Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Ascon v1.2: Lightweight Authenticated Encryption and Hashing129
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol36
Bootstrapping for HElib32
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments31
Reusable Fuzzy Extractors for Low-Entropy Distributions31
Match Me if You Can: Matchmaking Encryption and Its Applications24
On the Local Leakage Resilience of Linear Secret Sharing Schemes20
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices17
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions16
The Deoxys AEAD Family15
Improved Differential-Linear Attacks with Applications to ARX Ciphers14
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange13
Tight Tradeoffs in Searchable Symmetric Encryption13
Selfie: reflections on TLS 1.3 with PSK12
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT12
On the Hardness of Module Learning with Errors with Short Distributions11
On Subversion-Resistant SNARKs11
Fine-Grained Cryptography Revisited10
Parameter Optimization and Larger Precision for (T)FHE10
The Number of Almost Perfect Nonlinear Functions Grows Exponentially9
Modeling for Three-Subset Division Property without Unknown Subset9
Actively Secure Setup for SPDZ8
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption8
Signed (Group) Diffie–Hellman Key Exchange with Tight Security8
Semi-quantum Money8
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange7
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model7
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC7
Rinocchio: SNARKs for Ring Arithmetic6
Toward Non-interactive Zero-Knowledge Proofs for NP from LWE6
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró6
Round-Optimal Secure Multi-party Computation6
From Fairness to Full Security in Multiparty Computation5
On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience5
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable5
Multiparty Generation of an RSA Modulus5
Bootstrapping for BGV and BFV Revisited5
On the (in)Security of ROS5
Fast Secure Two-Party ECDSA Signing5
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer5
0.26641488075256