Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    136 cites at Google Scholar
    712% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    107 cites at Google Scholar
    539% above average of year
    Last visited: Jun-2021
    Paper: DOI
  3. 3
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    107 cites at Google Scholar
    539% above average of year
    Last visited: Jul-2021
    Paper: DOI
  4. 4
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    90 cites at Google Scholar
    437% above average of year
    Last visited: Jul-2021
    Paper: DOI
  5. 5
    Albert Cheu, Adam D. Smith, Jonathan Ullman, David Zeber, and Maxim Zhilyaev:
    Distributed Differential Privacy via Shuffling.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    88 cites at Google Scholar
    426% above average of year
    Last visited: Jun-2021
    Paper: DOI
  6. 6
    Borja Balle, James Bell, Adrià Gascón, and Kobbi Nissim:
    The Privacy Blanket of the Shuffle Model.
    International Cryptology Conference (CRYPTO), 2019
    79 cites at Google Scholar
    372% above average of year
    Last visited: Jul-2021
    Paper: DOI
  7. 7
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    77 cites at Google Scholar
    360% above average of year
    Last visited: Jul-2021
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev:
    Scalable Zero Knowledge with No Trusted Setup.
    International Cryptology Conference (CRYPTO), 2019
    76 cites at Google Scholar
    354% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song:
    Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation.
    International Cryptology Conference (CRYPTO), 2019
    74 cites at Google Scholar
    342% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    74 cites at Google Scholar
    342% above average of year
    Last visited: Jul-2021
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    244 cites at Google Scholar
    845% above average of year
    Last visited: Jul-2021
    Paper: DOI
  2. 2
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    199 cites at Google Scholar
    671% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    187 cites at Google Scholar
    624% above average of year
    Last visited: Jun-2021
    Paper: DOI
  4. 4
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    165 cites at Google Scholar
    539% above average of year
    Last visited: Jun-2021
    Paper: DOI
  5. 5
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    143 cites at Google Scholar
    454% above average of year
    Last visited: Jul-2021
    Paper: DOI
  6. 6
    Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier:
    Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    International Cryptology Conference (CRYPTO), 2018
    128 cites at Google Scholar
    396% above average of year
    Last visited: Jun-2021
    Paper: DOI
  7. 7
    Dan Boneh, Manu Drijvers, and Gregory Neven:
    Compact Multi-signatures for Smaller Blockchains.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    125 cites at Google Scholar
    384% above average of year
    Last visited: Jul-2021
    Paper: DOI
  8. 8
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    109 cites at Google Scholar
    322% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    94 cites at Google Scholar
    264% above average of year
    Last visited: Jun-2021
    Paper: DOI
  10. 10
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    92 cites at Google Scholar
    256% above average of year
    Last visited: Jul-2021
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    1019 cites at Google Scholar
    2202% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    563 cites at Google Scholar
    1172% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    383 cites at Google Scholar
    765% above average of year
    Last visited: Jun-2021
    Paper: DOI
  4. 4
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    301 cites at Google Scholar
    580% above average of year
    Last visited: Jul-2021
    Paper: DOI
  5. 5
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    277 cites at Google Scholar
    526% above average of year
    Last visited: Jun-2021
    Paper: DOI
  6. 6
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    205 cites at Google Scholar
    363% above average of year
    Last visited: Jun-2021
    Paper: DOI
  7. 7
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    202 cites at Google Scholar
    356% above average of year
    Last visited: Jun-2021
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    192 cites at Google Scholar
    334% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas:
    Bitcoin as a Transaction Ledger: A Composable Treatment.
    International Cryptology Conference (CRYPTO), 2017
    141 cites at Google Scholar
    219% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, and Domenic Forte:
    Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    137 cites at Google Scholar
    209% above average of year
    Last visited: Jul-2021
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    377 cites at Google Scholar
    690% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    349 cites at Google Scholar
    631% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    341 cites at Google Scholar
    615% above average of year
    Last visited: Jul-2021
    Paper: DOI
  4. 4
    Jens Groth:
    On the Size of Pairing-Based Non-interactive Arguments.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    332 cites at Google Scholar
    596% above average of year
    Last visited: Jul-2021
    Paper: DOI
  5. 5
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    251 cites at Google Scholar
    426% above average of year
    Last visited: Jul-2021
    Paper: DOI
  6. 6
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    246 cites at Google Scholar
    416% above average of year
    Last visited: Jul-2021
    Paper: DOI
  7. 7
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    231 cites at Google Scholar
    384% above average of year
    Last visited: Jul-2021
    Paper: DOI
  8. 8
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    225 cites at Google Scholar
    372% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    202 cites at Google Scholar
    323% above average of year
    Last visited: Jun-2021
    Paper: DOI
  10. 10
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    199 cites at Google Scholar
    317% above average of year
    Last visited: Jul-2021
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    1189 cites at Google Scholar
    1835% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    394 cites at Google Scholar
    541% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    365 cites at Google Scholar
    494% above average of year
    Last visited: Jun-2021
    Paper: DOI
  4. 4
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    310 cites at Google Scholar
    405% above average of year
    Last visited: Jun-2021
    Paper: DOI
  5. 5
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    292 cites at Google Scholar
    375% above average of year
    Last visited: Jun-2021
    Paper: DOI
  6. 6
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    281 cites at Google Scholar
    357% above average of year
    Last visited: Jun-2021
    Paper: DOI
  7. 7
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    244 cites at Google Scholar
    297% above average of year
    Last visited: Jun-2021
    Paper: DOI
  8. 8
    Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner:
    Ciphers for MPC and FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    235 cites at Google Scholar
    282% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    232 cites at Google Scholar
    278% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    232 cites at Google Scholar
    278% above average of year
    Last visited: Jun-2021
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    488 cites at Google Scholar
    597% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    481 cites at Google Scholar
    587% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    333 cites at Google Scholar
    376% above average of year
    Last visited: Jul-2021
    Paper: DOI
  4. 4
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    333 cites at Google Scholar
    376% above average of year
    Last visited: Jun-2021
    Paper: DOI
  5. 5
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    326 cites at Google Scholar
    366% above average of year
    Last visited: Jun-2021
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    295 cites at Google Scholar
    322% above average of year
    Last visited: Jun-2021
    Paper: DOI
  7. 7
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    254 cites at Google Scholar
    263% above average of year
    Last visited: Jul-2021
    Paper: DOI
  8. 8
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    253 cites at Google Scholar
    262% above average of year
    Last visited: Jun-2021
    Paper: DOI
  9. 9
    Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, and Ling Song:
    Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2014
    237 cites at Google Scholar
    239% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    234 cites at Google Scholar
    234% above average of year
    Last visited: Jul-2021
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    1141 cites at Google Scholar
    1129% above average of year
    Last visited: Jul-2021
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    790 cites at Google Scholar
    751% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    775 cites at Google Scholar
    735% above average of year
    Last visited: Jul-2021
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    689 cites at Google Scholar
    642% above average of year
    Last visited: Jun-2021
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    603 cites at Google Scholar
    550% above average of year
    Last visited: Jun-2021
    Paper: DOI
  6. 6
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    519 cites at Google Scholar
    459% above average of year
    Last visited: Jun-2021
    Paper: DOI
  7. 7
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    512 cites at Google Scholar
    452% above average of year
    Last visited: Jun-2021
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    450 cites at Google Scholar
    385% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    395 cites at Google Scholar
    326% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    372 cites at Google Scholar
    301% above average of year
    Last visited: Jun-2021
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    934 cites at Google Scholar
    824% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    898 cites at Google Scholar
    788% above average of year
    Last visited: Jun-2021
    Paper: DOI
  3. 3
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    797 cites at Google Scholar
    688% above average of year
    Last visited: Jul-2021
    Paper: DOI
  4. 4
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    779 cites at Google Scholar
    670% above average of year
    Last visited: Jun-2021
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    724 cites at Google Scholar
    616% above average of year
    Last visited: Jul-2021
    Paper: DOI
  6. 6
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    590 cites at Google Scholar
    484% above average of year
    Last visited: Jul-2021
    Paper: DOI
  7. 7
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    543 cites at Google Scholar
    437% above average of year
    Last visited: Jun-2021
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    404 cites at Google Scholar
    300% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    384 cites at Google Scholar
    280% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Abhishek Banerjee, Chris Peikert, and Alon Rosen:
    Pseudorandom Functions and Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    367 cites at Google Scholar
    263% above average of year
    Last visited: Jul-2021
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1300 cites at Google Scholar
    907% above average of year
    Last visited: Jul-2021
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1153 cites at Google Scholar
    793% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    1103 cites at Google Scholar
    754% above average of year
    Last visited: Jul-2021
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    898 cites at Google Scholar
    595% above average of year
    Last visited: Jun-2021
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    873 cites at Google Scholar
    576% above average of year
    Last visited: Jul-2021
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    652 cites at Google Scholar
    405% above average of year
    Last visited: Jul-2021
    Paper: DOI
  7. 7
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    597 cites at Google Scholar
    362% above average of year
    Last visited: Jul-2021
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    577 cites at Google Scholar
    347% above average of year
    Last visited: Jun-2021
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    566 cites at Google Scholar
    338% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    541 cites at Google Scholar
    319% above average of year
    Last visited: Jun-2021
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    2067 cites at Google Scholar
    1256% above average of year
    Last visited: Jun-2021
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1406 cites at Google Scholar
    823% above average of year
    Last visited: Jul-2021
    Paper: DOI
  3. 3
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1398 cites at Google Scholar
    817% above average of year
    Last visited: Jun-2021
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1213 cites at Google Scholar
    696% above average of year
    Last visited: Jul-2021
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    891 cites at Google Scholar
    485% above average of year
    Last visited: Jul-2021
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    694 cites at Google Scholar
    355% above average of year
    Last visited: Jul-2021
    Paper: DOI
  7. 7
    Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, and Paul Zimmermann:
    Factorization of a 768-Bit RSA Modulus.
    International Cryptology Conference (CRYPTO), 2010
    594 cites at Google Scholar
    290% above average of year
    Last visited: Jun-2021
    Paper: DOI
  8. 8
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    581 cites at Google Scholar
    281% above average of year
    Last visited: Jul-2021
    Paper: DOI
  9. 9
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    539 cites at Google Scholar
    254% above average of year
    Last visited: Jul-2021
    Paper: DOI
  10. 10
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    481 cites at Google Scholar
    216% above average of year
    Last visited: Jul-2021
    Paper: DOI