1
Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
Fully Homomorphic Encryption over the Integers.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
1247% above average of year
Last visited: Mar-2022
2
Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
On Ideal Lattices and Learning with Errors over Rings.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
864% above average of year
Last visited: Feb-2022
3
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
791% above average of year
Last visited: Mar-2022
4
Rosario Gennaro, Craig Gentry, and Bryan Parno:
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
International Cryptology Conference (CRYPTO), 2010
675% above average of year
Last visited: Feb-2022
5
Shweta Agrawal, Dan Boneh, and Xavier Boyen:
Efficient Lattice (H)IBE in the Standard Model.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
481% above average of year
Last visited: Feb-2022
6
David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
Bonsai Trees, or How to Delegate a Lattice Basis.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
451% above average of year
Last visited: Feb-2022
7
Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, and Paul Zimmermann:
Factorization of a 768-Bit RSA Modulus.
International Cryptology Conference (CRYPTO), 2010
286% above average of year
Last visited: Mar-2022
8
Allison B. Lewko and Brent Waters:
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
Theory of Cryptography Conference (TCC), 2010
267% above average of year
Last visited: Mar-2022
9
Tatsuaki Okamoto and Katsuyuki Takashima:
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
International Cryptology Conference (CRYPTO), 2010
246% above average of year
Last visited: Feb-2022
10
Matthieu Rivain and Emmanuel Prouff:
Provably Secure Higher-Order Masking of AES.
Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2010
216% above average of year
Last visited: Feb-2022