Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Algebraically Structured LWE, Revisited26
The Price of Active Security in Cryptographic Protocols23
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery18
Cryptographic Primitives with Hinting Property18
Masking the GLP Lattice-Based Signature Scheme at Any Order17
Exploiting the Symmetry of $$\mathbb {Z}^n$$: Randomization and the Automorphism Problem16
A Bad Day to Die Hard: Correcting the Dieharder Battery16
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage15
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm13
Compact NIZKs from Standard Assumptions on Bilinear Maps13
New Representations of the AES Key Schedule12
Minicrypt Primitives with Algebraic Structure and Applications11
Two Generalizations of Almost Perfect Nonlinearity10
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol10
Rinocchio: SNARKs for Ring Arithmetic10
On Abelian and Homomorphic Secret Sharing Schemes9
Multiparty Generation of an RSA Modulus9
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró9
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires9
Non-malleable Vector Commitments via Local Equivocability9
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions8
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party8
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.38
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance7
No-Signaling Linear PCPs7
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices7
The Retracing Boomerang Attack, with Application to Reduced-Round AES7
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation6
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic6
Cover Attacks for Elliptic Curves over Cubic Extension Fields6
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange6
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves6
Topical Collection on Computing on Encrypted Data6
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments5
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting5
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them5
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates5
0.096735954284668