Silva rerum de cifris et clavibus

Aggregierte kryptologische Fachnachrichten der letzten 90 Tage | Stand: 19.04.2026 12:00
HackerNoon - Cryptography | 16.04.2026

Post-Quantum ZK Is an Architecture Problem, Not a Parameter Problem

IACR ePrint Archive | 15.04.2026

How to Authenticate a Non-Deterministic Computation: Shift-Hiding Functions, Compressed LWE Sampling, Broadcast Encryption, and Obfuscation

IACR ePrint Archive | 15.04.2026

Fully Adaptive Threshold Blind Signature Without AGM

IACR ePrint Archive | 15.04.2026

Additive FFTs for HQC on ARM Cortex-M4, Revisited

IACR ePrint Archive | 15.04.2026

SPoCK: Sequential Proofs of Complete Knowledge

IACR ePrint Archive | 15.04.2026

Blind Verifiable Delay Functions

IACR ePrint Archive | 15.04.2026

Compact Fully Asynchronous Updatable Public Key Encryption Scheme from Hamming Quasi-Cyclic Cryptosystem

IACR ePrint Archive | 15.04.2026

CLAASP-MP: An Automated MILP Framework for Monomial Prediction

HackerNoon - Cryptography | 15.04.2026

Google’s Quantum Bitcoin Threat Is Real, But Not Here Yet

IACR ePrint Archive | 15.04.2026

Assessing Geometric Security of AES Neural Realizations: Linear-Time Key Recovery via Neural Leakage

IACR ePrint Archive | 15.04.2026

Explicit Bounds on the Existence Probability of Random Multivariate Quadratic Systems over Finite Fields

Heise Security | 15.04.2026

OpenSSL 4.0 verschlüsselt, was TLS bisher verraten hat

IACR ePrint Archive | 14.04.2026

Faster Logical Operations from Discrete CKKS

IACR ePrint Archive | 14.04.2026

SecDTD: Dynamic Token Drop for Secure Transformers Inference

IACR ePrint Archive | 14.04.2026

Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption

IACR ePrint Archive | 14.04.2026

Code-based Scalable Collaborative SNARKs

IACR ePrint Archive | 14.04.2026

MAGNET: MAsked Gaussian Now Efficient and Table-less

IACR ePrint Archive | 14.04.2026

Automated formal analysis of Signal’s Double Ratchet: attacks, fixes and security proofs

IACR ePrint Archive | 14.04.2026

Bitsliced Segment-Based Search Technique for Low-Depth and Hardware-Efficient S-Box Circuits

IACR ePrint Archive | 14.04.2026

The Cost of Fluidity: Communication Complexity Trade-offs in Fluid MPC

IACR ePrint Archive | 14.04.2026

Decomposition of Large Look-Up Tables for Fast Homomorphic Evaluation

IACR ePrint Archive | 14.04.2026

Hint-Free Multi-Signatures

arXiv Cryptography (cs.CR) | 14.04.2026

Neural Stringology Based Cryptanalysis of EChaCha20

IACR ePrint Archive | 13.04.2026

(Mis)using the Lattice Isomorphism Problem. Cryptanalysis of the double-LIP and Construction of LIP-Based Blind Signatures

IACR ePrint Archive | 13.04.2026

Improving LatticeFold+ with ℓ2-norm Checks

IACR ePrint Archive | 13.04.2026

ABRA-CAPA-DABRA: Full break of CAPA

IACR ePrint Archive | 13.04.2026

Polynomial-Time Cryptanalytic Extraction of Graph Neural Networks in the Hard-Label Setting

IACR ePrint Archive | 13.04.2026

Zero-Knowledge Proof of Progress: Secure Multi-Phase Capture-the-Flag Competitions

IACR ePrint Archive | 13.04.2026

Scalable Registration-Based Encryption from Lattices

arXiv Cryptography (cs.CR) | 13.04.2026

GPU Acceleration of Sparse Fully Homomorphic Encrypted DNNs

arXiv Cryptography (cs.CR) | 13.04.2026

Hardware-Efficient Compound IC Protection with Lightweight Cryptography

arXiv Cryptography (cs.CR) | 13.04.2026

Evaluating Lightweight Block Cipher Payload Encryption for Real-Time CAN Traffic

IACR ePrint Archive | 12.04.2026

Chorus: Secret Recovery with Ephemeral Client Committees

IACR ePrint Archive | 12.04.2026

$\mathsf{Veloz}$: Efficient and Flexible Distribution Framework for Code-Based Polynomial Commitment Scheme

IACR ePrint Archive | 12.04.2026

How to construct even faster and indifferentiable hash functions from random permutations

IACR ePrint Archive | 12.04.2026

Public Key Encryption from High-Corruption Constraint Satisfaction Problems

arXiv Cryptography (cs.CR) | 12.04.2026

Public Key Encryption from High-Corruption Constraint Satisfaction Problems

IACR ePrint Archive | 11.04.2026

Drop-In Masked Modular Reduction for ML-DSA: Cutting Side-Channel Cost in the Root-of-Trust

IACR ePrint Archive | 11.04.2026

Optimizing and Implementing Threshold MAYO

IACR ePrint Archive | 11.04.2026

zkRAG: Efficiently Proving RAG Retrieval in Zero Knowledge

IACR ePrint Archive | 11.04.2026

Block Circulant Codes for Ethereum PeerDAS

arXiv Cryptography (cs.CR) | 11.04.2026

EncFormer: Secure and Efficient Transformer Inference over Encrypted Data

IACR ePrint Archive | 10.04.2026

Alternating Sponge: A Low-Memory Hash Function with Beyond-Birthday-Bound Security

IACR ePrint Archive | 10.04.2026

Improved Cryptanalysis of the Permuted Kernel Problem with Applications to PERK v2.2.0, SUSHSYFISH and PKP-DSS

IACR ePrint Archive | 10.04.2026

Cross-Paradigm Models of Restricted Syndrome Decoding with Application to CROSS

IACR ePrint Archive | 10.04.2026

Fast Isogeny Evaluation on Binary Curves

IACR ePrint Archive | 10.04.2026

Quick Draw Queries: Lightweight Searchable Public-key Ciphertexts with Hidden Structures via Non-Interactive Key Exchange

arXiv Cryptography (cs.CR) | 10.04.2026

Cross-Paradigm Models of Restricted Syndrome Decoding with Application to CROSS

arXiv Cryptography (cs.CR) | 10.04.2026

Stringology-Based Cryptanalysis for EChaCha20 Stream Cipher

IACR ePrint Archive | 09.04.2026

Boolean Arithmetic over $\mathbb{F}_2$ from Group Commutators

IACR ePrint Archive | 09.04.2026

GRAFHEN is not IND-CPA secure

IACR ePrint Archive | 09.04.2026

HAWK with Hint: Algebraic Key Recovery from Side-Channel Leakage

IACR ePrint Archive | 09.04.2026

Entropy-based Fuzzy Deduplication with Perfect Resistance to Key Recovery Attack

IACR ePrint Archive | 09.04.2026

Post-Quantum Secure k-Times Traceable Ring Signature

IACR ePrint Archive | 08.04.2026

A Key Schedule Design and Evaluation under Boundary Round-Key Leakage

Heise Security | 09.04.2026

Cloudflare will bis 2029 vollständig quantensicher sein

arXiv Cryptography (cs.CR) | 09.04.2026

Post-Quantum Cryptographic Analysis of Message Transformations Across the Network Stack

arXiv Cryptography (cs.CR) | 09.04.2026

BRASP: Boolean Range Queries over Encrypted Spatial Data with Access and Search Pattern Privacy

arXiv Cryptography (cs.CR) | 09.04.2026

Anamorphic Encryption with CCA Security: A Standard Model Construction

arXiv Cryptography (cs.CR) | 09.04.2026

Post-Quantum Cryptography-Based Bidirectional Authentication Key Exchange Protocol and Industry Applications: A Case Study of Instant Messaging

IACR ePrint Archive | 08.04.2026

2G2T: Constant-Size, Statistically Sound MSM Outsourcing

IACR ePrint Archive | 08.04.2026

Proximity Signatures

IACR ePrint Archive | 08.04.2026

Breaking Optimized HQC: The First Cache-Timing Full Decryption Oracle Key-Recovery Attack in Post-Quantum Cryptography

IACR ePrint Archive | 08.04.2026

Efficient Partially Blind Signatures from Isogenies

IACR ePrint Archive | 08.04.2026

PipeSC: A Resource-efficient and Pipelined Hardware Accelerator for Sumcheck Protocol

IACR ePrint Archive | 08.04.2026

Multivariate Witness-Hiding Adaptor Signatures

IACR ePrint Archive | 08.04.2026

Evaluating PQC KEMs, Combiners, and Cascade Encryption via Adaptive IND-CPA Testing Using Deep Learning

IACR ePrint Archive | 08.04.2026

Too Far Behind? Narrowing the Gap with a Dual-Enhanced Two-Stage Algebraic Framework for LWE

IACR ePrint Archive | 08.04.2026

High-Throughput Side-Channel-Protected Stream Cipher Hardware for 6G Systems

IACR ePrint Archive | 08.04.2026

Secure MSM Outsourcing Computation for Zero-knowledge Proof Generation

IACR ePrint Archive | 08.04.2026

Efficient e = 3 Threshold RSA via Integer Coordinates for Intel SGX

IACR ePrint Archive | 07.04.2026

Zeal: PIR for Non-Cooperative Databases

arXiv Cryptography (cs.CR) | 08.04.2026

Evaluating PQC KEMs, Combiners, and Cascade Encryption via Adaptive IND-CPA Testing Using Deep Learning

IACR ePrint Archive | 07.04.2026

VEIL: Lightweight Zero-Knowledge for Hash-Based Multilinear Proof Systems

IACR ePrint Archive | 07.04.2026

Witness-Indistinguishable Arguments of Knowledge and One-Way Functions

IACR ePrint Archive | 07.04.2026

The many faces of Schnorr: a touch-up

IACR ePrint Archive | 07.04.2026

Compressed Key Exchange Protocol from Orientations of Large Discriminant Using AVX-512

IACR ePrint Archive | 07.04.2026

Mergeable SNARGs for Trapdoor Languages and Their Applications

IACR ePrint Archive | 07.04.2026

An Efficient Identity-Based Blind Signature Scheme from SM9

IACR ePrint Archive | 06.04.2026

SoK: DeFi Lending and Yield Aggregation Protocol Taxonomy, Empirical Measurements, and Security Challenges

IACR ePrint Archive | 06.04.2026

Efficient Batch Threshold Encryption Using Partial Fraction Techniques

IACR ePrint Archive | 06.04.2026

Efficient Merkle-Tree Consistent Accumulator

IACR ePrint Archive | 06.04.2026

FLOSS: Fast Linear Online Secret-Shared Shuffling

IACR ePrint Archive | 06.04.2026

A note on the Unsuitability of LIGA for Linkable Ring Signatures: The perils of non-commutativity

IACR ePrint Archive | 06.04.2026

Verification Facade: Masquerading Insecure Cryptographic Implementations as Verified Code

IACR ePrint Archive | 06.04.2026

Braess Paradox in Layer-2 Blockchain Payment Networks

IACR ePrint Archive | 06.04.2026

Cryptographic Implications of Worst-Case Hardness of Time-Bounded Kolmogorov Complexity

IACR ePrint Archive | 06.04.2026

Which Privacy Blanket is Optimal in the Shuffle Model?

IACR ePrint Archive | 05.04.2026

Signature Placement in Post-Quantum TLS Certificate Hierarchies: An Experimental Study of ML-DSA and SLH-DSA in TLS 1.3 Authentication

IACR ePrint Archive | 05.04.2026

Applications of Bruhat-Chevalley-Renner Decomposition to Metric-Aware Code-Based Cryptography

Schneier on Security | 06.04.2026

Google Wants to Transition to Post-Quantum Cryptography by 2029

arXiv Cryptography (cs.CR) | 06.04.2026

Cryptanalysis of the Legendre Pseudorandom Function over Extension Fields

arXiv Cryptography (cs.CR) | 06.04.2026

GPU Acceleration of TFHE-Based High-Precision Nonlinear Layers for Encrypted LLM Inference

arXiv Cryptography (cs.CR) | 06.04.2026

GPIR: Enabling Practical Private Information Retrieval with GPUs

arXiv Cryptography (cs.CR) | 06.04.2026

HDP: A Lightweight Cryptographic Protocol for Human Delegation Provenance in Agentic AI Systems

arXiv Cryptography (cs.CR) | 06.04.2026

Lightweight True In-Pixel Encryption with FeFET Enabled Pixel Design for Secure Imaging

arXiv Cryptography (cs.CR) | 06.04.2026

Cryptanalysis of the Legendre Pseudorandom Function over Extension Fields

IACR ePrint Archive | 05.04.2026

Expanders Meet Reed--Muller: Easy Instances of Noisy k-XOR

IACR ePrint Archive | 05.04.2026

Batch Verification of Modified ECDSA Signatures

IACR ePrint Archive | 05.04.2026

Verifiable Divide-and-Conquer

IACR ePrint Archive | 05.04.2026

Pseudorandomness of UFLM: A Characterization via Its Linear Layer

IACR ePrint Archive | 05.04.2026

QED-Lite: Lightweight Detection of Quantum-Vulnerable ELF Binaries via Cryptographic Library Version Fingerprinting

arXiv Cryptography (cs.CR) | 05.04.2026

Search-Bound Proximity Proofs: Binding Encrypted Geographic Search to Zero-Knowledge Verification

IACR ePrint Archive | 04.04.2026

Delegate: Coalition Proof Incentivized Outsourced Computation with Smart Contracts

IACR ePrint Archive | 04.04.2026

Game Theory Does Not Always Help: The Case of Statistical Multi-Party Coin Tossing

IACR ePrint Archive | 04.04.2026

Improved Codes and Decoders for HQC

IACR ePrint Archive | 04.04.2026

Fast and Efficient Perfectly Secure Network-Agnostic Secure Computation

arXiv Cryptography (cs.CR) | 04.04.2026

Partial Number Theoretic Transform Masking in Post Quantum Cryptography Hardware: A Security Margin Analysis

arXiv Cryptography (cs.CR) | 04.04.2026

Explainable PQC: A Layered Interpretive Framework for Post-Quantum Cryptographic Security Assumptions

arXiv Cryptography (cs.CR) | 04.04.2026

CIPHR: Cryptography Inspired IP Protection through Fine-Grain Hardware Redaction

IACR ePrint Archive | 03.04.2026

Tighter Bounds for the Oblivious Bit-Fixing Inner Product Extractor on Biased Seeds

IACR ePrint Archive | 03.04.2026

Random Robust Secret Sharing with Perfect Privacy and its Applications

IACR ePrint Archive | 03.04.2026

Counting and recovering the quadratic relations of a vectorial function

IACR ePrint Archive | 03.04.2026

Robot: Robust Threshold BBS+ in Two Rounds

IACR ePrint Archive | 03.04.2026

A Search-to-Decision Reduction for Continuous LWE

arXiv Cryptography (cs.CR) | 03.04.2026

The Quantum-Cryptographic Co-evolution

arXiv Cryptography (cs.CR) | 03.04.2026

AEGIS: Scaling Long-Sequence Homomorphic Encrypted Transformer Inference via Hybrid Parallelism on Multi-GPU Systems

IACR ePrint Archive | 02.04.2026

Perils of Parallelism: Transaction Fee Mechanisms under Execution Uncertainty

IACR ePrint Archive | 02.04.2026

Synthesis of RTL-based Characterization Programs for Fault Injection

IACR ePrint Archive | 02.04.2026

SSLE-DAG: A High-Throughput Proof-of-Stake Consensus Protocol Combining an Adaptive DAG with a Single Secret Leader Election

IACR ePrint Archive | 02.04.2026

On Optimal Information-Theoretic Security in Symmetric Encryption under Low-Entropy Keys

IACR ePrint Archive | 02.04.2026

Toward Provable Security in Anamorphic Extension: New Constructions and Analysis

IACR ePrint Archive | 02.04.2026

Ordered Multi-Signatures from the DL Assumption

IACR ePrint Archive | 02.04.2026

FOVA: Fast One-Shot Verifiable Aggregation for Federated Learning

arXiv Cryptography (cs.CR) | 02.04.2026

Topology-Hiding Connectivity-Assurance for QKD Inter-Networking

IACR ePrint Archive | 01.04.2026

SoK: The Weakest-Link Principle in Public Key Infrastructures and Modern Mitigation Strategies

IACR ePrint Archive | 01.04.2026

HyperVerITAS: Verifying Image Transformations at Scale on Boolean Hypercubes

IACR ePrint Archive | 01.04.2026

MIKE (Module Isogeny Key Exchange): An ἰχθύς introduction

IACR ePrint Archive | 01.04.2026

Synchronous BFT with Provability and Fast Path for the Age of Blockchains

Security Boulevard - Cryptography | 01.04.2026

Zero-Knowledge Proofs: How to Prove You Know a Secret Without Revealing the Secret

IACR ePrint Archive | 01.04.2026

THED: Threshold Dilithium from FHE

ScienceDaily Encryption News | 01.04.2026

A 200-year-old light trick just transformed quantum encryption

IACR ePrint Archive | 01.04.2026

VeriRAG: Efficient Zero-Knowledge Proofs for Verifiable Retrieval-Augmented Generation

IACR ePrint Archive | 01.04.2026

From LFSRs to LFGs: Periodicity and Structural Transformations in Stream Ciphers

IACR ePrint Archive | 01.04.2026

Low-Stack HAETAE for Memory-Constrained Microcontrollers

IACR ePrint Archive | 01.04.2026

PlasmaBlind: A Private Layer 2 With Instant Client-Side Proving

IACR ePrint Archive | 01.04.2026

Progressive Sieving-Style Information-Set Decoding Algorithm

IACR ePrint Archive | 01.04.2026

A tight security analysis of the FIPS-205 standard (SLH-DSA)

arXiv Cryptography (cs.CR) | 01.04.2026

Quantum-Safe Code Auditing: LLM-Assisted Static Analysis and Quantum-Aware Risk Scoring for Post-Quantum Cryptography Migration

arXiv Cryptography (cs.CR) | 01.04.2026

Lightweight, Practical Encrypted Face Recognition with GPU Support

Schneier on Security | 01.04.2026

A Taxonomy of Cognitive Security

arXiv Cryptography (cs.CR) | 01.04.2026

Lightweight, Practical Encrypted Face Recognition with GPU Support

IACR ePrint Archive | 31.03.2026

Rethinking r-PKP: a New Formulation for the Relaxed Permuted Kernel Problem

IACR ePrint Archive | 31.03.2026

Asymptotic Analysis of Ternary Sparse LWE

IACR ePrint Archive | 31.03.2026

Towards Formal Security Proofs of MQOM

IACR ePrint Archive | 31.03.2026

Fast and Compact Lattice-Based Registration-Based Encryption

IACR ePrint Archive | 31.03.2026

Efficient and Parallel Implementation of Isogeny-based Deterministic Group Actions

Schneier on Security | 31.03.2026

Inventors of Quantum Cryptography Win Turing Award

IACR ePrint Archive | 30.03.2026

Weak-key cryptanalysis of Blink

IACR ePrint Archive | 30.03.2026

Bad Benchmarks and a Fourier-Analytic Framework for Characterizing the (Un)Hideability of Combinational-Logic Circuits

IACR ePrint Archive | 30.03.2026

Locally Computable High Independence Hashing

IACR ePrint Archive | 30.03.2026

Efficient Conflict-Free NTT Hardware Architecture with Single-Port RAMs: Applications to ML-DSA

IACR ePrint Archive | 30.03.2026

AHAB: Asynchronous, High-throughput, Adaptively-secure, Batched Threshold Schnorr Signatures

IACR ePrint Archive | 30.03.2026

Breaking the One-Way Property of a SHA-3 Implementation via Fault Injection: Key Recovery Attacks on Post-Quantum Digital Signatures

IACR ePrint Archive | 30.03.2026

CAGP: A Quantum Canary Address Generation Protocol

arXiv Cryptography (cs.CR) | 30.03.2026

Empowering Mobile Networks Security Resilience by using Post-Quantum Cryptography

arXiv Cryptography (cs.CR) | 30.03.2026

Cryptanalysis of a Lightweight RFID Authentication Protocol Based on a Variable Matrix Encryption Algorithm

HackerNoon - Cryptography | 29.03.2026

The Quantum Threat to RSA, ECC, and Modern Encryption Systems

IACR ePrint Archive | 29.03.2026

On the properties of arithmetic crosscorrelation for sequences with coprime periods

ScienceDaily Encryption News | 29.03.2026

Scientists just found a way to store massive data using light in 3 dimensions

IACR ePrint Archive | 28.03.2026

On the Security of MPC-in-the-Head Signatures with Correlated GGM Trees

IACR ePrint Archive | 28.03.2026

Attacks on Sparse LWE and Sparse LPN with new Sample-Time tradeoffs

IACR ePrint Archive | 27.03.2026

A Comparative Evaluation of DATA and Microwalk for Detecting Constant-Time Violations in Cryptographic Libraries

IACR ePrint Archive | 27.03.2026

Concrete Estimation of Correctness and IND-CPA-D Security for FHE via Rare Event Simulation

IACR ePrint Archive | 27.03.2026

Post-Quantum Blockchains with Agility in Mind

IACR ePrint Archive | 27.03.2026

Can Adaptive Communication Graphs Lower the Bottleneck Complexity of (Secure) Multiparty Computation?

IACR ePrint Archive | 27.03.2026

Refined Approx-SVP Rank Reduction Conditions and Adaptive Lattice Reduction for MSIS Security Estimation

IACR ePrint Archive | 27.03.2026

PD-Net: Learning Device-Invariant Representations for Heterogeneous Cross-Device Side-Channel Attacks

arXiv Cryptography (cs.CR) | 27.03.2026

Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption

arXiv Cryptography (cs.CR) | 27.03.2026

Hidden Elo: Private Matchmaking through Encrypted Rating Systems

arXiv Cryptography (cs.CR) | 27.03.2026

Hermes Seal: Zero-Knowledge Assurance for Autonomous Vehicle Communications

arXiv Cryptography (cs.CR) | 27.03.2026

Hidden Elo: Private Matchmaking through Encrypted Rating Systems

IACR ePrint Archive | 26.03.2026

CatCrypt: From Rust to Cryptographic Security in Lean

IACR ePrint Archive | 26.03.2026

Oblivious SpaceSaving: Heavy-Hitter Detection over Fully Homomorphic Encryption

IACR ePrint Archive | 26.03.2026

Confidential Transfers for Multi-Purpose Tokens on the XRP Ledger

IACR ePrint Archive | 26.03.2026

Cryptanalysis of the Lightweight Stream Cipher RRSC

IACR ePrint Archive | 26.03.2026

Hadal: Centralized Label DP Training without a Trusted Party

IACR ePrint Archive | 26.03.2026

Proving modern code-based dual attacks with second-order techniques

IACR ePrint Archive | 26.03.2026

Triangulating Meet-in-the-Middle Attack

IACR ePrint Archive | 26.03.2026

Efficiency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction

arXiv Cryptography (cs.CR) | 26.03.2026

zk-X509: Privacy-Preserving On-Chain Identity from Legacy PKI via Zero-Knowledge Proofs

IACR ePrint Archive | 25.03.2026

Gryphes: Hybrid Proofs for Modular SNARKs with Applications to zkRollups

IACR ePrint Archive | 25.03.2026

Registration-Optimized Dynamic Group Time-based One-time Passwords for Mobile Access

IACR ePrint Archive | 25.03.2026

Efficient Compilers for Verifiable Dynamic Searchable Symmetric Encryption

IACR ePrint Archive | 25.03.2026

Three-Move Blind Signatures in Pairing-Free Groups

IACR ePrint Archive | 25.03.2026

Performance Analysis of Parameterizable HQC Hardware Architecture

IACR ePrint Archive | 25.03.2026

A Note on HCTR++

IACR ePrint Archive | 24.03.2026

On the Security of Constraint-Friendly Map-to-Curve Relations

IACR ePrint Archive | 24.03.2026

FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme

IACR ePrint Archive | 24.03.2026

Tailored Limb Counts, Faster Arithmetic: Improved TMVP Decompositions for Curve5453 and Curve6071

IACR ePrint Archive | 24.03.2026

Speeding Up Sum-Check Proving (Extended Version)

IACR ePrint Archive | 24.03.2026

Bulletproofs*: Verifier-Efficient Arithmetic Circuit Proofs via Folding

IACR ePrint Archive | 24.03.2026

Format-Preserving Compression-Tolerating Authenticated Encryption for Images

IACR ePrint Archive | 24.03.2026

Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP

ScienceDaily Encryption News | 24.03.2026

Physicists just turned glass into a powerful quantum security device

IACR ePrint Archive | 23.03.2026

PRIVADA: Private user-centric Data Aggregation

arXiv Cryptography (cs.CR) | 23.03.2026

Architecture-Derived CBOMs for Cryptographic Migration: A Security-Aware Architecture Tradeoff Method

arXiv Cryptography (cs.CR) | 23.03.2026

mmFHE: mmWave Sensing with End-to-End Fully Homomorphic Encryption

arXiv Cryptography (cs.CR) | 23.03.2026

Publicly Understandable Electronic Voting: A Non-Cryptographic, End-to-End Verifiable Scheme

arXiv Cryptography (cs.CR) | 23.03.2026

Bridges connecting Encryption Schemes

HackerNoon - Cryptography | 21.03.2026

What Is Threshold Encryption?

arXiv Cryptography (cs.CR) | 21.03.2026

A chaotic flux cipher based on the random cubic family $f_{c_n}(z)=z^3+c_n z$

IACR ePrint Archive | 20.03.2026

TAPAS: Efficient Two-Server Asymmetric Private Aggregation Beyond Prio(+)

IACR ePrint Archive | 20.03.2026

Graph-based Asynchrony with Quasilinear Complexity for Any Linear Verifiable Secret Sharing Scheme

arXiv Cryptography (cs.CR) | 20.03.2026

HQC Post-Quantum Cryptography Decryption with Generalized Minimum-Distance Reed-Solomon Decoder

arXiv Cryptography (cs.CR) | 20.03.2026

TAPAS: Efficient Two-Server Asymmetric Private Aggregation Beyond Prio(+)

arXiv Cryptography (cs.CR) | 20.03.2026

From Precise to Random: A Systematic Differential Fault Analysis of the Lightweight Block Cipher Lilliput

IACR ePrint Archive | 19.03.2026

HARE: Compact HQC via Distance-Informed Erasure Decoding

arXiv Cryptography (cs.CR) | 19.03.2026

Post-Quantum Cryptography from Quantum Stabilizer Decoding

arXiv Cryptography (cs.CR) | 19.03.2026

Towards Verifiable AI with Lightweight Cryptographic Proofs of Inference

arXiv Cryptography (cs.CR) | 19.03.2026

Confidential Databases Without Cryptographic Mappings

IACR ePrint Archive | 18.03.2026

MTSF --- Market-Theoretic Security Framework: A Unified Paradigm For The Art Of Proving and Disproving Security

arXiv Cryptography (cs.CR) | 18.03.2026

Adaptive Fuzzy Logic-Based Steganographic Encryption Framework: A Comprehensive Experimental Evaluation

Journal of Cryptology | 18.03.2026

The Combinatorial Structure and Value Distributions of Plateaued Functions

Journal of Cryptology | 18.03.2026

Correction to: Actively Secure Setup for SPDZ

IACR ePrint Archive | 17.03.2026

VERIDP: Verifiable Differentially Private Training

IACR ePrint Archive | 17.03.2026

Towards Verifiable AI with Lightweight Cryptographic Proofs of Inference

IACR ePrint Archive | 17.03.2026

Ticket to Hide: Private, Practical Proofs of Provenance for TLS

arXiv Cryptography (cs.CR) | 17.03.2026

Synchronized DNA sources for unconditionally secure cryptography

arXiv Cryptography (cs.CR) | 17.03.2026

Ember: A Serverless Peer-to-Peer End-to-End Encrypted Messaging System over an IPv6 Mesh Network

arXiv Cryptography (cs.CR) | 17.03.2026

NANOZK: Layerwise Zero-Knowledge Proofs for Verifiable Large Language Model Inference

IACR ePrint Archive | 16.03.2026

S-two Whitepaper

IACR ePrint Archive | 16.03.2026

SoK: Understanding zkVM: From Research to Practice

arXiv Cryptography (cs.CR) | 16.03.2026

Grant, Verify, Revoke: A User-Centric Pattern for Blockchain Compliance

IACR ToSC | 16.03.2026

Corrigendum to “Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp : Application to Poseidon”

IACR ToSC | 16.03.2026

HILL: Efficient Low-Latency Implementations of Linear Layers via Heuristic Search

IACR ToSC | 16.03.2026

Cryptanalytic Extraction of Neural Networks with Various Activation Functions

IACR ToSC | 16.03.2026

Fourier Analysis of Neural Distinguishers

IACR ToSC | 16.03.2026

Differential Pattern Transition

IACR ToSC | 16.03.2026

Analysis of Diffusion Properties in Generalized Feistel Ciphers Under Multidimensional Linear Cryptanalysis

IACR ToSC | 16.03.2026

Computer-Aided Proof for Extended Generalized Feistel Networks

IACR ToSC | 16.03.2026

Walsh Spectrum Puncturing Revisited: Toward Automated Linear Key Recovery Attacks

IACR ToSC | 16.03.2026

Differential-Linear Cryptanalysis and Cube Attacks on ChiLow

IACR ToSC | 16.03.2026

Cube and Integral Attacks on ChiLow-32

IACR ToSC | 16.03.2026

Weak Tweak-Key Analysis of Blink via Superbox

IACR ToSC | 16.03.2026

A Known-Plaintext Attack with Minimal Data Complexity on 25-Round CRAFT

IACR ToSC | 16.03.2026

Practical Preimage Attack on 5-Round Keccak[r=640, c=160]

IACR ToSC | 16.03.2026

Quantum Truncated Differential Attacks Using Convolutions

IACR ToSC | 16.03.2026

Cryptanalysis of TFHE-Friendly Cipher FRAST

IACR ToSC | 16.03.2026

Cryptanalysis of Two Alternating Moduli Weak PRFs

IACR ToSC | 16.03.2026

Breaking and Fixing MacaKey

IACR ToSC | 16.03.2026

Indifferentiability of the Sponge Hash Family: New Attacks and the Optimal Construction

IACR ToSC | 16.03.2026

Preface to Volume 2026, Issue 1

IACR ToSC | 16.03.2026

Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model

arXiv Cryptography (cs.CR) | 15.03.2026

Governing Dynamic Capabilities: Cryptographic Binding and Reproducibility Verification for AI Agent Tool Use

IACR ePrint Archive | 13.03.2026

Towards Compact UOV-Based MQ Signatures: Rectangular and Lifted Whipping Structures

IACR ePrint Archive | 13.03.2026

zkBSA: Auditable and Compliant Stealth Addresses for Blockchains

arXiv Cryptography (cs.CR) | 13.03.2026

An Ideal Random Number Generator Based on Quantum Fluctuations and Rotating Wheel for Secure Image Encryption

arXiv Cryptography (cs.CR) | 13.03.2026

ExpanderGraph-128: A Novel Graph-Theoretic Block Cipher with Formal Security Analysis and Hardware Implementation

arXiv Cryptography (cs.CR) | 12.03.2026

Unclonable Encryption in the Haar Random Oracle Model

IACR ePrint Archive | 11.03.2026

Bridging Programmability, Efficiency, and Bounded Trust: A Hybrid Privacy-Preserving Smart Contract Framework

IACR ePrint Archive | 10.03.2026

Linear Code Equivalence via Plücker Coordinates

arXiv Cryptography (cs.CR) | 10.03.2026

ACE Runtime - A ZKP-Native Blockchain Runtime with Sub-Second Cryptographic Finality

Journal of Cryptology | 06.03.2026

New Results on Elliptic Curve Hidden Number Problem for ECDH Key Exchange

Journal of Cryptology | 06.03.2026

The Fiat—Shamir Transformation of $$(\varGamma _1,\dots ,\varGamma _\mu )$$-Special-Sound Interactive Proofs

IACR ePrint Archive | 04.03.2026

A flexible and polynomial framework for integer arithmetic in CKKS

Journal of Cryptology | 03.03.2026

New Attacks on Feistel Structures with Improved Memory Complexities

HackerNoon - Cryptography | 02.03.2026

Everything Software Developers Need to Know About Cryptography

IACR ePrint Archive | 02.03.2026

FALCON with message recovery, a specification

IACR ePrint Archive | 02.03.2026

Hermine: An Efficient Lattice-based FROST-like Threshold Signature

Journal of Cryptology | 28.02.2026

Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs

IACR ePrint Archive | 27.02.2026

On the Need for (Quantum) Memory with Short Outputs

IACR ePrint Archive | 26.02.2026

How To Make Delegated Payments on Bitcoin: A Question for the AI Agentic Future

IACR ePrint Archive | 25.02.2026

Fast cube roots in Fp2 via the algebraic torus

IACR ePrint Archive | 23.02.2026

A Modular Approach to Succinct Arguments for QMA

IACR ePrint Archive | 22.02.2026

Cyclo: Lightweight Lattice-based Folding via Partial Range Checks

IACR ePrint Archive | 22.02.2026

Simulating Noisy Leakage with Bounded Leakage: Simpler, Better, Faster

IACR ePrint Archive | 21.02.2026

Migrating Bitcoin and Ethereum Addresses to the Quantum Blockchain Era

ScienceDaily Encryption News | 21.02.2026

Generative AI analyzes medical data faster than human research teams

IACR ePrint Archive | 20.02.2026

Relaxed Modular PCS from Arbitrary PCS and Applications to SNARKs for Integers

IACR ePrint Archive | 20.02.2026

$\mathsf{Spectra}$: Interval-Agnostic Vector Range Argument for Unstructured Range Assertions

IACR ePrint Archive | 20.02.2026

Tripling on Hessian curves via isogeny decomposition

Journal of Cryptology | 20.02.2026

Exponential Sums in Linear Cryptanalysis

Security Boulevard - Cryptography | 19.02.2026

Techstrong Group and DigiCert Announce the Quantum Security 25 Honorees

IACR ePrint Archive | 18.02.2026

GG-GSW: Chosen-Ciphertext Secure Leveled FHE From Gadget Trapdoors

IACR ePrint Archive | 18.02.2026

$\mathsf{TalonG}$: Bandwidth-Efficient Two-Round Threshold Signatures from Lattices

ScienceDaily Encryption News | 17.02.2026

The surprisingly simple flaw that can undermine quantum encryption

IACR ePrint Archive | 13.02.2026

At-Compromise Security: The Case for Alert Blindness

Journal of Cryptology | 10.02.2026

Study of Arithmetization Methods for STARKs

IACR ePrint Archive | 09.02.2026

Post-Quantum Security of Block Cipher Constructions

IACR ePrint Archive | 09.02.2026

Differential-Linear Attacks from New Distinguishers: the case of SERPENT and PRESENT

IACR ePrint Archive | 06.02.2026

The HyperFrog Cryptosystem: High-Genus Voxel Topology as a Trapdoor for Post-Quantum KEMs

IACR ePrint Archive | 05.02.2026

On the Active Security of the PEARL-SCALLOP Group Action

Journal of Cryptology | 04.02.2026

Space-Efficient and Noise-Robust Quantum Factoring

IACR ePrint Archive | 03.02.2026

A Practical Neighborhood Search Attack on Oracle MLWE

A Few Thoughts on Cryptographic Engineering | 02.02.2026

WhatsApp Encryption, a Lawsuit, and a Lot of Noise

IACR ePrint Archive | 29.01.2026

Feistel Tools: Reprogramming and Query-Recording for QRPs

IACR ePrint Archive | 29.01.2026

Designated-Verifier Dynamic zk-SNARKs with Applications to Dynamic Proofs of Index

IACR ePrint Archive | 29.01.2026

„One More Time”: Security of One-time Signature Scheme Using Run-length Encoding Under Two-message Attacks

Journal of Cryptology | 29.01.2026

Link Between the Differential Cryptanalysis and Linear Approximations over Finite Abelian Groups And Its Applications