Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Ascon v1.2: Lightweight Authenticated Encryption and Hashing73
A Formal Security Analysis of the Signal Messaging Protocol48
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol33
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments27
Efficient Verifiable Delay Functions26
Reusable Fuzzy Extractors for Low-Entropy Distributions25
Bootstrapping for HElib20
Match Me if You Can: Matchmaking Encryption and Its Applications16
The IITM Model: A Simple and Expressive Model for Universal Composability15
On the Local Leakage Resilience of Linear Secret Sharing Schemes14
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange13
Tight Tradeoffs in Searchable Symmetric Encryption13
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions13
Efficient and Scalable Universal Circuits12
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT11
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices10
The Deoxys AEAD Family10
Selfie: reflections on TLS 1.3 with PSK10
Tightly Secure Hierarchical Identity-Based Encryption9
On Subversion-Resistant SNARKs9
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer8
The Number of Almost Perfect Nonlinear Functions Grows Exponentially8
Improved Differential-Linear Attacks with Applications to ARX Ciphers8
On the Hardness of Module Learning with Errors with Short Distributions7
Modeling for Three-Subset Division Property without Unknown Subset7
Actively Secure Setup for SPDZ7
Parameter Optimization and Larger Precision for (T)FHE7
Semi-quantum Money7
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC6
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption6
Fine-Grained Cryptography Revisited6
Foundations of Fully Dynamic Group Signatures6
Round-Optimal Secure Multi-party Computation6
Multiparty Generation of an RSA Modulus5
Fast Secure Two-Party ECDSA Signing5
Toward Non-interactive Zero-Knowledge Proofs for NP from LWE5
Signed (Group) Diffie–Hellman Key Exchange with Tight Security4
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality4
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols4
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model4
0.02174711227417