Journal of Cryptology

Papers
(The median citation count of Journal of Cryptology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-09-01 to 2024-09-01.)
ArticleCitations
Ascon v1.2: Lightweight Authenticated Encryption and Hashing127
A Formal Security Analysis of the Signal Messaging Protocol56
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol36
Bootstrapping for HElib31
Reusable Fuzzy Extractors for Low-Entropy Distributions31
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments30
Efficient Verifiable Delay Functions29
Match Me if You Can: Matchmaking Encryption and Its Applications24
On the Local Leakage Resilience of Linear Secret Sharing Schemes20
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices17
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions16
The Deoxys AEAD Family14
Tight Tradeoffs in Searchable Symmetric Encryption13
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange13
Improved Differential-Linear Attacks with Applications to ARX Ciphers13
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT12
On the Hardness of Module Learning with Errors with Short Distributions11
On Subversion-Resistant SNARKs11
Tightly Secure Hierarchical Identity-Based Encryption11
Selfie: reflections on TLS 1.3 with PSK11
Parameter Optimization and Larger Precision for (T)FHE10
Fine-Grained Cryptography Revisited10
The Number of Almost Perfect Nonlinear Functions Grows Exponentially9
Signed (Group) Diffie–Hellman Key Exchange with Tight Security8
Semi-quantum Money8
Actively Secure Setup for SPDZ8
Modeling for Three-Subset Division Property without Unknown Subset8
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption8
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC7
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange7
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model7
Toward Non-interactive Zero-Knowledge Proofs for NP from LWE6
Rinocchio: SNARKs for Ring Arithmetic6
Round-Optimal Secure Multi-party Computation6
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró5
Multiparty Generation of an RSA Modulus5
On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience5
From Fairness to Full Security in Multiparty Computation5
Fast Secure Two-Party ECDSA Signing5
Bootstrapping for BGV and BFV Revisited5
On the (in)Security of ROS5
TinyKeys: A New Approach to Efficient Multi-Party Computation4
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable4
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols4
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer4
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe4
The Inverse of $$\chi $$ and Its Applications to Rasta-Like Ciphers4
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions3
CCA Security and Trapdoor Functions via Key-Dependent-Message Security3
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?3
Is There an Oblivious RAM Lower Bound for Online Reads?3
(Inner-Product) Functional Encryption with Updatable Ciphertexts3
ZK-PCPs from Leakage-Resilient Secret Sharing3
Cryptographic Competitions3
Everlasting UC Commitments from Fully Malicious PUFs3
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors3
Candidate iO from Homomorphic Encryption Schemes3
The Design and Evolution of OCB3
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers3
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli3
Succinct Non-Interactive Arguments via Linear Interactive Proofs3
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm2
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings2
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)2
Unbounded Predicate Inner Product Functional Encryption from Pairings2
Non-Malleable Functions and their Applications2
Oblivious RAM with Worst-Case Logarithmic Overhead2
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries2
Simple and Generic Constructions of Succinct Functional Encryption2
On the Round Complexity of Randomized Byzantine Agreement2
Efficient Perfectly Secure Computation with Optimal Resilience2
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning2
Non-commutative Ring Learning with Errors from Cyclic Algebras2
Learning Strikes Again: The Case of the DRS Signature Scheme2
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups2
Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with $$(\ell ,\ell ,\ell )$$-Isogenies2
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party1
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.31
SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors1
Lattice-Based Programmable Hash Functions and Applications1
On Abelian and Homomorphic Secret Sharing Schemes1
BLEACH: Cleaning Errors in Discrete Computations Over CKKS1
Cover Attacks for Elliptic Curves over Cubic Extension Fields1
Introduction to the Special Issue on TLS 1.31
Fine-Grained Secure Attribute-Based Encryption1
MPClan: Protocol Suite for Privacy-Conscious Computations1
Adaptively Secure Distributed PRFs from $$\textsf {LWE}$$1
Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries1
Bitcoin as a Transaction Ledger: A Composable Treatment1
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires1
A Bad Day to Die Hard: Correcting the Dieharder Battery1
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience1
Rotational Differential-Linear Cryptanalysis Revisited1
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model1
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version1
Unconditionally Secure Computation Against Low-Complexity Leakage1
Decentralized Multi-authority ABE for $$\textsf{NC}^1$$ from BDH1
Obfuscating Circuits Via Composite-Order Graded Encoding1
On the Exact Round Complexity of Secure Three-Party Computation1
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model1
0.038444042205811