Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    111 cites at Google Scholar
    708% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    96 cites at Google Scholar
    599% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    81 cites at Google Scholar
    490% above average of year
    Last visited: Feb-2021
    Paper: DOI
  4. 4
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    72 cites at Google Scholar
    424% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Albert Cheu, Adam D. Smith, Jonathan Ullman, David Zeber, and Maxim Zhilyaev:
    Distributed Differential Privacy via Shuffling.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    70 cites at Google Scholar
    410% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner:
    Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
    International Cryptology Conference (CRYPTO), 2019
    67 cites at Google Scholar
    388% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    67 cites at Google Scholar
    388% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    62 cites at Google Scholar
    351% above average of year
    Last visited: Feb-2021
    Paper: DOI
  9. 9
    Borja Balle, James Bell, Adrià Gascón, and Kobbi Nissim:
    The Privacy Blanket of the Shuffle Model.
    International Cryptology Conference (CRYPTO), 2019
    58 cites at Google Scholar
    322% above average of year
    Last visited: Feb-2021
    Paper: DOI
  10. 10
    Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev:
    Scalable Zero Knowledge with No Trusted Setup.
    International Cryptology Conference (CRYPTO), 2019
    58 cites at Google Scholar
    322% above average of year
    Last visited: Feb-2021
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    221 cites at Google Scholar
    867% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    174 cites at Google Scholar
    662% above average of year
    Last visited: Mar-2021
    Paper: DOI
  3. 3
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    156 cites at Google Scholar
    583% above average of year
    Last visited: Mar-2021
    Paper: DOI
  4. 4
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    143 cites at Google Scholar
    526% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    130 cites at Google Scholar
    469% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier:
    Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    International Cryptology Conference (CRYPTO), 2018
    112 cites at Google Scholar
    390% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Dan Boneh, Manu Drijvers, and Gregory Neven:
    Compact Multi-signatures for Smaller Blockchains.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    105 cites at Google Scholar
    360% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    98 cites at Google Scholar
    329% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    84 cites at Google Scholar
    268% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    82 cites at Google Scholar
    259% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    886 cites at Google Scholar
    2103% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    501 cites at Google Scholar
    1146% above average of year
    Last visited: Mar-2021
    Paper: DOI
  3. 3
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    315 cites at Google Scholar
    683% above average of year
    Last visited: Feb-2021
    Paper: DOI
  4. 4
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    277 cites at Google Scholar
    589% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    253 cites at Google Scholar
    529% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    183 cites at Google Scholar
    355% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    176 cites at Google Scholar
    338% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    165 cites at Google Scholar
    310% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Martin R. Albrecht:
    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    133 cites at Google Scholar
    231% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas:
    Bitcoin as a Transaction Ledger: A Composable Treatment.
    International Cryptology Conference (CRYPTO), 2017
    128 cites at Google Scholar
    218% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    351 cites at Google Scholar
    688% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    321 cites at Google Scholar
    620% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    288 cites at Google Scholar
    546% above average of year
    Last visited: Feb-2021
    Paper: DOI
  4. 4
    Jens Groth:
    On the Size of Pairing-Based Non-interactive Arguments.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    268 cites at Google Scholar
    501% above average of year
    Last visited: Feb-2021
    Paper: DOI
  5. 5
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    227 cites at Google Scholar
    409% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    223 cites at Google Scholar
    400% above average of year
    Last visited: Feb-2021
    Paper: DOI
  7. 7
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    209 cites at Google Scholar
    369% above average of year
    Last visited: Feb-2021
    Paper: DOI
  8. 8
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    207 cites at Google Scholar
    364% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    198 cites at Google Scholar
    344% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    191 cites at Google Scholar
    329% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    1053 cites at Google Scholar
    1724% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    379 cites at Google Scholar
    556% above average of year
    Last visited: Mar-2021
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    331 cites at Google Scholar
    473% above average of year
    Last visited: Mar-2021
    Paper: DOI
  4. 4
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    294 cites at Google Scholar
    409% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    273 cites at Google Scholar
    373% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    273 cites at Google Scholar
    373% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    231 cites at Google Scholar
    300% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    224 cites at Google Scholar
    288% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    215 cites at Google Scholar
    272% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman:
    Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    207 cites at Google Scholar
    259% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    461 cites at Google Scholar
    589% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    461 cites at Google Scholar
    589% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    323 cites at Google Scholar
    383% above average of year
    Last visited: Mar-2021
    Paper: DOI
  4. 4
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    316 cites at Google Scholar
    373% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    307 cites at Google Scholar
    359% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    280 cites at Google Scholar
    319% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    248 cites at Google Scholar
    271% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    246 cites at Google Scholar
    268% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    219 cites at Google Scholar
    227% above average of year
    Last visited: Feb-2021
    Paper: DOI
  10. 10
    Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, and Ling Song:
    Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2014
    214 cites at Google Scholar
    220% above average of year
    Last visited: Feb-2021
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    1083 cites at Google Scholar
    1119% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    764 cites at Google Scholar
    760% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    738 cites at Google Scholar
    731% above average of year
    Last visited: Feb-2021
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    659 cites at Google Scholar
    642% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    564 cites at Google Scholar
    535% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    494 cites at Google Scholar
    456% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    481 cites at Google Scholar
    441% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    443 cites at Google Scholar
    399% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    381 cites at Google Scholar
    329% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    355 cites at Google Scholar
    300% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    873 cites at Google Scholar
    797% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    846 cites at Google Scholar
    770% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    759 cites at Google Scholar
    680% above average of year
    Last visited: Mar-2021
    Paper: DOI
  4. 4
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    757 cites at Google Scholar
    678% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    692 cites at Google Scholar
    611% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    548 cites at Google Scholar
    463% above average of year
    Last visited: Feb-2021
    Paper: DOI
  7. 7
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    527 cites at Google Scholar
    442% above average of year
    Last visited: Feb-2021
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    392 cites at Google Scholar
    303% above average of year
    Last visited: Mar-2021
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    371 cites at Google Scholar
    281% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Abhishek Banerjee, Chris Peikert, and Alon Rosen:
    Pseudorandom Functions and Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    348 cites at Google Scholar
    258% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1230 cites at Google Scholar
    889% above average of year
    Last visited: Feb-2021
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1104 cites at Google Scholar
    787% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    1061 cites at Google Scholar
    753% above average of year
    Last visited: Feb-2021
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    871 cites at Google Scholar
    600% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    838 cites at Google Scholar
    574% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    621 cites at Google Scholar
    399% above average of year
    Last visited: Feb-2021
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    566 cites at Google Scholar
    355% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    565 cites at Google Scholar
    354% above average of year
    Last visited: Feb-2021
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    539 cites at Google Scholar
    333% above average of year
    Last visited: Feb-2021
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    524 cites at Google Scholar
    321% above average of year
    Last visited: Mar-2021
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    2004 cites at Google Scholar
    1257% above average of year
    Last visited: Mar-2021
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1342 cites at Google Scholar
    809% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1319 cites at Google Scholar
    793% above average of year
    Last visited: Mar-2021
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1186 cites at Google Scholar
    703% above average of year
    Last visited: Mar-2021
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    858 cites at Google Scholar
    481% above average of year
    Last visited: Mar-2021
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    672 cites at Google Scholar
    355% above average of year
    Last visited: Mar-2021
    Paper: DOI
  7. 7
    Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, and Paul Zimmermann:
    Factorization of a 768-Bit RSA Modulus.
    International Cryptology Conference (CRYPTO), 2010
    584 cites at Google Scholar
    295% above average of year
    Last visited: Mar-2021
    Paper: DOI
  8. 8
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    566 cites at Google Scholar
    283% above average of year
    Last visited: Feb-2021
    Paper: DOI
  9. 9
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    535 cites at Google Scholar
    262% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    473 cites at Google Scholar
    220% above average of year
    Last visited: Mar-2021
    Paper: DOI