Journal of Cryptology

Papers
(The TQCC of Journal of Cryptology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Algebraically Structured LWE, Revisited207
Cryptographic Primitives with Hinting Property52
Masking the GLP Lattice-Based Signature Scheme at Any Order36
The Price of Active Security in Cryptographic Protocols21
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery20
A Bad Day to Die Hard: Correcting the Dieharder Battery17
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm15
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers15
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage14
New Representations of the AES Key Schedule14
Compact NIZKs from Standard Assumptions on Bilinear Maps14
Minicrypt Primitives with Algebraic Structure and Applications14
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró13
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol12
Rinocchio: SNARKs for Ring Arithmetic11
On Abelian and Homomorphic Secret Sharing Schemes11
Two Generalizations of Almost Perfect Nonlinearity11
Non-malleable Vector Commitments via Local Equivocability10
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires9
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.39
Multiparty Generation of an RSA Modulus9
Ascon v1.2: Lightweight Authenticated Encryption and Hashing9
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance8
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness8
Breaking the $$O(\sqrt{n})$$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party8
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices8
Modeling for Three-Subset Division Property without Unknown Subset7
No-Signaling Linear PCPs7
Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange7
The Retracing Boomerang Attack, with Application to Reduced-Round AES7
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer6
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation6
Cover Attacks for Elliptic Curves over Cubic Extension Fields6
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves6
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting5
Fine-Grained Cryptography Revisited5
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic5
Topical Collection on Computing on Encrypted Data5
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates5
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them4
Rotational Differential-Linear Cryptanalysis Revisited4
Is There an Oblivious RAM Lower Bound for Online Reads?4
The Design and Evolution of OCB4
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments4
Parameter Optimization and Larger Precision for (T)FHE4
Analysis of Multivariate Encryption Schemes: Application to Dob and $${C}^{*}$$4
Lattice-Based Programmable Hash Functions and Applications4
Efficient Perfectly Secure Computation with Optimal Resilience4
Topology-Hiding Communication from Minimal Assumptions4
Signed (Group) Diffie–Hellman Key Exchange with Tight Security4
0.026749849319458