Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
The Price of Active Security in Cryptographic Protocols31
Algebraically Structured LWE, Revisited27
Masking the GLP Lattice-Based Signature Scheme at Any Order26
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery20
Cryptographic Primitives with Hinting Property20
A Bad Day to Die Hard: Correcting the Dieharder Battery20
Exploiting the Symmetry of $$\mathbb {Z}^n$$: Randomization and the Automorphism Problem18
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage17
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm16
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK15
Compact NIZKs from Standard Assumptions on Bilinear Maps15
New Representations of the AES Key Schedule13
Minicrypt Primitives with Algebraic Structure and Applications12
Two Generalizations of Almost Perfect Nonlinearity11
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol11
Rinocchio: SNARKs for Ring Arithmetic11
Non-malleable Vector Commitments via Local Equivocability11
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró11
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires9
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.39
Multiparty Generation of an RSA Modulus9
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices8
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance8
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party8
No-Signaling Linear PCPs8
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions8
The Retracing Boomerang Attack, with Application to Reduced-Round AES8
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves7
Topical Collection on Computing on Encrypted Data7
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation7
Cover Attacks for Elliptic Curves over Cubic Extension Fields7
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic7
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates6
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting6
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them6
Efficient Perfectly Secure Computation with Optimal Resilience5
Signed (Group) Diffie–Hellman Key Exchange with Tight Security5
Lattice-Based Programmable Hash Functions and Applications5
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments5
0.042337894439697