Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    41 cites at Google Scholar
    727% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    40 cites at Google Scholar
    707% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Luca De Feo and Steven D. Galbraith:
    SeaSign: Compact Isogeny Signatures from Class Group Actions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    35 cites at Google Scholar
    606% above average of year
    Last visited: Feb-2020
    Paper: DOI
  4. 4
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    32 cites at Google Scholar
    545% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner:
    Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
    International Cryptology Conference (CRYPTO), 2019
    29 cites at Google Scholar
    485% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    28 cites at Google Scholar
    465% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    27 cites at Google Scholar
    444% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Andrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, and Thomas Vidick:
    Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    24 cites at Google Scholar
    384% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Joël Alwen, Sandro Coretti, and Yevgeniy Dodis:
    The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    23 cites at Google Scholar
    364% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    22 cites at Google Scholar
    344% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    124 cites at Google Scholar
    854% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    84 cites at Google Scholar
    546% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    82 cites at Google Scholar
    531% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    78 cites at Google Scholar
    500% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    75 cites at Google Scholar
    477% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    57 cites at Google Scholar
    338% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    56 cites at Google Scholar
    331% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    49 cites at Google Scholar
    277% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Seny Kamara and Tarik Moataz:
    SQL on Structurally-Encrypted Databases.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    49 cites at Google Scholar
    277% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Sanjam Garg and Akshayaram Srinivasan:
    Two-Round Multiparty Secure Computation from Minimal Assumptions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    48 cites at Google Scholar
    269% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    559 cites at Google Scholar
    1999% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    312 cites at Google Scholar
    1071% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    165 cites at Google Scholar
    520% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    136 cites at Google Scholar
    411% above average of year
    Last visited: Feb-2020
    Paper: DOI
  5. 5
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    123 cites at Google Scholar
    362% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Prabhanjan Ananth, Abhishek Jain, and Amit Sahai:
    Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
    International Cryptology Conference (CRYPTO), 2017
    105 cites at Google Scholar
    294% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Martin R. Albrecht:
    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    104 cites at Google Scholar
    290% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    101 cites at Google Scholar
    279% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    86 cites at Google Scholar
    223% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Nico Döttling and Sanjam Garg:
    Identity-Based Encryption from the Diffie-Hellman Assumption.
    International Cryptology Conference (CRYPTO), 2017
    81 cites at Google Scholar
    204% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    241 cites at Google Scholar
    613% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    228 cites at Google Scholar
    575% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    174 cites at Google Scholar
    415% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    174 cites at Google Scholar
    415% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    174 cites at Google Scholar
    415% above average of year
    Last visited: Feb-2020
    Paper: DOI
  6. 6
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    163 cites at Google Scholar
    382% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    155 cites at Google Scholar
    359% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    152 cites at Google Scholar
    350% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    149 cites at Google Scholar
    341% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Taechan Kim and Razvan Barbulescu:
    Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case.
    International Cryptology Conference (CRYPTO), 2016
    145 cites at Google Scholar
    329% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    746 cites at Google Scholar
    1532% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    276 cites at Google Scholar
    504% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    267 cites at Google Scholar
    484% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    242 cites at Google Scholar
    429% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    226 cites at Google Scholar
    394% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    225 cites at Google Scholar
    392% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    187 cites at Google Scholar
    309% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    182 cites at Google Scholar
    298% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    169 cites at Google Scholar
    270% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman:
    Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    166 cites at Google Scholar
    263% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    381 cites at Google Scholar
    571% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    349 cites at Google Scholar
    515% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    298 cites at Google Scholar
    425% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    250 cites at Google Scholar
    341% above average of year
    Last visited: Feb-2020
    Paper: DOI
  5. 5
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    238 cites at Google Scholar
    319% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    226 cites at Google Scholar
    298% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    224 cites at Google Scholar
    295% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Zvika Brakerski and Guy N. Rothblum:
    Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
    Theory of Cryptography Conference (TCC), 2014
    212 cites at Google Scholar
    274% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    205 cites at Google Scholar
    261% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    185 cites at Google Scholar
    226% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    871 cites at Google Scholar
    1054% above average of year
    Last visited: Feb-2020
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    702 cites at Google Scholar
    830% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    608 cites at Google Scholar
    706% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    570 cites at Google Scholar
    655% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    418 cites at Google Scholar
    454% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    416 cites at Google Scholar
    451% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    390 cites at Google Scholar
    417% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    367 cites at Google Scholar
    386% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    330 cites at Google Scholar
    337% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    291 cites at Google Scholar
    286% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    679 cites at Google Scholar
    709% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    670 cites at Google Scholar
    699% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    645 cites at Google Scholar
    669% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    601 cites at Google Scholar
    616% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    586 cites at Google Scholar
    598% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    466 cites at Google Scholar
    455% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    449 cites at Google Scholar
    435% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    353 cites at Google Scholar
    321% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    323 cites at Google Scholar
    285% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi:
    Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    302 cites at Google Scholar
    260% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1108 cites at Google Scholar
    907% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    985 cites at Google Scholar
    795% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    915 cites at Google Scholar
    731% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    764 cites at Google Scholar
    594% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    694 cites at Google Scholar
    531% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    569 cites at Google Scholar
    417% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    511 cites at Google Scholar
    364% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    478 cites at Google Scholar
    334% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    458 cites at Google Scholar
    316% above average of year
    Last visited: Feb-2020
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    449 cites at Google Scholar
    308% above average of year
    Last visited: Mar-2020
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1739 cites at Google Scholar
    1269% above average of year
    Last visited: Mar-2020
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1205 cites at Google Scholar
    849% above average of year
    Last visited: Mar-2020
    Paper: DOI
  3. 3
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1057 cites at Google Scholar
    732% above average of year
    Last visited: Mar-2020
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1034 cites at Google Scholar
    714% above average of year
    Last visited: Mar-2020
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    731 cites at Google Scholar
    476% above average of year
    Last visited: Mar-2020
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    571 cites at Google Scholar
    350% above average of year
    Last visited: Mar-2020
    Paper: DOI
  7. 7
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    524 cites at Google Scholar
    313% above average of year
    Last visited: Mar-2020
    Paper: DOI
  8. 8
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    495 cites at Google Scholar
    290% above average of year
    Last visited: Mar-2020
    Paper: DOI
  9. 9
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    423 cites at Google Scholar
    233% above average of year
    Last visited: Mar-2020
    Paper: DOI
  10. 10
    Damien Stehlé and Ron Steinfeld:
    Faster Fully Homomorphic Encryption.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2010
    394 cites at Google Scholar
    210% above average of year
    Last visited: Mar-2020
    Paper: DOI