Journal of Cryptology

Papers
(The median citation count of Journal of Cryptology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
The Price of Active Security in Cryptographic Protocols46
Algebraically Structured LWE, Revisited36
Cryptographic Primitives with Hinting Property30
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery26
Masking the GLP Lattice-Based Signature Scheme at Any Order25
Exploiting the Symmetry of $$\mathbb {Z}^n$$: Randomization and the Automorphism Problem21
Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions20
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm19
Compact NIZKs from Standard Assumptions on Bilinear Maps19
New Representations of the AES Key Schedule18
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK17
Minicrypt Primitives with Algebraic Structure and Applications16
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol15
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-Key Encryption Schemes14
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró13
Rinocchio: SNARKs for Ring Arithmetic13
Two Generalizations of Almost Perfect Nonlinearity13
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires12
Non-malleable Vector Commitments via Local Equivocability11
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.310
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party10
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions10
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance9
No-Signaling Linear PCPs9
The Retracing Boomerang Attack, with Application to Reduced-Round AES9
Topical Collection on Computing on Encrypted Data8
Cover Attacks for Elliptic Curves over Cubic Extension Fields8
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation8
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves8
Four Attacks and a Proof for Telegram7
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic7
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them7
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates7
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting7
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments6
Signed (Group) Diffie–Hellman Key Exchange with Tight Security6
Lattice-Based Programmable Hash Functions and Applications6
Efficient Algorithms for the Detection of (N, N)-Splittings and Endomorphisms6
Efficient Perfectly Secure Computation with Optimal Resilience6
Rotational Differential-Linear Cryptanalysis Revisited5
Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs5
A New Linear Distinguisher for Four-Round AES5
Space-Efficient and Noise-Robust Quantum Factoring5
Topology-Hiding Communication from Minimal Assumptions5
Analysis of Multivariate Encryption Schemes: Application to Dob and $${C}^{*}$$5
Parameter Optimization and Larger Precision for (T)FHE5
New Attacks on Feistel Structures with Improved Memory Complexities4
Achievable CCA2 Relaxation for Homomorphic Encryption4
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation4
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves4
Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs4
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable4
A Note on Perfect Correctness by Derandomization4
Link Between the Differential Cryptanalysis and Linear Approximations over Finite Abelian Groups And Its Applications4
The COLM Authenticated Encryption Scheme3
Non-commutative Ring Learning with Errors from Cyclic Algebras3
Compact Structure-Preserving Signatures with Almost Tight Security3
Quantum CCA-Secure PKE, Revisited3
Correction: Locally Computable UOWHF with Linear Shrinkage3
Study of Arithmetization Methods for STARKs3
Accurate Score Prediction for Dual-Sieve Attacks3
Everlasting UC Commitments from Fully Malicious PUFs3
The Fiat—Shamir Transformation of $$(\varGamma _1,\dots ,\varGamma _\mu )$$-Special-Sound Interactive Proofs3
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs3
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions2
MPClan: Protocol Suite for Privacy-Conscious Computations2
Succinct Non-Interactive Arguments via Linear Interactive Proofs2
Universally Composable Almost-Everywhere Secure Computation2
Adaptively Secure MPC with Sublinear Communication Complexity2
A Guide to the Design of Digital Signatures based on Cryptographic Group Actions2
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption2
On the Complexity of Compressing Obfuscation2
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness2
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version2
High-Throughput Secure Three-Party Computation with an Honest Majority2
Instance-Hiding Interactive Proofs2
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model2
Simple Constructions from (Almost) Regular One-Way Functions1
NIZK from SNARGs1
Candidate iO from Homomorphic Encryption Schemes1
Cryptographic Competitions1
(Inner-Product) Functional Encryption with Updatable Ciphertexts1
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $$\varvec{\Sigma }$$-Protocols1
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting1
The Combinatorial Structure and Value Distributions of Plateaued Functions1
On the (in)Security of ROS1
Unbounded Predicate Inner Product Functional Encryption from Pairings1
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency1
BLEACH: Cleaning Errors in Discrete Computations Over CKKS1
Guaranteed Output in $$O(\sqrt{n})$$ Rounds for Round-Robin Sampling Protocols1
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors1
A Complete Analysis of the BKZ Lattice Reduction Algorithm1
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing1
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious1
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness1
Memory-Efficient Attacks on Small LWE Keys1
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption1
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes1
Two-Round Threshold Signature from Algebraic One-More Learning with Errors1
0.058928966522217