- Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more. J. Cryptology, 38(1):1, March 2025.
- Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang 0012, Chenkai Weng, Kang Yang 0002, Yu Yu 0001. An Efficient ZK Compiler from SIMD Circuits to General Circuits. J. Cryptology, 38(1):10, March 2025.
- Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie. Efficient Succinct Zero-Knowledge Arguments in the CL Framework. J. Cryptology, 38(1):13, March 2025.
- Gaëtan Leurent, Clara Pernot. New Representations of the AES Key Schedule. J. Cryptology, 38(1):2, March 2025.
- Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi 0001, Ivan Visconti. Compact Proofs of Partial Knowledge for Overlapping CNF Formulae. J. Cryptology, 38(1):7, March 2025.
- Valeh Farzaliyev, Calvin Pärn, Heleen Saarse, Jan Willemson. Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting. J. Cryptology, 38(1):6, March 2025.
- Chris Brzuska, Geoffroy Couteau. On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness. J. Cryptology, 38(1):8, March 2025.
- Matteo Campanelli, Dario Fiore 0001, Rosario Gennaro. Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them. J. Cryptology, 38(1):14, March 2025.
- Gildas Avoine, Loïc Ferreira. Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol. J. Cryptology, 38(1):9, March 2025.
- Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi. SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves. J. Cryptology, 38(1):3, March 2025.