Journal of Cryptology

Papers
(The median citation count of Journal of Cryptology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Ascon v1.2: Lightweight Authenticated Encryption and Hashing129
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol36
Bootstrapping for HElib32
Reusable Fuzzy Extractors for Low-Entropy Distributions31
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments31
Match Me if You Can: Matchmaking Encryption and Its Applications24
On the Local Leakage Resilience of Linear Secret Sharing Schemes20
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices17
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions16
The Deoxys AEAD Family15
Improved Differential-Linear Attacks with Applications to ARX Ciphers14
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange13
Tight Tradeoffs in Searchable Symmetric Encryption13
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT12
Selfie: reflections on TLS 1.3 with PSK12
On the Hardness of Module Learning with Errors with Short Distributions11
On Subversion-Resistant SNARKs11
Parameter Optimization and Larger Precision for (T)FHE10
Fine-Grained Cryptography Revisited10
Modeling for Three-Subset Division Property without Unknown Subset9
The Number of Almost Perfect Nonlinear Functions Grows Exponentially9
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption8
Signed (Group) Diffie–Hellman Key Exchange with Tight Security8
Semi-quantum Money8
Actively Secure Setup for SPDZ8
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model7
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC7
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange7
Toward Non-interactive Zero-Knowledge Proofs for NP from LWE6
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró6
Round-Optimal Secure Multi-party Computation6
Rinocchio: SNARKs for Ring Arithmetic6
Bootstrapping for BGV and BFV Revisited5
On the (in)Security of ROS5
Fast Secure Two-Party ECDSA Signing5
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer5
From Fairness to Full Security in Multiparty Computation5
On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience5
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable5
Multiparty Generation of an RSA Modulus5
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols4
TinyKeys: A New Approach to Efficient Multi-Party Computation4
MPClan: Protocol Suite for Privacy-Conscious Computations4
Cryptographic Competitions4
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions4
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe4
The Inverse of $$\chi $$ and Its Applications to Rasta-Like Ciphers4
ZK-PCPs from Leakage-Resilient Secret Sharing3
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?3
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli3
Succinct Non-Interactive Arguments via Linear Interactive Proofs3
Candidate iO from Homomorphic Encryption Schemes3
The Design and Evolution of OCB3
Everlasting UC Commitments from Fully Malicious PUFs3
(Inner-Product) Functional Encryption with Updatable Ciphertexts3
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors3
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups3
CCA Security and Trapdoor Functions via Key-Dependent-Message Security3
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers3
Is There an Oblivious RAM Lower Bound for Online Reads?3
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings2
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm2
Simple and Generic Constructions of Succinct Functional Encryption2
SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors2
Efficient Perfectly Secure Computation with Optimal Resilience2
Non-Malleable Functions and their Applications2
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries2
Learning Strikes Again: The Case of the DRS Signature Scheme2
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version2
Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with $$(\ell ,\ell ,\ell )$$-Isogenies2
Oblivious RAM with Worst-Case Logarithmic Overhead2
Non-commutative Ring Learning with Errors from Cyclic Algebras2
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)2
On the Round Complexity of Randomized Byzantine Agreement2
Unbounded Predicate Inner Product Functional Encryption from Pairings2
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning2
Fine-Grained Secure Attribute-Based Encryption1
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.31
Decentralized Multi-authority ABE for $$\textsf{NC}^1$$ from BDH1
On Abelian and Homomorphic Secret Sharing Schemes1
BLEACH: Cleaning Errors in Discrete Computations Over CKKS1
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes1
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience1
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model1
Unconditionally Secure Computation Against Low-Complexity Leakage1
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires1
Lattice-Based Programmable Hash Functions and Applications1
A Bad Day to Die Hard: Correcting the Dieharder Battery1
Cover Attacks for Elliptic Curves over Cubic Extension Fields1
Introduction to the Special Issue on TLS 1.31
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party1
Rotational Differential-Linear Cryptanalysis Revisited1
Adaptively Secure Distributed PRFs from $$\textsf {LWE}$$1
Bitcoin as a Transaction Ledger: A Composable Treatment1
Obfuscating Circuits Via Composite-Order Graded Encoding1
Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries1
On the Exact Round Complexity of Secure Three-Party Computation1
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model1
0.03347110748291