- Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more. J. Cryptology, 38(1):1, March 2025.
- Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang 0012, Chenkai Weng, Kang Yang 0002, Yu Yu 0001. An Efficient ZK Compiler from SIMD Circuits to General Circuits. J. Cryptology, 38(1):10, March 2025.
- Longjiang Qu, Qiancheng Zhang, Kangquan Li. Parametric Construction Approach of Balanced Boolean Functions from Two-to-one Mappings. J. Cryptology, 38(3):24, July 2025.
- Jianwei Li, Phong Q. Nguyen. Correction to: A Complete Analysis of the BKZ Lattice Reduction Algorithm. J. Cryptology, 38(2):18, June 2025.
- Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie. Efficient Succinct Zero-Knowledge Arguments in the CL Framework. J. Cryptology, 38(1):13, March 2025.
- Gaƫtan Leurent, Clara Pernot. New Representations of the AES Key Schedule. J. Cryptology, 38(1):2, March 2025.
- Hongrui Cui, Xiao Wang 0012, Kang Yang 0002, Yu Yu 0001. Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. J. Cryptology, 38(2):19, June 2025.
- Kaijie Jiang, Anyu Wang 0001, Hengyi Luo, Guoxiao Liu, Yang Yu 0008, Xiaoyun Wang 0001. Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. J. Cryptology, 38(3):27, July 2025.
- Thibauld Feneuil, Matthieu Rivain. Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments. J. Cryptology, 38(3):28, July 2025.
- Claude Carlet. Two Generalizations of Almost Perfect Nonlinearity. J. Cryptology, 38(2):20, June 2025.