Cohen, R., Doerner, J., Lee, E., Lysyanskaya, A.
& Roy, L. (2026).
An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast. In B. Applebaum & H. Lin (Eds.),
Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (pp. 675-708). Springer.
https://doi.org/10.1007/978-3-032-12290-2_22
Canetti, R.
, Damgård, I. B., Kolby, S., Ravi, D.
& Yakoubov, S. (2026).
Deniable Secret Sharing. In
23rd International Conference, TCC 2025, proceedings Part II https://doi.org/10.1007/978-3-032-12293-3_13
Cominetti, E., Simplicio, M.
, Aranha, D. F., Matias, P. & Araujo, R. (2026).
E2Easy: a simple lattice-based in-person end-to-end voting scheme. In B. Haslhofer, J. Xu, F. Victor, M. Bartoletti, A. Bracciali, K. Matsuura, J. Nabrzyski, V. Estrada-Galiñanes, C. Tessone, J. Budurushi & K. Marky (Eds.),
Financial Cryptography and Data Security. FC 2025 International Workshops - CoDecFin, FinTeAchin, VOTING, 2025, Revised Selected Papers (pp. 281-296). Springer.
https://doi.org/10.1007/978-3-032-00495-6_16
van Baarsen, A. N. & Pu, S. (2026).
Fuzzy Private Set Intersection from VOLE. In G. Hanaoka & B.-Y. Yang (Eds.),
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (pp. 327-360). Springer.
https://doi.org/10.1007/978-981-95-5116-3_11
Acharya, A., Hazay, C. & Venkitasubramaniam, M. (2026).
On Achieving "Best-in-the-Multiverse" MPC. In
Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I (Vol. 16268, pp. 119–151). Springer LNCS.
https://doi.org/10.1007/978-3-032-12287-2_5
Abram, D., Fehr, S., Obremski, M.
& Scholl, P. (2026).
On the Impossibility of Actively Secure Distributed Samplers. In B. Applebaum & H. Lin (Eds.),
Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part IV (pp. 547-581). Springer Nature.
https://doi.org/10.1007/978-3-032-12290-2_18
Escudero, D.
& Damgård, I. (2026).
Preface. In D. Escudero & I. Damgård (Eds.),
Progress in Cryptology – LATINCRYPT 2025: 9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1–3, 2025, Proceedings (pp. v). Springer.
https://doi.org/10.1007/978-3-032-06754-8
Behera, A. R.
, Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2026).
Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank. In B. Applebaum & H. Lin (Eds.),
Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (pp. 301-332). Springer.
https://doi.org/10.1007/978-3-032-12287-2_11
Acharya, A., Hazay, C., Prabhakaran, M. & Kolesnikov, V. (2026).
Towards Building Efficient SCALES Protocols. In
Advances in Cryptology – ASIACRYPT 2025: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (Vol. 16249). Springer LNCS.
https://doi.org/10.1007/978-981-95-5116-3_2
Argo, S., Venema, M., Riepel, D., Güneysu, T.
& Aranha, D. F. (2025).
ABE Cubed: Advanced Benchmarking Extensions for ABE Squared.
IACR Transactions on Cryptographic Hardware and Embedded Systems,
2025(4), 544-587.
https://doi.org/10.46586/tches.v2025.i4.544-587
Braun, L., Castagnos, G.
, Damgård, I., Laguillaumie, F.
, Melissaris, K., Orlandi, C. & Tucker, I. (2025).
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups.
Cryptography and Communications,
17(5), 1367-1406.
https://doi.org/10.1007/S12095-025-00826-2
Charbit, P., Couteau, G.
, Meyer, P. & Naserasr, R. (2025).
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. In E. Boyle, E. Boyle & M. Mahmoody (Eds.),
Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 167-199). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-031-78023-3_6
Damgård, I. B., Ravi, D.
, Roy, L. D., Tschudi, D. & Yakoubov, S. (2025).
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity. In E. Boyle, E. Boyle & M. Mahmoody (Eds.),
Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 266–292). Springer.
https://doi.org/10.1007/978-3-031-78023-3_9
Ganesh, C.
, Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2025).
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model).
Journal of Cryptology,
38(1), Article 11.
https://doi.org/10.1007/s00145-024-09525-2
Morita, H., Pohle, E., Sadakane, K.
, Scholl, P., Tozawa, K. & Tschudi, D. (2025).
MAESTRO: Multi-Party AES Using Lookup Tables. In
34th USENIX Security Symposium USENIX - The Advanced Computing Systems Association.
https://doi.org/10.5555/3766078.3766180
Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C.
, Roy, L. & Scholl, P. (2025).
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. In K.-M. Chung & Y. Sasaki (Eds.),
Advances in Cryptology - ASIACRYPT 2024 (pp. 463-493). Springer Nature.
https://doi.org/10.1007/978-981-96-0875-1_15
Acharya, A., Azari, K. & Kamath, C. (2025).
On the Adaptive Security of Free-XOR-Based Garbling Schemes in the Plain Model. In S. Fehr & P.-A. Fouque (Eds.),
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI (Vol. 15606, pp. 214-244). Springer LNCS.
https://doi.org/10.1007/978-3-031-91095-1\_8
Årdal, M. A., Adj, G., Alblooshi, A.
, Aranha, D. F., A. Canales-Martínez, I., Chavez-Saab, J., Gazzoni Filho, D. L., Reijnders, K. & Rodriguez-Henriquez, F. (2025).
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4.
IACR Transactions of Cryptographic Hardware and Embedded Systems,
2025(1), 497-522.
https://doi.org/10.46586/tches.v2025.i1.497-522
Chiang, J. H. Y., Damgård, I., Duro, W. R., Engan, S.
, Kolby, S. & Scholl, P. (2025).
Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. In
CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (pp. 4664-4678). Association for Computing Machinery.
https://doi.org/10.1145/3719027.3744854
Baum, C., Beullens, W., Braun, L., Delpech de Saint Guilhem, C., Klooß, M., Majenz, C., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C.
, Roy, L. & Scholl, P. (2025).
Shorter, Tighter, FAESTer: Optimizations and Improved (QROM) Analysis for VOLE-in-the-Head Signatures. In Y. Tauman Kalai & S. F. Kamara (Eds.),
Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 124-156). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-032-01887-8_5
Aardal, M. A., Adj, G.
, F. Aranha, D., Basso, A., Canales Martínez, I. A., Chávez-Saab, J., Corte-Real Santos, M., Dartois, P., De Feo, L., Duparc, M., Komada Eriksen, J., Fouotsa, T. B., Filho, D. L. G., Hess, B., Kohel, D., Leroux, A., Longa, P., Maino, L., Meyer, M. ... Wesolowski, B. (2025).
SQIsign 2.0: Algorithm specifications and supporting documentation.
https://sqisign.org/spec/sqisign-20250205.pdf