Sanjam Garg, Keewoo Lee, Hart Montgomery, Guru Vamsi Policharla, Rohit Sinha
2026/332 (PDF ) Cost-Layer–Blind Hybrid QAOA for MAX K-CUT via Native MBQC and Selective Graph Masking Doyoung Chung, Youngkyung Lee, Juyoung Kim
2026/331 (PDF ) Non-Trivial Zero-Knowledge Implies One-Way Functions Suvradip Chakraborty, James Hulett, Dakshita Khurana, Kabir Tomer
2026/330 (PDF ) SoK: Anonymous Credentials for Digital Identity Wallets Christian Bormann, Anja Lehmann
2026/329 (PDF ) Oblivious Ciphertext Compression via Linear Codes Pascal Giorgi, Bruno Grenet, Mark Simkin
2026/328 (PDF ) NeuralCPA: A Deep Learning Perspective on Chosen-Plaintext Attacks Xuanya Zhu, Liqun Chen, Yangguang Tian, Gaofei Wu, Xiatian Zhu
2026/327 (PDF ) Breaking digital signatures from tropical matrix semirings Alessandro Sferlazza
2026/326 (PDF ) Special Soundness and Binding Properties: A Framework for Tightly Secure zk-SNARKs Erki Külaots, Helger Lipmaa, Roberto Parisella, Janno Siim
2026/325 (PDF ) eDAS: Extending Data Availability Sampling with Privacy and Compliance Isobel Watkins, Nicolas Mohnblatt, Philipp Jovanovic
2026/324 (PDF ) FLiPD: Privacy-Preserving Federated Learning via Multi-Party Computation and Differential Privacy Gowri R Chandran, Melek Önen, Thomas Schneider
2026/323 (PDF ) Cryptokinetics Hadrien Barral, David Naccache, Aleksa Veličković
2026/322 (PDF ) Multi-key Fully Homomorphic Encryption with Non-Interactive Setup in the Plain Model Seonhong Min, Jeongeun Park, Yongsoo Song
2026/321 (PDF ) Sliced Rényi Pufferfish Privacy: Tractable Privatization Mechanism and Private Learning with Gradient Clipping Tao Zhang, Yevgeniy Vorobeychik
2026/320 (PDF ) Statistically Secure Asynchronous MPC with Linear Communication and $\mathcal{O}(n^5)$ Additive Overhead Xiaoyu Ji, Yifan Song
2026/319 (PDF ) New Techniques for Information-Theoretic Asynchronous MPC with Abort Xiaoyu Ji, Yifan Song
2026/318 (PDF ) Distributed Monotone-Policy Encryption for DNFs from Lattices Jeffrey Champion, David J. Wu
2026/317 (PDF ) Two-Factor Authentication Can Harden Servers Against Offline Password Search Xavier Boyen, Stanislaw Jarecki, Phillip Nazarian, Jiayu Xu, Tianyu Zheng
2026/316 (PDF ) GG-GSW: Chosen-Ciphertext Secure Leveled FHE From Gadget Trapdoors Jérôme Nguyen
2026/315 (PDF ) Proving Knowledge of Syndrome Decoding Problems with Soundness Felice Manganiello, Freeman Slaughter
2026/314 (PDF ) Understanding Multi-Query Attacks on Key-Then-Hash Functions Jonathan Fuchs
2026/313 (PDF ) On the Equivalence of Forgery and Key Recovery in Key-Then-Hash Functions Jonathan Fuchs
2026/312 (PDF ) RISQrypt: Fast, Secure and Agile Hardware-Software Co-Design for Post-Quantum Cryptography Tolun Tosun, Atıl Utku Ay, Quinten Norga, Suparna Kundu, Melik Yazıcı, Erkay Savaş, Ingrid Verbauwhede
2026/311 (PDF ) Security of the Fischlin Transform in Quantum Random Oracle Model Christian Majenz, Jaya Sharma
2026/310 (PDF ) Bolt: Faster SNARKs from Sketched Codes Kobi Gurkan, Andrija Novakovic, Ron D. Rothblum
2026/309 (PDF ) Hash Function Constructions from Lightweight Block Ciphers for Fully Homomorphic Encryption Olivier Bernard, Marc Joye
2026/308 (PDF ) Anamorphic E-Voting: Coercion-Resistant Through Fake and Real Votes Antonis Michalas
2026/307 (PDF ) Composition Theorems for Zero-Knowledge IOPs Himanshu Vashishth, Mor Weiss
2026/306 (PDF ) Skipping Class: Algebraic Attacks exploiting weak matrices and operation modes of Poseidon2(b) Simon-Philipp Merz, Àlex Rodríguez García
2026/305 (PDF ) Quantum Truncated Differential Attacks using Convolutions Aurel Pichollet--Mugnier, André Schrottenloher
2026/303 (PDF ) $\mathsf{TalonG}$: Bandwidth-Efficient Two-Round Threshold Signatures from Lattices Liming Gao, Guofeng Tang, Dingding Jia, Yijian Liu, Bingqian Liu, Xianhui Lu, Kunpeng Wang, Yongjian Yin
2026/302 (PDF ) Non Interactive MPC, (Quantumly) Revisited Prabhanjan Ananth, Divyanshu Bhardwaj, Aparna Gupte
2026/301 (PDF ) Blind Leakage: Rethinking Deep Learning-based Non-Profiled Side-Channel Analysis Jintong Yu
2026/300 (PDF ) Quantum One Time Programs: Less Assumptions, More Feasibility and One Message 2PC Prabhanjan Ananth, Divyanshu Bhardwaj
2026/299 (PDF ) Weak Zero-Knowledge and One-Way Functions Rohit Chatterjee, Yunqi Li, Prashant Nalini Vasudevan
2026/298 (PDF ) Key Recovery Attacks on UOV Using p^l-truncated Polynomial Rings Hiroki Furue, Yasuhiko Ikematsu
2026/297 (PDF ) Scaling Sparse Matrix Computation for Secure Outsourced Computing Wujie Xiong, Hao Zhou, Yutong Ye, Ruoming Jin, Lei Xu
2026/296 (PDF ) Navigating the Deep: End-to-End Extraction on Deep Neural Networks Haolin Liu, Adrien Siproudhis, Samuel Experton, Peter Lorenz, Christina Boura, Thomas Peyrin
2026/295 (PDF ) From OT to OLE with Almost-Linear Communication Geoffroy Couteau, Naman Kumar
2026/294 (PDF ) Post-Quantum Adaptor Signatures with Strong Security from Cryptographic Group Actions Ryann Cartor, Nathan Daly, Giulia Gaggero, Jason T. LeGrow, Andrea Sanguineti, Silvia Sconza
2026/293 (PDF ) Quantum Oracle Distribution Switching and its Applications to Fully Anonymous Ring Signatures Marvin Beckmann, Christian Majenz
2026/292 (PDF ) Crossing with Confidence: Formal Analysis and Model Checking of Blockchain Bridges Pyrros Chaidos, Pooya Farshim, Denis Firsov, Dimitar Jetchev, Aggelos Kiayias, Markulf Kohlweiss, Anca Nitulescu
2026/291 (PDF ) Tight Reductions for SIS-with-Hints Assumptions with Applications to Anonymous Credentials Ngoc Khanh Nguyen, Jan Niklas Siemer
2026/290 (PDF ) Improved Cryptanalysis of HFERP Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone
2026/289 (PDF ) Zero-Knowledge Proof-Carrying Data from Accumulation Schemes Tianyu Zheng, Shang Gao, Xun Liu
2026/288 (PDF ) Bypassing the Random-Probing Model in Masking Security Proofs Julien Béguinot, Gianluca Brian, Loïc Masure
2026/287 (PDF ) Network-Agnostic Multidimensional Approximate Agreement with Optimal Resilience Diana Ghinea, Darya Melnyk, Tijana Milentijević
2026/286 (PDF ) Upper Bound on Information-Theoretic Security of Permutation-Based Pseudorandom Functions Chun Guo, Jian Guo, Xinnian Li, Wenjie Nan
2026/285 (PDF ) How (not) to Switch FHE Schemes: Framework and Attacks in the IND-CPA-D Model Giacomo Santato, Riccardo Zanotto
2026/284 (PDF ) Knowledge Soundness of Polynomial Commitments in the Algebraic Group Model Does Not Guarantee Extractability Petr Chmel, Pavel Hubáček, Dominik Stejskal
2026/283 (PDF ) Malicious Security Comes Free in SPDZ Junru Li, Yifan Song
2026/282 (PDF ) Unforgeable Watermarks for Language Models via Robust Signatures Huijia Lin, Kameron Shahabi, Min Jae Song
2026/281 (PDF ) Do Androids Dream of a Dead Internet: Interactive Watermarks for Bot Detection Brennon Brimhall, Harry Eldridge, Maurice Shih, Ian Miers, Matthew Green
2026/280 (PDF ) Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher
2026/279 (PDF ) On the Concrete Hardness Gap Between MLWE and LWE Tabitha Ogilvie
2026/278 (PDF ) Exploiting PDF Obfuscation in LLMs, arXiv, and More Zhongtang Luo, Jianting Zhang, Zheng Zhong
2026/277 (PDF ) Collusion-Minimized TLS Attestation Protocol for Decentralized Applications Uğur Şen, Murat Osmanoğlu, Oğuz Yayla, Ali Aydın Selçuk, Ali Doğanaksoy
2026/276 (PDF ) On the conversion of module representations for higher dimensional supersingular isogenies Aurel Page, Damien Robert, Julien Soumier
2026/275 (PDF ) PhantomCrypt: Second-Order Deniable Encryption with Post-Quantum Security Shahzad Ahmad, Stefan Rass, Zahra Seyedi
2026/274 (PDF ) From linear regression to generative model for explainable non profiled side-channel attacks Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, Gabriel Zaid
2026/273 (PDF ) Weighted Cryptography with Weight-Independent Complexity Aarushi Goel, Swagata Sasmal, Mingyuan Wang
2026/272 (PDF ) On the Complexity of Interactive Arguments Idan Baril, Iftach Haitner
2026/271 (PDF ) Defining Quantum-Secure Message Authentication Ashwin Jha, Mustafa Khairallah, Jannis Leuther, Stefan Lucks
2026/270 (PDF ) Pseudorandomness of Knapsacks over a Number Ring Biswajit Mandal, Shashank Singh
2026/269 (PDF ) Exact Error Analysis for Blind Rotation in Fully Homomorphic Encryption Sin Kim, Seunghwan Lee, Dohyuk Kim, Dong-Joon Shin
2026/268 (PDF ) One Pair to Rule Them All: An Optimal Algorithm for Solving Code Equivalence via Codeword Search Alessandro Budroni, Andre Esser
2026/267 (PDF ) Beyond the Linear Barrier: Secret Sharing for Evolving (Weighted) Threshold Access Structures with Poly-logarithmic Share Size Danilo Francati, Sara Giammusso, Daniele Venturi
2026/266 (PDF ) UltraFold: Efficient Distributed BaseFold from Packed Interleaved Merkle Trees Wenhao Wang, Fan Zhang
2026/265 (PDF ) Catalytic Tree Evaluation From Matching Vectors Alexandra Henzinger, Edward Pyne, Seyoon Ragavan
2026/264 (PDF ) WillowFold: Secure Aggregation with a Lightweight Committee Hossein Hafezi, Kasra Abbaszadeh, Adrià Gascón, Phillipp Schoppmann, Mariana Raykova, Benedikt Bünz
2026/263 (PDF ) Compact and Statistical NIZK Proofs of Knowledge for Disjunctions from $\Sigma$-Protocols Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti
2026/262 (PDF ) Fuzzy Private Set Intersection from Density-Bounded Assumptions Seunghun Paik, Jae Hong Seo
2026/261 (PDF ) Logarithmic-Depth Pseudorandom Functions from Well-Founded Code-Based Assumptions Youlong Ding, Aayush Jain, Ilan Komargodski
2026/260 (PDF ) Investigating the Wedge Map on SNOVA Po-En Tseng, Lih-Chung Wang, Peigen Li, Yen-Liang Kuan
2026/259 (PDF ) Blockchain Stacking Fraud and Deterrence Tong Cao, Man Ho Au, Xiapu Luo
2026/258 (PDF ) Lightning, Field-Agnostic Super-Efficient Polynomial Commitment Scheme Wenjie Qu, Yanpei Guo, Jiaheng Zhang
2026/257 (PDF ) Dishonest-Majority Secure Computation via PIR-Authenticated Multiplication Triples Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
2026/256 (PDF ) Adams Bridge Accelerator: Bridging the Post-Quantum Transition Mojtaba Bisheh-Niasar, Emre Karabulut, Kiran Upadhyayula, Michael Norris, Bharat Pillilli
2026/255 (PDF ) On Compressing Non-Additive Correlations Geoffroy Couteau, Alexander Koch, Nikolas Melissaris, Peter Scholl, Sacha Servan-Schreiber, Xiaxi Ye
2026/254 (PDF ) Key Committing Security of HCTR2, Revisited Donghoon Chang, Yu Long Chen, Yukihito Hiraga, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2026/253 (PDF ) Cryptanalytic Extraction of Deep Neural Networks with Non-Linear Activations Roderick Asselineau, Patrick Derbez, Pierre-Alain Fouque, Brice Minaud
2026/252 (PDF ) At-Compromise Security: The Case for Alert Blindness Martin R. Albrecht, Simone Colombo, Benjamin Dowling, Rikke Bjerg Jensen
2026/251 (PDF ) OpenAC: Open Design for Transparent and Lightweight Anonymous Credentials Liam Eagen, Hy Ngo, Vikas Rushi, Ying Tong, Moven Tsai, Janabel Xia
2026/250 (PDF ) On the Concrete Hardness of LWR with a Power of Two Modulus Jules Baudrin, Rachelle Heim Boissier, François-Xavier Standaert
2026/249 (PDF ) Have Your CKAKE and Eat it, Too: Efficient, Composable KEM-Authenticated Key Exchange Myrto Arapinis, Christopher Battarbee, Mina Doosti
2026/248 (PDF ) Lightweight PQ KEM and Hybrid MQTT Protocol for 8-bit AVR Sensor Nodes Yifan Dong, YoungBeom Kim, Jieyu Zheng, Zhichuang Liang, Boyue Fang, Seog Chung Seo, Maire O'Neill, Yunlei Zhao
2026/247 (PDF ) Efficient Pairing-Based Batch Arguments for NP with a Constant-Size Proof Zhe Jiang, Kai Zhang, Junqing Gong, Haifeng Qian
2026/246 (PDF ) Highly Efficient and Round-Optimal Asymmetric PAKE Zachary Barbanell, Jiayu Xu
2026/245 (PDF ) A note on adversary running times Amit Sahai
2026/244 (PDF ) Revisit Unravelled Linearization with Erhart (quasi-)Polynomial Yansong Feng, Yiming Gao, Honggang Hu, Abderrahmane Nitaj, Yanbin Pan, Mengce Zheng
2026/243 (PDF ) Towards Making Doubly-Efficient PIR Practical Pan Xiao, Heng Zhang, Rending Ouyang, Cong Zhang, Jian Liu, Kui Ren, Chun Chen
2026/242 (PDF ) Neo and SuperNeo: Post-quantum folding with pay-per-bit costs over small fields Wilson Nguyen, Srinath Setty
2026/241 (PDF ) Algebraic Attack on Convolutional Neural Network with Max Pooling Zirui Chen, Shi Tang, Zhengchao Gao, Yongjia Su, Lingyue Qin, Xiaoyang Dong
2026/240 (PDF ) Do not Mix Models: Revisiting Generic Transforms for Committing Authenticated Encryption Kazuhiko Minematsu, Akiko Inoue
2026/239 (PDF ) Optimal Best-of-Both-Worlds Consensus Fatima Elsheimy, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
2026/238 (PDF ) PAC-Private Databases Mayuri Sridhar, Michael A. Noguera, Chaitanyasuma Jain, Kevin Kristensen, Srinivas Devadas, Hanshen Xiao, Xiangyao Yu
2026/237 (PDF ) Exploiting SNOVA’s Structure in the Wedge Product Attack Maxime Bros, Thai Hung Le, Jacob Lichtinger, Brice Minaud, Ray Perlner, Daniel Smith-Tone, Cristian Valenzuela
2026/236 (PDF ) Sharing a Secret Anamorphically: Secret Shares Dressed Up as Signatures Gennaro Avitabile, Vincenzo Botta, Daniele Friolo
2026/235 (PDF ) Optimized Implementations of Keccak, Kyber, and Dilithium on the MSP430 Microcontroller DongHyun Shin, YoungBeom Kim, Ayesha Khalid, Máire O'Neill, Seog Chung Seo
2026/234 (PDF ) When Trying to Catch Cheaters Breaks the MPC: Breaking and Fixing Delayed Consistency Checks in Trident, Fantastic Four, SWIFT, and Quad (Full Version) Andreas Brüggemann, Thomas Schneider
2026/233 (PDF ) FHE for SIMD Arithmetic Logic Units with Amortized $O(1)$ Bootstrapping per Ciphertext Mingyu Gao, Hongren Zheng
2026/232 (PDF ) Collision Attacks on SHA-256 up to 37 Steps with Improved Trail Search Zhuolong Zhang, Muzhou Li, Lei Gao, Meiqin Wang
2026/231 (PDF ) RAGtime-PIANO: Efficient Secure Remote RAG Antonia Januszewicz, Jiachen Zhao, Meng Jiang, Taeho Jung
2026/230 (PDF ) Rule Variant Restrictions for the Tamarin Prover Felix Linker
2026/229 (PDF ) ANIMAGUS: A Provably Secure Accordion Mode of Operation Gülnihal Öztürk, Onur Koçak, Oğuz Yayla
2026/228 (PDF ) SCA-MQDSA: Side-Channel Analysis of Multivariate Digital Signature Implementations N.K. Vishwaajith, Anindya Ganguly, Debranjan Pal, Trevor Yap, Puja Mondal, Suparna Kundu, Sayandeep Saha, Shivam Bhasin, Ingrid Verbauwhede, Angshuman Karmakar
2026/227 (PDF ) Analysis and Vulnerabilities in zkLogin Sofia Celi, Hamed Haddadi, Kyle Den Hartog
2026/226 (PDF ) Round-Optimal Identity-Based Blind Signature from Module Lattice Assumptions Arup Mazumder, Mrittika Nandi, Shashank Singh
2026/225 (PDF ) Solving SIS in any norm via Gaussian sampling Maiara F. Bollauf, Amaury Pouly, Yixin Shen
2026/224 (PDF ) Usage of Mixed Integer Linear Programming in Cryptanalysis of Block Ciphers Halil İbrahim Kaplan
2026/223 (PDF ) Nested MuSig2 Nadav Kohen
2026/222 (PDF ) ITSAKE: an unconditionally secure authenticated key establishment protocol Pierre-Alain Jacqmin, Jean Liénardy
2026/221 (PDF ) Spinel: A Post-Quantum Signature Scheme Based on $\mathrm{SL}_n(\mathbb{F}_p)$ Hashing Asmaa Cherkaoui, Faraz Heravi, Delaram Kahrobaei, Siamak F. Shahandashti
2026/220 (PDF ) Optimizing Differential Privacy in Federated Analytics under Known Input Distributions Ferran Alborch, Andreas Athanasiou, Pascal Reisert
2026/219 (PDF ) $\phi(n)$-evaluation algorithm: a novel approach for an efficient retrieval of Euler's totient of an RSA Modulus Jay Mehta, Hitarth Rana
2026/218 (PDF ) Isochronous Fixed-Weight Sampling in Hardware Adrian Marotzke
2026/217 (PDF ) Cavefish: Communication-Optimal Light Client Protocol for UTxO Ledgers Aggelos Kiayias, Marc Roeschlin, Polina Vinogradova, Pyrros Chaidos
2026/216 (PDF ) ECHO: Efficient Covertly-Secure Three-party Computation with Applications to Private Machine Learning Yufei Duan, Yun Li, Zhicong Huang, Cheng Hong, Tao Wei, Chao Zhang
2026/215 (PDF ) Endomorphisms via splittings Sabrina Kunzweiler, Min-Yi Shen
2026/214 (PDF ) Cavern: Efficient Honest-Majority Maliciously Secure $(2+1)$-PC for $\mathbb{Z}_{2^n}$ via DPF Yang Liu, Liang Feng Zhang
2026/213 (PDF ) Orbit: Optimizing Rescale and Bootstrap Placement with Integer Linear Programming Techniques for Secure Inference Zikai Zhou, William Seo, Edward Chen, Alex Ozdemir, Fraser Brown, Wenting Zheng
2026/212 (PDF ) PANCAKE: A SNARK with Plonkish Constraints, Almost-Free Additions, No Permutation Check, and a Linear-Time Prover Yuxi Xue, Peimin Gao, Xingye Lu, Man Ho Au
2026/211 (PDF ) A Generalized $\chi_n$-Function Cheng Lyu, Mu Yuan, Dabin Zheng, Siwei Sun, Shun Li
2026/210 (PDF ) How to Classically Verify a Quantum Cat without Killing It Yael Tauman Kalai, Dakshita Khurana, Justin Raizes
2026/209 (PDF ) Post-Quantum Security of Block Cipher Constructions Gorjan Alagic, Chen Bai, Christian Majenz, Kaiyan Shi
2026/208 (PDF ) eVer: Universal and Automated Verification of Side-Channel Security for Additive, Inner Product, Polynomial and General Code-Based Masking Marc Gourjon, Maximilian Orlt, Pajam Pauls, Alexander Treff
2026/207 (PDF ) $\mathsf{SoK}$: On Cryptography for Multi-Cloud Storage Dayane Horkos, Ludovic Perret
2026/206 (PDF ) MPSpeed: Implementing and Optimizing MPC-in-the-Head Digital Signatures in Hardware Stelios Manasidis, Quinten Norga, Suparna Kundu, Ingrid Verbauwhede
2026/205 (PDF ) Differential-Linear Attacks from New Distinguishers: the case of SERPENT and PRESENT Thierno Mamoudou Sabaly, Marine Minier
2026/204 (PDF ) Malicious Private Set Union with Two-Sided Output Sihang Pu, Jiahui Gao, Ni Trieu
2026/203 (PDF ) Impossibility of CPAD security for a class of FHE schemes Marina Checri, Pierre-Emmanuel Clet, Marc Renard, Renaud Sirdey
2026/202 (PDF ) ZKBoost: Zero-Knowledge Verifiable Training for XGBoost Nikolas Melissaris, Jiayi Xu, Antigoni Polychroniadou, Akira Takahashi, Chenkai Weng
2026/201 (PDF ) On Lifting AGM Security to AGM with Oblivious Sampling Juraj Belohorec, Pavel Hubáček, Dominik Stejskal
2026/200 (PDF ) Plonk Without Random Oracles Georg Fuchsbauer, Marek Sefranek
2026/199 (PDF ) zkAgent: Verifiable Agent Execution via One-Shot Complete LLM Inference Proof Lizheng Wang, Hancheng Lou, Chongrong Li, Yu Yu, Yuncong Hu
2026/198 (PDF ) ELLMo: Packing- and Depth-Aware Encrypted Transformer Inference Seyda Nur Guzelhan, Lohit Daksha, Carlos Agulló Domingo, Gilbert Jonatan, John Kim, Jose L. Abellan, David Kaeli, Ajay Joshi
2026/197 (PDF ) Efficient Evaluation of Multivariate Polynomials over Structured Subsets of $\mathbb F_q^n$ Vaibhav Dixit, Santanu Sarkar, Fukang Liu, Willi Meier
2026/196 (PDF ) Faster Pseudorandom Correlation Generators via Walsh-Hadamard Transform Zhe Li, Hongqing Liu, Chaoping Xing, Yizhou Yao, Chen Yuan
2026/195 (PDF ) The HyperFrog Cryptosystem: High-Genus Voxel Topology as a Trapdoor for Post-Quantum KEMs Victor Duarte Melo
2026/194 (PDF ) A Unified Hardware Architecture for Stateful and Stateless Hash-Based Key/Signature Generations Yechu Zhang, Yuxuan Chu, Yaodong Wei, Yueqin Dai, Qiu Shen, Jing Tian
2026/193 (PDF ) On the Use of Atkin and Weber Modular Polynomials in Isogeny Proofs of Knowledge Thomas den Hollander, Marzio Mula, Daniel Slamanig, Sebastian A. Spindler
2026/192 (PDF ) Verification Theatre: False Assurance in Formally Verified Cryptographic Libraries Nadim Kobeissi
2026/191 (PDF ) On the Active Security of the PEARL-SCALLOP Group Action Tako Boris Fouotsa, Marc Houben, Gioella Lorenzon, Ryan Rueger, Parsa Tasbihgou
2026/190 (PDF ) Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption Bowen Jiang, Guofeng Tang, Haiyang Xue
2026/189 (PDF ) Shared and leakage free MAYO Paco Azevedo-Oliveira, Jordan Beraud, Pierre Varjabedian
2026/188 (PDF ) A Visit to KAZ Attack: Finding a Minor Flaw and a Simplified Lattice Construction Yongbo Hu, Chen Zhang, Guomiao Zhou
2026/187 (PDF ) Hardness of hinted ISIS from the space-time hardness of lattice problems Martin R. Albrecht, Russell W. F. Lai, Eamonn W. Postlethwaite
2026/186 (PDF ) Bitcoin PIPEs v2 Michel Abdalla, Brent Carmer, Muhammed El Gebali, Handan Kilinc-Alper, Mikhail Komarov, Yaroslav Rebenko, Lev Soukhanov, Erkan Tairi, Elena Tatuzova, Patrick Towa
2026/185 (PDF ) EFFICIENT QUATERNION ALGORITHMS FOR THE DEURING CORRESPONDENCE, AND APPLICATION TO THE EVALUATION OF MODULAR POLYNOMIALS Antonin Leroux
2026/184 (PDF ) Succinct Non-interactive Arguments of Proximity Liyan Chen, Zhengzhong Jin, Daniel Wichs
2026/183 (PDF ) Benchmarking Secure Multiparty Computation Frameworks for Real-World Workloads in Diverse Network Settings Christopher Harth-Kitzerow, Jonas Schiller, Nina Schwanke, Thomas Prantl, Georg Carle
2026/182 (PDF ) Computing in a Safe House: Accountable Universally Composable Asynchronous Secure Distributed Computing Pierre Civit, Daniel Collins, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira, Pouriya Zarbafian
2026/181 (PDF ) Towards Public Tracing: Collaborative Traceable Secret Sharing Pousali Dey, Rittwik Hajra, Subha Kar, Soumit Pal
2026/180 (PDF ) Telling the Story of Chameleon Hash Functions: A 27-Year Review Houssam Derfoufi, Marina Dehez-Clementi, Jean-Christophe DENEUVILLE
2026/179 (PDF ) Nudge: A Private Recommendations Engine Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Dan Boneh
2026/178 (PDF ) Cryptanalytic Extraction of Neural Networks with Various Activation Functions Xiaokang Qi, Hao Lei, Longxiang Wei, Xiaohan Sun, Meiqin Wang
2026/177 (PDF ) A Practical Neighborhood Search Attack on Oracle MLWE Hongxiao Wang, Muhammed F. Esgin, Ron Steinfeld, Markku-Juhani O. Saarinen, Siu-Ming Yiu
2026/176 (PDF ) Differential Pattern Transition: Characterizing the Differential Behavior of AES-like Linear Layers Jianhua Wang, Tao Huang, Siwei Sun, Hailun Yan, Guang Zeng, Shuang Wu
2026/175 (PDF ) Implementable Witness Encryption from Arithmetic Affine Determinant Programs Lev Soukhanov, Yaroslav Rebenko, Muhammad El Gebali, Mikhail Komarov
2026/174 (PDF ) STIP: Efficient and Secure Non-Interactive Transformer Inference via Compact Packing Zihao Wang, Rongmao Chen, Xinwen Gao, Yi Wang, Lin Liu, Zixin Lan, Zhaoyu Wang, Shaojing Fu, Qiong Wang, Xinyi Huang
2026/173 (PDF ) Eidolon: A Practical Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural Networks Asmaa Cherkaoui, Ramón Flores, Delaram Kahrobaei, Richard C. Wilson
2026/172 (PDF ) A Generalized Attack on RSA and Its Variants Mengce Zheng, Abderrahmane Nitaj, Maher Boudabra, Michel Seck, Oumar Niang, Djiby Sow
2026/171 (PDF ) Spectral Theory of Isogeny Graphs and Quantum Sampling of Secure Supersingular Elliptic Curves Maher Mamah, Jake Doliskani, David Jao
2026/170 (PDF ) gcVM: Publicly Auditable MPC via Garbled Circuits with Applications to Private EVM-Compatible Computation Avishay Yana, Meital Levy, Mike Rosulek, Hila Dahari-Garbian
2026/169 (PDF ) New lower bound of the $r$-th order nonlinearity via algebraic immunity Mikhail Lobanov
2026/168 (PDF ) Cryptanalytic Extraction of Recurrent Neural Network Models Longxiang Wei, Hao Lei, Xiaokang Qi, Xiaohan Sun, Lei Gao, Kai Hu, Wei Wang, Meiqin Wang
2026/167 (PDF ) Breaking and Fixing Spoed Yan Jia, Peng Wang, Gang Liu, Lei Hu, Tingting Guo, Shuping Mao
2026/166 (PDF ) Fuzzy Enhanced Private Set Union in Hamming and Minkowski Spaces Qiang Liu, JaeYoung Bae, Hyung Tae Lee, Joon-Woo Lee
2026/165 (PDF ) Secure Montgomery Curves over TMVP-Friendly Primes for High-Performance ECC Murat Cenk, N. Gamze Orhon Kılıç, Halil Kemal Taşkın, Oğuz Yayla
2026/164 (PDF ) Shorter, Tighter, FAESTer: Optimizations and Improved (QROM) Analysis for VOLE-in-the-Head Signatures Carsten Baum, Ward Beullens, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Christian Majenz, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl
2026/163 (PDF ) CommentonTechRxiv preprint 1374260 (DOI: 10.36227/techrxiv.176765338.86836807/v1): “Dimension Padding as a Structural Countermeasure to Linear Inversion in Dual-Public-Key Code-Based Cryptosystems” Mohammad Sadegh Ghorlivandzadeh
2026/162 (PDF ) IFV: Information Flow Verification at the Pre-silicon Stage Utilizing Static-Formal Methodology Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2026/161 (PDF ) Compact and Low Latency First-Order AES Implementations with Low Randomness Feng Zhou, Hua Chen, Limin Fan, Junhuai Yang
2026/160 (PDF ) Leveraging ASIC AI Chips for Homomorphic Encryption Jianming Tong, Tianhao Huang, Jingtian Dang, Leo de Castro, Anirudh Itagi, anupam golder, asra ali, Jeremy Kun, jevin jiang, arvind arvind, G. Edward Suh, Tushar Krishna
2026/159 (PDF ) Dinocchio: Distributed Prover for Ring Arithmetic Katerina Sotiraki, Yunhao Wang, Fan Zhang
2026/158 (PDF ) Setup Protocols for Sender Anonymity Tian Huang, Jiatai Zhang, Megumi Ando
2026/157 (PDF ) In Mid-Stream: Removing the FO-Transform Helps against Leakage but is not Enough Duyên Pay, Thomas Peters, François-Xavier Standaert
2026/156 (PDF ) Hachi: Efficient Lattice-Based Multilinear Polynomial Commitments over Extension Fields Ngoc Khanh Nguyen, George O'Rourke, Jiapeng Zhang
2026/155 (PDF ) Module Learning With Errors and Structured Extrapolated Dihedral Cosets Weiqiang Wen, Jinwei Zheng
2026/154 (PDF ) Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection Fabio Campos, Daniel Hahn, Daniel Könnecke, Marc Stöttinger
2026/153 (PDF ) BOLT: Bootstrapping-Aware Logic Resynthesis and Technology Mapping for Efficient TFHE Circuits Bhuvnesh Chaturvedi, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2026/152 (PDF ) On the Quantum Collision Resistance of HCF Hash Functions Alisée Lafontaine, André Schrottenloher
2026/151 (PDF ) Non-Complete Set Coverings for Higher Order Threshold Implementations Oriol Farràs, Óscar Fidalgo, Carlos Andres Lara-Nino
2026/150 (PDF ) Claiming bounties on small scale Poseidon and Poseidon2 instances using resultant-based algebraic attacks Antoine Bak, Augustin Bariant, Aurélien Boeuf, Maël Hostettler, Guilhem Jazeron
2026/149 (PDF ) Private IP Address Inference in NAT Networks via Off-Path TCP Control-Plane Attack Suraj Sharma, Adityavir Singh, Mahabir Prasad Jhanwar
2026/148 (PDF ) ABBA: Lattice-based Commitments from Commutators Alberto Centelles, Andrew Mendelsohn
2026/147 (PDF ) OptiBridge: A Trustless, Cost-Efficient Bridge Between the Lightning Network and Ethereum Mohsen Minaei, Duc V. Le, Pedro Moreno-Sanchez
2026/146 (PDF ) Feistel Tools: Reprogramming and Query-Recording for QRPs Yu-Hsuan Huang, Andreas Hülsing, Varun Maram, Silvia Ritsch, Abishanka Saha
2026/145 (PDF ) Round-Optimal GUC-Secure Blind Signatures from Minimal Computational and Setup Assumptions Michele Ciampi, Pierpaolo Della Monica, Ivan Visconti
2026/144 (PDF ) Designated-Verifier Dynamic zk-SNARKs with Applications to Dynamic Proofs of Index Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos
2026/143 (PDF ) A Unified Treatment of Reachability and Indistinguishability Properties: First-Order Logic with Overwhelming Truth Gergei Bana, Mitsuhiro Okada
2026/142 (PDF ) „One More Time”: Security of One-time Signature Scheme Using Run-length Encoding Under Two-message Attacks Viktória I. Villányi
2026/141 (PDF ) Minimizing Mempool Dependency in PoW Mining on Blockchain: A Paradigm Shift with Compressed Block Representation for Enhanced Scalability, Decentralization and Security. Gyu Chol Kim
2026/140 (PDF ) On the Necessity of Public Contexts in Hybrid KEMs: A Case Study of X-Wing Taehun Kang, Changmin Lee, Yongha Son
2026/139 (PDF ) Cryptanalytic Extraction of Convolutional Neural Networks Xiaohan Sun, Hao Lei, Longxiang Wei, Xiaokang Qi, Kai Hu, Meiqin Wang, Wei Wang
2026/138 (PDF ) From Arithmetic to Shamir: Secure and Efficient Masking Gadgets for Multiplications - Applications to the Post-Quantum Signature Scheme MQOM Vladimir Sarde, Nicolas Debande, Louis Goubin
2026/137 (PDF ) Hensel-lifting black-box algorithms and fast trace computation for elliptic-curve endomorphisms Lorenz Panny, Damien Robert, Alessandro Sferlazza
2026/136 (PDF ) Private Proofs of When and Where Uma Girish, Grzegorz Gluch, Shafi Goldwasser, Tal Malkin, Leo Orshansky, Henry Yuen
2026/135 (PDF ) Randomness-Recovery Trapdoors: a new methodology for enhancing anamorphic encryption Xuan Thanh Do, Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2026/134 (PDF ) Completing the Chain: Verified Implementations of Hash-Based Signatures and Their Security Manuel Barbosa, François Dupressoir, Rui Fernandes, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2026/133 (PDF ) Homomorphic Signatures : A Systematization of Knowledge Olive Chakraborty
2026/132 (PDF ) Subspace Guessing and Rank-Metric Solvers with Hints Anmoal Porwal, Harrison Banda, Jan Brinkmann, Anna Baumeister, Juliane Krämer, Antonia Wachter-Zeh
2026/131 (PDF ) Root-Cause Analysis of Power Side-Channel Leaks in RISC-V Cryptographic Implementations Asmita Adhikary, Abraham Basurto-Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee
2026/130 (PDF ) Online-Friendly Robust Threshold ECDSA with Constant Amortized Communication Guofeng Tang, Tian Qiu, Bowen Jiang, Haiyang Xue, Meng Hao, Guomin Yang, Robert H. Deng
2026/129 (PDF ) The ideal arithmetic correlations of $N$-ary sequences and related results Feifei Yan, Pinhui Ke, Chenhuang Wu
2026/128 (PDF ) The Impossibility of Post-Quantum Public Indifferentiability for Merkle-Damgard Akinori Hosoyamada
2026/127 (PDF ) Toward Verifiable Privacy in Decentralized Identity: A Formal Framework for Minimal Disclosure and Unlinkability Yu Zhang, Zongbin Wang
2026/126 (PDF ) Censorship Resistance vs Throughput in Multi-Proposer BFT Protocols Fatima Elsheimy, Ioannis Kaklamanis, Sarisht Wadhwa, Charalampos Papamanthou, Fan Zhang
2026/125 (PDF ) StarFortress: Hybrid KEMs with Diffie-Hellman Inlining Deirdre Connolly, Paul Grubbs
2026/124 (PDF ) Generalization of the Class Elimination Attack to Block Ciphers Osmani Tito-Corrioso
2026/123 (PDF ) Masking Out of Order: Side-Channel Leaks from Software-Masked Cryptography on Out-of-Order Processors Eden Desmet, Suparna Kundu, Ingrid Verbauwhede
2026/122 (PDF ) The Motte-and-Bailey Framework for Leakage-Resilient Accordion Modes: Featuring Qaitbay and Alicante Mario Marhuenda Beltrán, Mustafa Khairallah
2026/121 (PDF ) Integrating Boomerang into TAGADA Rocco Brunelli, Marine Minier, Loïc Rouquette
2026/120 (PDF ) Equivalent computational problems for superspecial abelian surfaces Mickaël Montessinos
2026/119 (PDF ) Re2creds: Reusable Anonymous Credentials from Malleable NIZK and Legacy Signatures Bin Xie, Tianyu Zheng, Rui Song, Shang Gao, Bin Xiao
2026/118 (PDF ) Practical Subvector Commitments with Optimal Opening Complexity Matteo Campanelli
2026/117 (PDF ) Faultless Key Recovery: Iteration-Skip and Loop-Abort Fault Attacks on LESS Xiao Huang, Zhuo Huang, Yituo He, Quan Yuan, Chao Sun, Mehdi Tibouchi, Yu Yu
2026/116 (PDF ) Generating Falcon Trapdoors via Gibbs Sampler Chao Sun, Thomas Espitau, Junjie Song, Jinguang Han, Mehdi Tibouchi
2026/115 (PDF ) Functional Decomposition of Multivariate Polynomials: Revisit and New Improvements Dong-Jie Guo, Qun-Xiong Zheng, Zhong-Xiao Wang, Xiao-Xin Zhao
2026/114 (PDF ) Chasing Rabbits Through Hypercubes: Better algorithms for higher dimensional 2-isogeny computations Pierrick Dartois, Max Duparc
2026/113 (PDF ) How to Steal Oblivious Transfer from Minicrypt Cruz Barnum, David Heath
2026/112 (PDF ) PETCHA: Post-quantum Efficient Transciphering with ChaCha Antonio Guimarães, Gabriela M. Jacob, Hilder V. L. Pereira
2026/111 (PDF ) Structured Matrix Constraint Systems for Architecture-Hiding Succinct Zero-Knowledge Proofs for Neural Networks Mingshu Cong, Sherman S. M. Chow, Tsz Hon Yuen, Siu-Ming Yiu
2026/110 (PDF ) Logarithmic density of rank $\geq1$ and $\geq2$ genus-2 Jacobians and applications to hyperelliptic curve cryptography Razvan Barbulescu, Mugurel Barcau, Vicentiu Pasol, George Turcas
2026/109 (PDF ) Concretely Efficient Blind Signatures Based on VOLE-in-the-Head Proofs and the MAYO Trapdoor Carsten Baum, Marvin Beckmann, Ward Beullens, Shibam Mukherjee, Christian Rechberger
2026/108 (PDF ) Extending RISC-V to Support Flexible-Radix Multiply-Accumulate Operations Isaar Ahmad, Hao Cheng, Johann Großschädl, Daniel Page
2026/107 (PDF ) Verified non-recursive calculation of Beneš networks applied to Classic McEliece Wrenna Robson, Samuel Kelly
2026/106 (PDF ) New Quantum Circuits for ECDLP: Breaking Prime Elliptic Curve Cryptography in Minutes Hyunji Kim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay
2026/105 (PDF ) Privacy-Preserving LLM Inference in Practice: A Comparative Survey of Techniques, Trade-Offs, and Deployability Davide Andreoletti, Alessandro Rudi, Emanuele Carpanzano, Francesco Lelli, Tiziano Leidi
2026/104 (PDF ) Deal out oblivious correlations: 2-depth HSS circuit for silent V-OLE generation Davide Cerutti, Stelvio Cimato
2026/103 (PDF ) When Only Parts Matter: Efficient Privacy-Preserving Analytics with Fully Homomorphic Encryption Alexandros Bakas, Dimitrios Schoinianakis
2026/102 (PDF ) Secure Computation for Fixed-point and Floating-point Arithmetic Tianpei Lu, Bingsheng Zhang, Yuyang Feng, Kui Ren
2026/101 (PDF ) Analysis and Attacks on the Reputation System of Nym Xinmu Alexis Cao, Matthew Green
2026/100 (PDF ) BREAKMEIFYOUCAN!: Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies Nathan Nye, Philippe Teuwen, Tiernan Messmer, Steven Mauch, Struan Clark, Zinong Li, Zachary Weiss, Lucifer Voeltner
2026/099 (PDF ) Arithmetic autocorrelation of binary half-$\ell$-sequences with connection integer $p^{r}q^{s}$ Feifei Yan, Pinhui Ke
2026/098 (PDF ) Structured Module Lattice-based Cryptography Joppe W. Bos, Joost Renes, Frederik Vercauteren, Peng Wang
2026/097 (PDF ) Secret-Subspace Recovery in MAYO via Linearization of Errors from a Single Fault Alberto Marcos
2026/096 (PDF ) Revisiting the Concrete Security of Falcon-type Signatures Huiwen Jia, Shiduo Zhang, Yang Yu, Chunming Tang
2026/095 (PDF ) Tropical cryptography IV: Digital signatures and secret sharing with arbitrary access structure Dima Grigoriev, Chris Monico, Vladimir Shpilrain
2026/094 (PDF ) Hardware-Friendly Robust Threshold ECDSA in an Asymmetric Model Hankyung Ko, Seunghwa Lee, Sookyung Eom, Sunghyun Jo
2026/093 (PDF ) Optimized Implementation of ML-KEM on ARMv9-A with SVE2 and SME Hanyu Wei, Wenqian Li, Shiyu Shen, Hao Yang, Yunlei Zhao
2026/092 (PDF ) Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks Ailsa Robertson, Christian Schaffner, Sebastian R. Verschoor
2026/091 (PDF ) Round-Optimal Pairing-Free Blind Signatures Julia Kastner, Stefano Tessaro, Greg Zaverucha
2026/090 (PDF ) On the Impossibility of Round-Optimal Pairing-Free Blind Signatures in the ROM Marian Dietz, Julia Kastner, Stefano Tessaro
2026/089 (PDF ) The Billion Dollar Merkle Tree Thomas Coratger, Dmitry Khovratovich, Bart Mennink, Benedikt Wagner
2026/088 (PDF ) BLISK: Boolean circuit Logic Integrated into the Single Key Oleksandr Kurbatov, Yevhen Hrubiian, Illia Melnyk, Lasha Antadze
2026/087 (PDF ) Augmenting BBS with Conventional Signatures Sietse Ringers
2026/086 (PDF ) 2PC Memory-Manipulating Programs with Constant Overhead David Heath
2026/085 (PDF ) Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-based Key Derivation Yu Long Chen, Yukihito Hiraga, Nicky Mouha, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2026/084 (PDF ) Combined Indistinguishability Analysis - Verifying random probing leakage under random faults Armand Schinkel, Pascal Sasdrich
2026/083 (PDF ) Tag-Friendly Lattice Sampler and Applications Corentin Jeudy, Olivier Sanders
2026/082 (PDF ) Rank Syndrome Decoding Estimator - An Asymptotic and Concrete Analysis Andre Esser, Javier Verbel, Ricardo Villanueva-Polanco
2026/081 (PDF ) HYPERSHIELD: Protecting the Hypercube MPC-in-the-Head Framework Against Differential Probing Adversaries without Masking Linda Pirker, Quinten Norga, Suparna Kundu, Anindya Ganguly, Barry van Leeuwen, Angshuman Karmakar, Ingrid Verbauwhede
2026/080 (PDF ) SoK: Outsourced Private Set Intersection Sophie Hawkes, Christian Weinert
2026/079 (PDF ) Uniform Sharing in Multiple Stages: NullFresh for Arbitrary Functions Artemii Ovchinnikov, Aein Rezaei Shahmirzadi, Siemen Dhooghe
2026/078 (PDF ) Breaking the Myth of MPCitH Inefficiency: Optimizing MQOM for Embedded Platforms Ryad Benadjila, Thibauld Feneuil
2026/077 (PDF ) Formalizing Privacy in Decentralized Identity: A Provably Secure Framework with Minimal Disclosure Yu Zhang, Zongbin Wang
2026/076 (PDF ) Lether: Practical Post-Quantum Account-Based Private Blockchain Payments Hongxiao Wang, Muhammed F. Esgin, Ron Steinfeld, Siu-Ming Yiu
2026/075 (PDF ) From $\textsf{TS-SUF-2}$ to $\textsf{TS-SUF-4}$: Practical Security Enhancements for $\textsf{FROST2}$ Threshold Signatures Syh-Yuan Tan, Will Wang, Ryan Chow
2026/074 (PDF ) Noisette: Certifying Differential Privacy Mechanisms Efficiently Qi Pang, Radhika Garg, Ziling Liu, Hanshen Xiao, Virginia Smith, Wenting Zheng, Xiao Wang
2026/073 (PDF ) zkRNN: Zero-Knowledge Proofs for Recurrent Neural Network Inference Fatemeh Zarinjouei, Behzad Abdolmaleki, Maryam Zarezadeh, Bhavish Mohee, Aysajan Abidin, Stefan Köpsell
2026/072 (PDF ) Scalable Distributed Key Generation for Blockchains Aniket Kate, Pratyay Mukherjee, Pratik Sarkar, Hamza Saleem, Nibesh Shrestha, David Yang
2026/071 (PDF ) Single-Trace Message Recovery in HQC via RS Post-Decoding and FO Re-Encryption Jaeho Jeon, Donghyen Kim, Suseong Lee, Young-Sik Kim
2026/070 (PDF ) Unlocking the True Potential of Decryption Failure Oracles: A Hybrid Adaptive-LDPC Attack on ML-KEM Using Imperfect Oracles Qian Guo, Denis Nabokov, Thomas Johansson
2026/069 (PDF ) qFALL – Rapid Prototyping of Lattice-based Cryptography Marvin Beckmann, Phil Milewski, Laurens Porzenheim, Marcel Luca Schmidt, Jan Niklas Siemer
2026/068 (PDF ) Revisiting Polynomial NTRU for FHE: Amortized Bootstrapping with Sparse Keys Wun-Ting Lin, Ja-Ling Wu
2026/067 (PDF ) MALeak: Blind Side-Channel Key Recovery Exploiting Modular Addition Leakage in ARX-based Block Ciphers Inhun Lee, GyuSang Kim, Seokhie Hong, HeeSeok Kim
2026/066 (PDF ) Complete Characterization of Randomness Extraction from DAG-Correlated Sources Divesh Aggarwal, Zihan Li, Saswata Mukherjee, Maciej Obremski, João Ribeiro
2026/065 (PDF ) BABE: Verifying Proofs on Bitcoin Made 1000x Cheaper Sanjam Garg, Dimitris Kolonelos, Mikhail Sergeevitch, Srivatsan Sridhar, David Tse
2026/064 (PDF ) Breaking the KAZ Suite: Practical Key Recovery Attacks on MySEAL 2.0’s Post-Quantum Candidates Zhuo Huang, Chongrong Li, Yu Yu, Xiaogang Zhou
2026/063 (PDF ) Policy-based Access Tokens: Privacy-Preserving Verification for Digital Identity Kiran Pun, Daniel Gardham, Nick Frymann
2026/062 (PDF ) (Fine-Grained) Unbounded Inner-Product Functional Encryption from LWE Valerio Cini, Erkan Tairi
2026/061 (PDF ) $L$ for the Price of One: On the Benefits of Using more than $t+1$ Parties in Threshold Signing Daniel Escudero, Yashvanth Kondi, Yifan Song, Hernán Vanegas
2026/060 (PDF ) Blind Adaptor Signatures, Revisited: Stronger Security Definitions and Their Construction toward Practical Applications Masashi Hisai, Naoto Yanai
2026/059 (PDF ) Heli: Heavy-Light Private Aggregation Ryan Lehmkuhl, Henry Corrigan-Gibbs, Emma Dauterman, David J. Wu
2026/058 (PDF ) Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, Kenneth G. Paterson
2026/057 (PDF ) Timed Commitments and Timed Encryption: Generic Constructions and Instantiations from Isogenies Mingjie Chen, Jonas Meers
2026/056 (PDF ) Rejection Matters: Efficient Non-Profiling Side-Channel Attack on ML-DSA via Exploiting Public Templates Yuhan Zhao, Wei Cheng, Zehua Qiao, Yuejun Liu, Yongbin Zhou
2026/055 (PDF ) RotorCipher: A Modern Approach to Rotor Ciphers Using Sponge Functions and Modular Arithmetic Edimar Veríssimo da Silva
2026/054 (PDF ) Communication and Storage-Friendly Bidirectional Multi-hop CPA Secure Proxy Re-encryption from Supersingular Isogenies Manas Jana, Ratna Dutta, Sourav Mukhopadhyay
2026/053 (PDF ) Kilobyte-Bandwidth Subliminal Channels in FIPS 204 ML-DSA via Packed-Commitment Embedding Mounir IDRASSI
2026/052 (PDF ) Key Updatable Hash Based VRF Suman Ghosh, Ratna Dutta, Sourav Mukhopadhyay
2026/051 (PDF ) An improved random AKS-class primality proving algorithm Haining Fan
2026/050 (PDF ) Low-Latency Low-Randomness OPINI Gadgets and Their Formal Verification Lixuan Wu, Yanhong Fan, Guowei Liu, Chaoran Wang, Meiqin Wang
2026/049 (PDF ) Argo MAC: Garbling with Elliptic Curve MACs Liam Eagen, Ying Tong Lai
2026/048 (PDF ) Masked Solving of Linear Equations System and Application to UOV Signatures Jean-Sébastien Coron, François Gérard, Bowen Zhang
2026/047 (PDF ) SoK of Private Deep Neural Network Inference with Approximate Fully Homomorphic Encryption Zaira Pindado, Thomas Spendlhofer, Mohamed Allam, Priyam Mehta, Lena Martens, Antonio J. Peña
2026/046 (PDF ) Euston: Efficient and User-Friendly Secure Transformer Inference with Non-Interactivity Xinwen Gao, Shaojing Fu, Lin Liu, Zhuotao Liu, Yuchuan Luo, Yongjun Wang
2026/045 (PDF ) Formalizing Privacy-Enhanced Whitelists: A Secure Framework with Hidden Policies Yu Zhang, Zongbin Wang
2026/044 (PDF ) Jindo: Practical Lattice-Based Polynomial Commitment for Zero-Knowledge Arguments Intak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song
2026/043 (PDF ) Classical Obfuscation of Quantum Circuits via Publicly-Verifiable QFHE James Bartusek, Aparna Gupte, Saachi Mutreja, Omri Shmueli
2026/042 (PDF ) Fully Secure DKG Protocols for Discrete Logarithm Revisited Karim Baghery, Hossein Moghaddas
2026/041 (PDF ) Towards Privacy-Preserving Unmanned Aerial Vehicles Shared Logistics via Dynamic Sanitizable Signature with Multiple Sanitizers Mingwei Zeng, Qingyang Zhang, Jie Cui, Hong Zhong, Fengqun Wang
2026/040 (PDF ) Efficient Polynomial Evaluation over Structured Space and Application to Polynomial Method Fukang Liu, Vaibhav Dixit, Daisuke Yamamoto, Wakaha Ogata, Santanu Sarkar, Willi Meier
2026/039 (PDF ) Abelian surfaces in Hesse form and explicit isogeny formulas Thomas Decru, Sabrina Kunzweiler
2026/038 (PDF ) Scalable Honest-majority MPC for Machine Learning from Mixed Secret Sharings Meilin Li, Meng Hao, Yu Chen
2026/037 (PDF ) On those Boolean functions having only one Walsh zero Claude Carlet, Pierrick Méaux, Marek Broll
2026/036 (PDF ) AKE Protocol Combining PQC and QKD Loïc Ferreira
2026/035 (PDF ) Adaptive NIKE for Unbounded Parties Shafik Nassar, Brent Waters
2026/034 (PDF ) Benchmarking of the Amortized Post Quantum Combiner for MLS Britta Hale, Xisen Tian, Lee Wang
2026/033 (PDF ) Faster Short Pairing-Based NIZK Proofs for Ring LWE Ciphertexts Olivier Bernard, Sarah Elkazdadi, Benoit Libert, Arthur Meyre, Jean-Baptiste Orfila, Nicolas Sarlin
2026/032 (PDF ) The Algebraic Isogeny Model: A General Model with Applications to SQIsign and Key Exchanges Marius A. Aardal, Andrea Basso, Doreen Riepel
2026/031 (PDF ) On Threshold Fully Homomorphic Encryption with Synchronized Decryptors François Colin de Verdière, Alain Passelègue, Damien Stehlé
2026/030 (PDF ) Incremental Single-Server Private Information Retrieval Pengfei Lu, Guangwu Xu, Zengpeng Li, Mei Wang, Haoyu Cui
2026/029 (PDF ) Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu
2026/028 (PDF ) On the design of Survivable Distributed Passwordless Authentication and Single Sign-On Luca Ferretti, Federico Magnanini, Mauro Andreolini, Mattia Trabucco, Michele Colajanni
2026/027 (PDF ) Practical SNARGs for Matrix Multiplications over Encrypted Data Louis Tremblay Thibault, Michael Walter, Jiapeng Zhang
2026/026 (PDF ) A General Randomness Reuse Framework for First-Order Secure Masking and Applications on AES Design Using Randomness Solely for Input Encoding Junhuai Yang, Feng Zhou, Hua Chen, Limin Fan
2026/025 (PDF ) JAGUAR: Efficient and Secure Unbalanced PSI under Malicious Adversaries in the Client-Server Setting Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Qiang Liu, Tingyu Fan
2026/022 (PDF ) FABS: Fast Attribute-Based Signatures Liqun Chen, Long Meng, Yalan Wang, Nada El Kassem, Christopher JP Newton, Yangguang Tian, Jodie Knapp, Constantin Catalin Dragan, Daniel Gardham, Mark Manulis
2026/021 (PDF ) IND-CCA Lattice Threshold KEM under 30 KiB Katharina Boudgoust, Oleksandra Lapiha, Rafaël del Pino, Thomas Prest
2026/020 (PDF ) HIC is all you need: Practical Post-Quantum Password-Authenticated Public Key Encryption Afonso Arriaga, David Mestel, Jan Oupický, Peter Browne Rønne, Marjan Škrobot
2026/019 (PDF ) Subversion-resilient Key-exchange in the Post-quantum World Kévin Duverger, Pierre-Alain Fouque, Charlie Jacomme, Guilhem Niot, Cristina Onete
2026/018 (PDF ) Multi-Instance Unrecoverability of iMHF-Based Password Hashing Charles Dodd, Pooya Farshim, Siamak F. Shahandashti, Karl Southern
2026/017 (PDF ) Grover-Based Quantum Attack on Atom Sumanta Chakraborty, SK Hafizul Islam
2026/016 (PDF ) Aborting Random Oracles: How to Build them, How to Use them Gottfried Herold, Dmitry Khovratovich, Mikhail Kudinov, Stefano Tessaro, Benedikt Wagner
2026/015 (PDF ) Qurrency: a quantum-secure, private, and auditable platform for digital assets Arka Rai Choudhuri, Sanjam Garg, Matthew Gregoire, Keewoo Lee, Mike Lodder, Hart Montgomery, Guru Vamsi Policharla, Jim Zhang
2026/014 (PDF ) Accelerating HQC with Additive FFT Ming-Shing Chen, Chun-Ming Chiu, Chun-Tao Peng, Bo-Yin Yang
2026/013 (PDF ) Efficient Threshold ML-DSA Sofía Celi, Rafaël del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2026/012 (PDF ) HIGH: Harnessing GPU Parallelism for Optimized HQC Performance Jiankuo Dong, Yuze Hou, Shiqin Wang, Letian Sha, Fu Xiao, Zhenjiang Dong, Jingqiang Lin
2026/010 (PDF ) Third-Party Moderation of Abuse Reports for End-to-End Encrypted Messaging with Multiple Moderators Matthew Gregoire, Gabriel Schell, Saba Eskandarian
2026/009 (PDF ) SIR: A Sparse-Interaction Keystream Generator with a Hardware-Oriented Architecture W.A. Susantha Wijesinghe
2026/008 (PDF ) A SNARK for (Non-)Subsequences with Text-Sub-Linear Proving Time Dario Fiore, San Ling, Khai Hanh Tang, Hong Hanh Tran, Huaxiong Wang, Yingfei Yan
2026/007 (PDF ) A Certified Framework for Deterministic Navigation in Higher-Genus p-Isogeny Graphs Hung T. Dang
2026/006 (PDF ) SNARGs for NP and Non-Signaling PCPs, Revisited Lalita Devadas, Samuel B. Hopkins, Yael Tauman Kalai, Pravesh K. Kothari, Alex Lombardi, Surya Mathialagan
2026/005 (PDF ) Impersonating Quantum Secrets over Classical Channels Luowen Qian, Mark Zhandry
2026/004 (PDF ) TSM+ and OTSM - Correct Application of Time Sharing Masking in Round-Based Designs Hemin Rahimi, Amir Moradi
2026/003 (PDF ) Batch Arguments with Optimal Communication Nico Döttling, Giulio Malavolta, Omer Paneth
2026/002 (PDF ) LatORAM: ORAMs from Lateral Stashes and Delayed Shuffling Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2026/001 (PDF ) The Cokernel Pairing Krijn Reijnders
[ Cryptology ePrint archive ]