- Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more. J. Cryptology, 38(1):1, March 2025.
- Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang 0012, Chenkai Weng, Kang Yang 0002, Yu Yu 0001. An Efficient ZK Compiler from SIMD Circuits to General Circuits. J. Cryptology, 38(1):10, March 2025.
- Jianwei Li, Phong Q. Nguyen. Correction to: A Complete Analysis of the BKZ Lattice Reduction Algorithm. J. Cryptology, 38(2):18, June 2025.
- Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie. Efficient Succinct Zero-Knowledge Arguments in the CL Framework. J. Cryptology, 38(1):13, March 2025.
- Gaëtan Leurent, Clara Pernot. New Representations of the AES Key Schedule. J. Cryptology, 38(1):2, March 2025.
- Hongrui Cui, Xiao Wang 0012, Kang Yang 0002, Yu Yu 0001. Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. J. Cryptology, 38(2):19, June 2025.
- Claude Carlet. Two Generalizations of Almost Perfect Nonlinearity. J. Cryptology, 38(2):20, June 2025.
- Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, Ye Zhang. Ceno: Non-uniform, Segment and Parallel Zero-Knowledge Virtual Machine. J. Cryptology, 38(2):17, June 2025.
- Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi 0001, Ivan Visconti. Compact Proofs of Partial Knowledge for Overlapping CNF Formulae. J. Cryptology, 38(1):7, March 2025.
- Valeh Farzaliyev, Calvin Pärn, Heleen Saarse, Jan Willemson. Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting. J. Cryptology, 38(1):6, March 2025.