Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Ascon v1.2: Lightweight Authenticated Encryption and Hashing87
A Formal Security Analysis of the Signal Messaging Protocol49
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol33
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments28
Efficient Verifiable Delay Functions27
Reusable Fuzzy Extractors for Low-Entropy Distributions27
Bootstrapping for HElib23
Match Me if You Can: Matchmaking Encryption and Its Applications21
On the Local Leakage Resilience of Linear Secret Sharing Schemes16
The IITM Model: A Simple and Expressive Model for Universal Composability15
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions13
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange13
Tight Tradeoffs in Searchable Symmetric Encryption13
The Deoxys AEAD Family12
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT11
Improved Differential-Linear Attacks with Applications to ARX Ciphers10
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices10
Selfie: reflections on TLS 1.3 with PSK10
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer10
On Subversion-Resistant SNARKs9
Tightly Secure Hierarchical Identity-Based Encryption9
On the Hardness of Module Learning with Errors with Short Distributions9
The Number of Almost Perfect Nonlinear Functions Grows Exponentially8
Parameter Optimization and Larger Precision for (T)FHE8
Modeling for Three-Subset Division Property without Unknown Subset7
Actively Secure Setup for SPDZ7
Foundations of Fully Dynamic Group Signatures7
Semi-quantum Money7
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption6
Fine-Grained Cryptography Revisited6
Round-Optimal Secure Multi-party Computation6
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC6
Fast Secure Two-Party ECDSA Signing5
Signed (Group) Diffie–Hellman Key Exchange with Tight Security5
Toward Non-interactive Zero-Knowledge Proofs for NP from LWE5
Multiparty Generation of an RSA Modulus5
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange4
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model4
$${\varvec{1/p}}$$-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds4
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols4
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality4
0.017709970474243