ePrint Updates
eprint.ing.bot
ePrint Updates
@eprint.ing.bot
Unofficial bot tracking the IACR Cryptology ePrint Archive (eprint.iacr.org). Maintained by @str4d.xyz.

Currently only posts about new papers. Author names are linkified to Bluesky accounts (cryptography.social); contact maintainer for inclusion/removal.
Fully Secure DKG Protocols for Discrete Logarithm Revisited (Karim Baghery, Hossein Moghaddas) ia.cr/2026/042
January 11, 2026 at 8:47 PM
Towards Privacy-Preserving Unmanned Aerial Vehicles Shared Logistics via Dynamic Sanitizable Signature with Multiple Sanitizers (Mingwei Zeng, Qingyang Zhang, Jie Cui, Hong Zhong, Fengqun Wang) ia.cr/2026/041
January 11, 2026 at 8:47 PM
Efficient Polynomial Evaluation over Structured Space and Application to Polynomial Method (Fukang Liu, Vaibhav Dixit, Daisuke Yamamoto, Wakaha Ogata, Santanu Sarkar, Willi Meier) ia.cr/2026/040
January 11, 2026 at 8:47 PM
Abelian surfaces in Hesse form and explicit isogeny formulas (Thomas Decru, Sabrina Kunzweiler) ia.cr/2026/039
January 11, 2026 at 8:47 PM
Scalable Honest-majority MPC for Machine Learning from Mixed Secret Sharings (Meilin Li, Meng Hao, Yu Chen) ia.cr/2026/038
January 11, 2026 at 8:47 PM
On those Boolean functions having only one Walsh zero (Claude Carlet, Pierrick Méaux, Marek Broll) ia.cr/2026/037
January 11, 2026 at 8:47 PM
AKE Protocol Combining PQC and QKD (Loïc Ferreira) ia.cr/2026/036
January 11, 2026 at 8:47 PM
Adaptive NIKE for Unbounded Parties (Shafik Nassar, Brent Waters) ia.cr/2026/035
January 9, 2026 at 6:36 AM
Benchmarking of the Amortized Post Quantum Combiner for MLS (Britta Hale, Xisen Tian, Lee Wang) ia.cr/2026/034
January 9, 2026 at 6:36 AM
Faster Short Pairing-Based NIZK Proofs for Ring LWE Ciphertexts (Olivier Bernard, Sarah Elkazdadi, Benoit Libert, Arthur Meyre, Jean-Baptiste Orfila, Nicolas Sarlin) ia.cr/2026/033
January 9, 2026 at 4:20 AM
The Algebraic Isogeny Model: A General Model with Applications to SQIsign and Key Exchanges (Marius A. Aardal, Andrea Basso, Doreen Riepel) ia.cr/2026/032
January 9, 2026 at 4:20 AM
On Threshold Fully Homomorphic Encryption with Synchronized Decryptors (François Colin de Verdière, Alain Passelègue, Damien Stehlé) ia.cr/2026/031
January 9, 2026 at 4:20 AM
Incremental Single-Server Private Information Retrieval (Pengfei Lu, Guangwu Xu, Zengpeng Li, Mei Wang, Haoyu Cui) ia.cr/2026/030
January 9, 2026 at 4:05 AM
Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test (Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu) ia.cr/2026/029
January 9, 2026 at 3:49 AM
On the design of Survivable Distributed Passwordless Authentication and Single Sign-On (Luca Ferretti, Federico Magnanini, Mauro Andreolini, Mattia Trabucco, Michele Colajanni) ia.cr/2026/028
January 9, 2026 at 3:49 AM
Practical SNARGs for Matrix Multiplications over Encrypted Data (Louis Tremblay Thibault, Michael Walter, Jiapeng Zhang) ia.cr/2026/027
January 9, 2026 at 3:49 AM
A General Randomness Reuse Framework for First-Order Secure Masking and Applications on AES Design Using Randomness Solely for Input Encoding (Junhuai Yang, Feng Zhou, Hua Chen, Limin Fan) ia.cr/2026/026
January 9, 2026 at 3:49 AM
JAGUAR: Efficient and Secure Unbalanced PSI under Malicious Adversaries in the Client-Server Setting (Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Qiang Liu, Tingyu Fan) ia.cr/2026/025
January 9, 2026 at 3:49 AM
Faster Than Ever: A New Lightweight Private Set Intersection and Its Variants (Guowei Ling, Peng Tang, Jinyong Shan, Liyao Xiang, Weidong Qiu) ia.cr/2026/024
January 9, 2026 at 3:49 AM
EHDSA: Elliptic Curve-Based Homomorphic Digital Signature Algorithm with Isomorphic Message Mapping (Sophia Shim, Caleb Lee) ia.cr/2026/023
January 9, 2026 at 3:03 AM
FABS: Fast Attribute-Based Signatures (Liqun Chen, Long Meng, Yalan Wang, Nada El Kassem, Christopher JP Newton, Yangguang Tian, Jodie Knapp, Constantin Catalin Dragan, Daniel Gardham, Mark Manulis) ia.cr/2026/022
January 9, 2026 at 3:03 AM
IND-CCA Lattice Threshold KEM under 30 KiB (Katharina Boudgoust, Oleksandra Lapiha, Rafaël del Pino, Thomas Prest) ia.cr/2026/021
January 9, 2026 at 3:03 AM
HIC is all you need: Practical Post-Quantum Password-Authenticated Public Key Encryption (Afonso Arriaga, David Mestel, Jan Oupický, Peter Browne Rønne, Marjan Škrobot) ia.cr/2026/020
January 9, 2026 at 3:03 AM
Subversion-resilient Key-exchange in the Post-quantum World (Kévin Duverger, Pierre-Alain Fouque, Charlie Jacomme, Guilhem Niot, Cristina Onete) ia.cr/2026/019
January 9, 2026 at 3:03 AM
Multi-Instance Unrecoverability of iMHF-Based Password Hashing (Charles Dodd, Pooya Farshim, Siamak F. Shahandashti, Karl Southern) ia.cr/2026/018
January 9, 2026 at 3:03 AM