- Yuchao Chen, Chun Guo, Muzhou Li, Shuo Peng, Hao Lei, Guang Zeng, Meiqin Wang. Computer-Aided Proof for Extended Generalized Feistel Networks. IACR Trans. Symmetric Cryptol., 2026(1):345-375, 2026.
- Xiaokang Qi, Hao Lei, Longxiang Wei, Xiaohan Sun, Meiqin Wang. Cryptanalytic Extraction of Neural Networks with Various Activation Functions. IACR Trans. Symmetric Cryptol., 2026(1):468-505, 2026.
- Hongli Li, Changlun Li, Honggang Hu, Fengmei Liu. Indifferentiability of the Sponge Hash Family: New Attacks and the Optimal Construction. IACR Trans. Symmetric Cryptol., 2026(1):31-75, 2026.
- Shiyao Chen, Jian Guo 0001, Tianyu Zhang. Weak Tweak-Key Analysis of Blink via Superbox. IACR Trans. Symmetric Cryptol., 2026(1):226-252, 2026.
- Ritam Bhaumik, Bishwajit Chakraborty 0002, Chandranan Dhar. Breaking and Fixing MacaKey. IACR Trans. Symmetric Cryptol., 2026(1):76-94, 2026.
- Benoît Cogliati, Simon Demarty. Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model. IACR Trans. Symmetric Cryptol., 2026(1):5-30, 2026.
- Jianhua Wang, Tao Huang, Siwei Sun, Hailun Yan, Guang Zeng, Shuang Wu. Differential Pattern Transition Characterizing the Differential Behavior of AES-like Linear Layers. IACR Trans. Symmetric Cryptol., 2026(1):410-440, 2026.
- Yufei Yuan, Wenling Wu, Lei Zhang 0186, Ruichen Wu. Fourier Analysis of Neural Distinguishers. IACR Trans. Symmetric Cryptol., 2026(1):441-467, 2026.
- Xiaoen Lin, Zhengrong Lu, Yantian Shen, Chongxu Ren, Hongbo Yu, Enming Dong, Wenhao Wu. Practical Preimage Attack on 5-Round Keccak[r=640, c=160]. IACR Trans. Symmetric Cryptol., 2026(1):189-211, 2026.
- Aurel Pichollet-Mugnier, André Schrottenloher. Quantum Truncated Differential Attacks Using Convolutions. IACR Trans. Symmetric Cryptol., 2026(1):148-188, 2026.