Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
The Price of Active Security in Cryptographic Protocols35
Algebraically Structured LWE, Revisited31
Cryptographic Primitives with Hinting Property30
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery21
Exploiting the Symmetry of $$\mathbb {Z}^n$$: Randomization and the Automorphism Problem21
Masking the GLP Lattice-Based Signature Scheme at Any Order21
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage19
Compact NIZKs from Standard Assumptions on Bilinear Maps17
New Representations of the AES Key Schedule17
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm17
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK16
Minicrypt Primitives with Algebraic Structure and Applications15
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol14
Rinocchio: SNARKs for Ring Arithmetic14
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró12
Two Generalizations of Almost Perfect Nonlinearity12
Non-malleable Vector Commitments via Local Equivocability11
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires11
Multiparty Generation of an RSA Modulus10
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions9
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party9
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices9
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.39
The Retracing Boomerang Attack, with Application to Reduced-Round AES8
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves8
No-Signaling Linear PCPs8
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance8
Cover Attacks for Elliptic Curves over Cubic Extension Fields8
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates7
Topical Collection on Computing on Encrypted Data7
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic7
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation7
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting7
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them6
Efficient Perfectly Secure Computation with Optimal Resilience6
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments6
Efficient Algorithms for the Detection of (N, N)-Splittings and Endomorphisms6
Lattice-Based Programmable Hash Functions and Applications5
Rotational Differential-Linear Cryptanalysis Revisited5
Signed (Group) Diffie–Hellman Key Exchange with Tight Security5
A New Linear Distinguisher for Four-Round AES5
0.030251979827881