Journal of Cryptology

Papers
(The median citation count of Journal of Cryptology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Algebraically Structured LWE, Revisited216
Cryptographic Primitives with Hinting Property54
The Price of Active Security in Cryptographic Protocols37
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery23
Masking the GLP Lattice-Based Signature Scheme at Any Order21
A Bad Day to Die Hard: Correcting the Dieharder Battery20
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage16
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm15
New Representations of the AES Key Schedule15
Compact NIZKs from Standard Assumptions on Bilinear Maps15
Minicrypt Primitives with Algebraic Structure and Applications14
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol14
Rinocchio: SNARKs for Ring Arithmetic12
Two Generalizations of Almost Perfect Nonlinearity12
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró11
On Abelian and Homomorphic Secret Sharing Schemes10
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires9
Non-malleable Vector Commitments via Local Equivocability9
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.38
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party8
Multiparty Generation of an RSA Modulus8
Ascon v1.2: Lightweight Authenticated Encryption and Hashing8
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices8
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness7
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance7
The Retracing Boomerang Attack, with Application to Reduced-Round AES7
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves6
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange6
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer6
No-Signaling Linear PCPs6
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation6
Cover Attacks for Elliptic Curves over Cubic Extension Fields6
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting5
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates5
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic5
The Design and Evolution of OCB5
Topical Collection on Computing on Encrypted Data5
Lattice-Based Programmable Hash Functions and Applications5
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them4
Signed (Group) Diffie–Hellman Key Exchange with Tight Security4
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments4
Efficient Perfectly Secure Computation with Optimal Resilience4
Parameter Optimization and Larger Precision for (T)FHE3
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation3
Analysis of Multivariate Encryption Schemes: Application to Dob and $${C}^{*}$$3
Topology-Hiding Communication from Minimal Assumptions3
Achievable CCA2 Relaxation for Homomorphic Encryption3
Rotational Differential-Linear Cryptanalysis Revisited3
Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs3
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable3
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage2
Everlasting UC Commitments from Fully Malicious PUFs2
Non-commutative Ring Learning with Errors from Cyclic Algebras2
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions2
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness2
The COLM Authenticated Encryption Scheme2
Correction: Locally Computable UOWHF with Linear Shrinkage2
A Note on Perfect Correctness by Derandomization2
Compact Structure-Preserving Signatures with Almost Tight Security2
High-Throughput Secure Three-Party Computation with an Honest Majority2
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings2
Correction to: Editorial2
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves2
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs2
Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with $$(\ell ,\ell ,\ell )$$-Isogenies2
Adaptively Secure MPC with Sublinear Communication Complexity1
On the Round Complexity of Randomized Byzantine Agreement1
Succinct Non-Interactive Arguments via Linear Interactive Proofs1
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious1
BLEACH: Cleaning Errors in Discrete Computations Over CKKS1
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $$\varvec{\Sigma }$$-Protocols1
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version1
From Fairness to Full Security in Multiparty Computation1
Semi-quantum Money1
The Deoxys AEAD Family1
Cryptographic Competitions1
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors1
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption1
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?1
MPClan: Protocol Suite for Privacy-Conscious Computations1
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model1
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness1
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption1
On the Complexity of Compressing Obfuscation1
0.063358068466187