Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
The Price of Active Security in Cryptographic Protocols46
Algebraically Structured LWE, Revisited36
Cryptographic Primitives with Hinting Property30
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery26
Masking the GLP Lattice-Based Signature Scheme at Any Order25
Exploiting the Symmetry of $$\mathbb {Z}^n$$: Randomization and the Automorphism Problem21
Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions20
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm19
Compact NIZKs from Standard Assumptions on Bilinear Maps19
New Representations of the AES Key Schedule18
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK17
Minicrypt Primitives with Algebraic Structure and Applications16
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol15
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-Key Encryption Schemes14
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró13
Rinocchio: SNARKs for Ring Arithmetic13
Two Generalizations of Almost Perfect Nonlinearity13
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires12
Non-malleable Vector Commitments via Local Equivocability11
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions10
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.310
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party10
The Retracing Boomerang Attack, with Application to Reduced-Round AES9
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance9
No-Signaling Linear PCPs9
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves8
Topical Collection on Computing on Encrypted Data8
Cover Attacks for Elliptic Curves over Cubic Extension Fields8
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation8
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates7
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting7
Four Attacks and a Proof for Telegram7
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic7
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them7
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments6
Signed (Group) Diffie–Hellman Key Exchange with Tight Security6
Lattice-Based Programmable Hash Functions and Applications6
Efficient Algorithms for the Detection of (N, N)-Splittings and Endomorphisms6
Efficient Perfectly Secure Computation with Optimal Resilience6
Rotational Differential-Linear Cryptanalysis Revisited5
Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs5
A New Linear Distinguisher for Four-Round AES5
Space-Efficient and Noise-Robust Quantum Factoring5
Topology-Hiding Communication from Minimal Assumptions5
Analysis of Multivariate Encryption Schemes: Application to Dob and $${C}^{*}$$5
Parameter Optimization and Larger Precision for (T)FHE5
0.27601385116577