- Weizhan Jing, Xiaojun Chen 0004, Xudong Chen, Ye Dong, Qiang Liu 0060, Tingyu Fan. JAGUAR: Efficient and Secure Unbalanced PSI under Malicious Adversaries in the Client-Server Setting. IACR Cryptology ePrint Archive, 2026:25, 2026.
- Weizhan Jing, Xiaojun Chen 0004, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu 0060. Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test. IACR Cryptology ePrint Archive, 2026:29, 2026.
- Jan Bormet, Sebastian Faust, Hussien Othman. Threshold Traitor Tracing Revisited: Insider Attacks and Multi-Traitor Tracing. IACR Cryptology ePrint Archive, 2026:422, 2026.
- Jean-Sébastien Coron, François Gérard, Bowen Zhang. Masked Solving of Linear Equations System and Application to UOV Signatures. IACR Cryptology ePrint Archive, 2026:48, 2026.
- Olivier Bernard, Sarah El Kazdadi, Benoit Libert, Arthur Meyre, Jean-Baptiste Orfila, Nicolas Sarlin. Faster Short Pairing-Based NIZK Proofs for Ring LWE Ciphertexts. IACR Cryptology ePrint Archive, 2026:33, 2026.
- Alessandro Budroni, Andre Esser 0001. One Pair to Rule Them All: An Optimal Algorithm for Solving Code Equivalence via Codeword Search. IACR Cryptology ePrint Archive, 2026:268, 2026.
- Bowen Jiang, GuoFeng Tang, Haiyang Xue. Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption. IACR Cryptology ePrint Archive, 2026:190, 2026.
- Junxin Liu, Peihan Miao, Mike Rosulek, Xinyi Shi, Jifeng Wang. Updatable Private Set Intersection from Symmetric-Key Techniques. IACR Cryptology ePrint Archive, 2026:438, 2026.
- Afonso Arriaga, David Mestel, Jan Oupický, Peter B. Rønne, Marjan Skrobot. HIC is all you need: Practical Post-Quantum Password-Authenticated Public Key Encryption. IACR Cryptology ePrint Archive, 2026:20, 2026.
- Lorenzo Rovida. A flexible and polynomial framework for integer arithmetic in CKKS. IACR Cryptology ePrint Archive, 2026:450, 2026.