Journal of Cryptology

Title Publication Date Language Citations
Security Arguments for Digital Signatures and Blind Signatures2000/03/21English716
Short Signatures from the Weil Pairing2004/07/30English438
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security2004/03/03English346
Security and Composition of Multiparty Cryptographic Protocols2000/01/01English257
Selecting Cryptographic Key Sizes2001/08/14English170
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups2007/09/11English169
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities1997/09/01English169
Compact Proofs of Retrievability2012/09/01English157
The Weil Pairing, and Its Efficient Calculation2004/08/12English154
TFHE: Fast Fully Homomorphic Encryption Over the Torus2019/04/25English149
Privacy Preserving Data Mining2002/06/01English144
A Proof of Security of Yao’s Protocol for Two-Party Computation2008/12/09English141
A Taxonomy of Pairing-Friendly Elliptic Curves2009/06/18English114
On the Importance of Eliminating Errors in Cryptographic Computations2000/11/27English111
Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive2010/10/14English109
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions2007/09/14English109
Hierarchical Threshold Secret Sharing2007/02/06English106
A One Round Protocol for Tripartite Diffie–Hellman2004/06/23English102
Efficient Cache Attacks on AES, and Countermeasures2009/07/23English102
Feedback shift registers, 2-adic span, and combiners with memory1997/03/01English101
Mutual Information Analysis: a Comprehensive Study2010/10/21English98
Cryptographic Hash Functions from Expander Graphs2007/09/15English93
On the Contrast in Visual Cryptography Schemes1999/09/01English88
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems2006/05/24English86
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm2008/07/30English85
Secure Integration of Asymmetric and Symmetric Encryption Schemes2011/12/02English85
FlipIt: The Game of “Stealthy Takeover”2012/10/26English73
The Discrete Logarithm Problem on Elliptic Curves of Trace One1999/06/01English73
A Proof of the Security of Quantum Key Distribution2006/04/24English71
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme2003/06/01English71