Journal of Cryptology

Papers
(The median citation count of Journal of Cryptology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Algebraically Structured LWE, Revisited216
Cryptographic Primitives with Hinting Property54
The Price of Active Security in Cryptographic Protocols37
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery23
Masking the GLP Lattice-Based Signature Scheme at Any Order21
A Bad Day to Die Hard: Correcting the Dieharder Battery20
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage16
Compact NIZKs from Standard Assumptions on Bilinear Maps15
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm15
New Representations of the AES Key Schedule15
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol14
Minicrypt Primitives with Algebraic Structure and Applications14
Two Generalizations of Almost Perfect Nonlinearity12
Rinocchio: SNARKs for Ring Arithmetic12
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró11
On Abelian and Homomorphic Secret Sharing Schemes10
Non-malleable Vector Commitments via Local Equivocability9
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires9
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.38
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party8
Multiparty Generation of an RSA Modulus8
Ascon v1.2: Lightweight Authenticated Encryption and Hashing8
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices8
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness7
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance7
The Retracing Boomerang Attack, with Application to Reduced-Round AES7
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves6
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange6
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer6
No-Signaling Linear PCPs6
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation6
Cover Attacks for Elliptic Curves over Cubic Extension Fields6
Topical Collection on Computing on Encrypted Data5
Lattice-Based Programmable Hash Functions and Applications5
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting5
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates5
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic5
The Design and Evolution of OCB5
Efficient Perfectly Secure Computation with Optimal Resilience4
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them4
Signed (Group) Diffie–Hellman Key Exchange with Tight Security4
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments4
Rotational Differential-Linear Cryptanalysis Revisited3
Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs3
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable3
Parameter Optimization and Larger Precision for (T)FHE3
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation3
Analysis of Multivariate Encryption Schemes: Application to Dob and $${C}^{*}$$3
Topology-Hiding Communication from Minimal Assumptions3
Achievable CCA2 Relaxation for Homomorphic Encryption3
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage2
Everlasting UC Commitments from Fully Malicious PUFs2
Non-commutative Ring Learning with Errors from Cyclic Algebras2
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions2
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness2
The COLM Authenticated Encryption Scheme2
Correction: Locally Computable UOWHF with Linear Shrinkage2
A Note on Perfect Correctness by Derandomization2
Compact Structure-Preserving Signatures with Almost Tight Security2
High-Throughput Secure Three-Party Computation with an Honest Majority2
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings2
Correction to: Editorial2
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves2
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs2
Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with $$(\ell ,\ell ,\ell )$$-Isogenies2
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?1
MPClan: Protocol Suite for Privacy-Conscious Computations1
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model1
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness1
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption1
On the Complexity of Compressing Obfuscation1
Adaptively Secure MPC with Sublinear Communication Complexity1
On the Round Complexity of Randomized Byzantine Agreement1
Succinct Non-Interactive Arguments via Linear Interactive Proofs1
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious1
BLEACH: Cleaning Errors in Discrete Computations Over CKKS1
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $$\varvec{\Sigma }$$-Protocols1
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version1
From Fairness to Full Security in Multiparty Computation1
Semi-quantum Money1
The Deoxys AEAD Family1
Cryptographic Competitions1
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors1
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption1
0.05466103553772