Journal of Cryptology

Papers
(The median citation count of Journal of Cryptology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Algebraically Structured LWE, Revisited26
The Price of Active Security in Cryptographic Protocols23
Cryptographic Primitives with Hinting Property18
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery18
Masking the GLP Lattice-Based Signature Scheme at Any Order17
Exploiting the Symmetry of $$\mathbb {Z}^n$$: Randomization and the Automorphism Problem16
A Bad Day to Die Hard: Correcting the Dieharder Battery16
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage15
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm13
Compact NIZKs from Standard Assumptions on Bilinear Maps13
New Representations of the AES Key Schedule12
Minicrypt Primitives with Algebraic Structure and Applications11
Two Generalizations of Almost Perfect Nonlinearity10
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol10
Rinocchio: SNARKs for Ring Arithmetic10
On Abelian and Homomorphic Secret Sharing Schemes9
Multiparty Generation of an RSA Modulus9
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró9
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires9
Non-malleable Vector Commitments via Local Equivocability9
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions8
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party8
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.38
The Retracing Boomerang Attack, with Application to Reduced-Round AES7
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance7
No-Signaling Linear PCPs7
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices7
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves6
Topical Collection on Computing on Encrypted Data6
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation6
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic6
Cover Attacks for Elliptic Curves over Cubic Extension Fields6
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange6
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates5
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments5
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting5
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them5
Signed (Group) Diffie–Hellman Key Exchange with Tight Security4
Lattice-Based Programmable Hash Functions and Applications4
Parameter Optimization and Larger Precision for (T)FHE4
Efficient Perfectly Secure Computation with Optimal Resilience4
Rotational Differential-Linear Cryptanalysis Revisited4
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage3
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation3
Analysis of Multivariate Encryption Schemes: Application to Dob and $${C}^{*}$$3
Achievable CCA2 Relaxation for Homomorphic Encryption3
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable3
Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs3
Topology-Hiding Communication from Minimal Assumptions3
Correction to: Editorial2
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves2
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings2
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness2
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version2
MPClan: Protocol Suite for Privacy-Conscious Computations2
Everlasting UC Commitments from Fully Malicious PUFs2
Non-commutative Ring Learning with Errors from Cyclic Algebras2
Correction: Locally Computable UOWHF with Linear Shrinkage2
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions2
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?2
From Fairness to Full Security in Multiparty Computation2
Compact Structure-Preserving Signatures with Almost Tight Security2
A Note on Perfect Correctness by Derandomization2
The COLM Authenticated Encryption Scheme2
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs2
Adaptively Secure MPC with Sublinear Communication Complexity2
On the Round Complexity of Randomized Byzantine Agreement2
High-Throughput Secure Three-Party Computation with an Honest Majority2
Cryptographic Competitions1
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model1
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious1
Semi-quantum Money1
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency1
TinyKeys: A New Approach to Efficient Multi-Party Computation1
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption1
A Guide to the Design of Digital Signatures based on Cryptographic Group Actions1
Succinct Non-Interactive Arguments via Linear Interactive Proofs1
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness1
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $$\varvec{\Sigma }$$-Protocols1
Unbounded Predicate Inner Product Functional Encryption from Pairings1
Actively Secure Setup for SPDZ1
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption1
On the Complexity of Compressing Obfuscation1
BLEACH: Cleaning Errors in Discrete Computations Over CKKS1
Candidate iO from Homomorphic Encryption Schemes1
On the (in)Security of ROS1
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors1
0.03983998298645