Journal of Cryptology

Title Publication Date Language Citations
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches2010/10/19English70
Bonsai Trees, or How to Delegate a Lattice Basis2011/09/06English66
Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups2003/07/11English65
Linking information reconciliation and privacy amplification1997/03/01English62
The Size of a Share Must Be Large1997/09/01English62
On Probability of Success in Linear and Differential Cryptanalysis2007/09/14English61
Constructive and destructive facets of Weil descent on elliptic curves2002/03/01English59
Quark: A Lightweight Hash2012/05/10English57
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups2002/09/01English54
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography2005/05/03English54
A construction of a cipher from a single pseudorandom permutation1997/06/01English54
Security Proofs for Identity-Based Identification and Signature Schemes2008/08/22English54
How To Construct Constant-Round Zero-Knowledge Proof Systems for NP1996/01/0154
Secure Proxy Signature Schemes for Delegation of Signing Rights2010/10/16English53
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products2012/02/01English51
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*2002/01/01English51
Updating Key Size Estimations for Pairings2018/01/29English50
Secure Classical Bit Commitment Using Fixed Capacity Communication Channels2005/05/27English47
Scalable Protocols for Authenticated Group Key Exchange2006/09/25English47
Side-Channel Resistant Crypto for Less than 2,300 GE2010/10/27English47
Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes2007/09/05English45
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces2002/06/01English44
Efficient Implementation of Pairing-Based Cryptosystems2004/09/01English41
Lattice Reduction: A Toolbox for the Cryptanalyst1998/06/01English41
Efficient Selective Identity-Based Encryption Without Random Oracles2010/09/15English41
Tweakable Block Ciphers2010/09/02English40
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries2009/04/07English40
Dynamic Proofs of Retrievability Via Oblivious RAM2015/09/22English40
Computationally Secure Oblivious Transfer2004/10/21English39
A Forward-Secure Public-Key Encryption Scheme2007/02/06English39