Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    183 cites at Google Scholar
    653% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    159 cites at Google Scholar
    554% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Albert Cheu, Adam D. Smith, Jonathan Ullman, David Zeber, and Maxim Zhilyaev:
    Distributed Differential Privacy via Shuffling.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    151 cites at Google Scholar
    521% above average of year
    Last visited: Feb-2022
    Paper: DOI
  4. 4
    Borja Balle, James Bell, Adrià Gascón, and Kobbi Nissim:
    The Privacy Blanket of the Shuffle Model.
    International Cryptology Conference (CRYPTO), 2019
    128 cites at Google Scholar
    427% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    128 cites at Google Scholar
    427% above average of year
    Last visited: Mar-2022
    Paper: DOI
  6. 6
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    124 cites at Google Scholar
    410% above average of year
    Last visited: Feb-2022
    Paper: DOI
  7. 7
    Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song:
    Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation.
    International Cryptology Conference (CRYPTO), 2019
    109 cites at Google Scholar
    349% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev:
    Scalable Zero Knowledge with No Trusted Setup.
    International Cryptology Conference (CRYPTO), 2019
    103 cites at Google Scholar
    324% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    101 cites at Google Scholar
    316% above average of year
    Last visited: Feb-2022
    Paper: DOI
  10. 10
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    97 cites at Google Scholar
    299% above average of year
    Last visited: Mar-2022
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    307 cites at Google Scholar
    828% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    276 cites at Google Scholar
    734% above average of year
    Last visited: Feb-2022
    Paper: DOI
  3. 3
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    271 cites at Google Scholar
    719% above average of year
    Last visited: Mar-2022
    Paper: DOI
  4. 4
    Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier:
    Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    International Cryptology Conference (CRYPTO), 2018
    216 cites at Google Scholar
    553% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    191 cites at Google Scholar
    477% above average of year
    Last visited: Mar-2022
    Paper: DOI
  6. 6
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    187 cites at Google Scholar
    465% above average of year
    Last visited: Feb-2022
    Paper: DOI
  7. 7
    Dan Boneh, Manu Drijvers, and Gregory Neven:
    Compact Multi-signatures for Smaller Blockchains.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    180 cites at Google Scholar
    444% above average of year
    Last visited: Feb-2022
    Paper: DOI
  8. 8
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    153 cites at Google Scholar
    362% above average of year
    Last visited: Feb-2022
    Paper: DOI
  9. 9
    Georg Fuchsbauer, Eike Kiltz, and Julian Loss:
    The Algebraic Group Model and its Applications.
    International Cryptology Conference (CRYPTO), 2018
    125 cites at Google Scholar
    278% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, and Ian Miers:
    Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
    International Cryptology Conference (CRYPTO), 2018
    114 cites at Google Scholar
    245% above average of year
    Last visited: Feb-2022
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    1243 cites at Google Scholar
    2246% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    621 cites at Google Scholar
    1072% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    615 cites at Google Scholar
    1061% above average of year
    Last visited: Mar-2022
    Paper: DOI
  4. 4
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    353 cites at Google Scholar
    566% above average of year
    Last visited: Feb-2022
    Paper: DOI
  5. 5
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    344 cites at Google Scholar
    549% above average of year
    Last visited: Feb-2022
    Paper: DOI
  6. 6
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    267 cites at Google Scholar
    404% above average of year
    Last visited: Feb-2022
    Paper: DOI
  7. 7
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    246 cites at Google Scholar
    364% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    214 cites at Google Scholar
    304% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas:
    Bitcoin as a Transaction Ledger: A Composable Treatment.
    International Cryptology Conference (CRYPTO), 2017
    178 cites at Google Scholar
    236% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Seny Kamara and Tarik Moataz:
    Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    165 cites at Google Scholar
    211% above average of year
    Last visited: Mar-2022
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    469 cites at Google Scholar
    756% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    Jens Groth:
    On the Size of Pairing-Based Non-interactive Arguments.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    448 cites at Google Scholar
    718% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    434 cites at Google Scholar
    692% above average of year
    Last visited: Mar-2022
    Paper: DOI
  4. 4
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    430 cites at Google Scholar
    685% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    284 cites at Google Scholar
    419% above average of year
    Last visited: Feb-2022
    Paper: DOI
  6. 6
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    283 cites at Google Scholar
    417% above average of year
    Last visited: Mar-2022
    Paper: DOI
  7. 7
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    262 cites at Google Scholar
    378% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    251 cites at Google Scholar
    358% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, and María Naya-Plasencia:
    Breaking Symmetric Cryptosystems Using Quantum Period Finding.
    International Cryptology Conference (CRYPTO), 2016
    220 cites at Google Scholar
    302% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    217 cites at Google Scholar
    296% above average of year
    Last visited: Feb-2022
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    1335 cites at Google Scholar
    1856% above average of year
    Last visited: Mar-2022
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    472 cites at Google Scholar
    591% above average of year
    Last visited: Feb-2022
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    396 cites at Google Scholar
    480% above average of year
    Last visited: Feb-2022
    Paper: DOI
  4. 4
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    394 cites at Google Scholar
    477% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    321 cites at Google Scholar
    370% above average of year
    Last visited: Feb-2022
    Paper: DOI
  6. 6
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    310 cites at Google Scholar
    354% above average of year
    Last visited: Feb-2022
    Paper: DOI
  7. 7
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    295 cites at Google Scholar
    332% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner:
    Ciphers for MPC and FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    286 cites at Google Scholar
    319% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Yosuke Todo:
    Structural Evaluation by Generalized Integral Property.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    253 cites at Google Scholar
    271% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    251 cites at Google Scholar
    268% above average of year
    Last visited: Jan-2022
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    541 cites at Google Scholar
    603% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    523 cites at Google Scholar
    579% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    372 cites at Google Scholar
    383% above average of year
    Last visited: Feb-2022
    Paper: DOI
  4. 4
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    364 cites at Google Scholar
    373% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    359 cites at Google Scholar
    366% above average of year
    Last visited: Mar-2022
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    316 cites at Google Scholar
    311% above average of year
    Last visited: Mar-2022
    Paper: DOI
  7. 7
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    291 cites at Google Scholar
    278% above average of year
    Last visited: Feb-2022
    Paper: DOI
  8. 8
    Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, and Ling Song:
    Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2014
    275 cites at Google Scholar
    257% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    269 cites at Google Scholar
    249% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    249 cites at Google Scholar
    223% above average of year
    Last visited: Mar-2022
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    1277 cites at Google Scholar
    1171% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    853 cites at Google Scholar
    749% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    829 cites at Google Scholar
    725% above average of year
    Last visited: Mar-2022
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    735 cites at Google Scholar
    632% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    700 cites at Google Scholar
    597% above average of year
    Last visited: Mar-2022
    Paper: DOI
  6. 6
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    589 cites at Google Scholar
    486% above average of year
    Last visited: Mar-2022
    Paper: DOI
  7. 7
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    572 cites at Google Scholar
    469% above average of year
    Last visited: Feb-2022
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    468 cites at Google Scholar
    366% above average of year
    Last visited: Feb-2022
    Paper: DOI
  9. 9
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    414 cites at Google Scholar
    312% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    411 cites at Google Scholar
    309% above average of year
    Last visited: Feb-2022
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    1068 cites at Google Scholar
    878% above average of year
    Last visited: Feb-2022
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    1012 cites at Google Scholar
    827% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    885 cites at Google Scholar
    711% above average of year
    Last visited: Feb-2022
    Paper: DOI
  4. 4
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    847 cites at Google Scholar
    676% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    807 cites at Google Scholar
    639% above average of year
    Last visited: Feb-2022
    Paper: DOI
  6. 6
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    664 cites at Google Scholar
    508% above average of year
    Last visited: Mar-2022
    Paper: DOI
  7. 7
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    570 cites at Google Scholar
    422% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    413 cites at Google Scholar
    278% above average of year
    Last visited: Feb-2022
    Paper: DOI
  9. 9
    Abhishek Banerjee, Chris Peikert, and Alon Rosen:
    Pseudorandom Functions and Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    411 cites at Google Scholar
    276% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    410 cites at Google Scholar
    276% above average of year
    Last visited: Feb-2022
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1371 cites at Google Scholar
    891% above average of year
    Last visited: Mar-2022
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1218 cites at Google Scholar
    780% above average of year
    Last visited: Mar-2022
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    1192 cites at Google Scholar
    761% above average of year
    Last visited: Mar-2022
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    965 cites at Google Scholar
    597% above average of year
    Last visited: Mar-2022
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    953 cites at Google Scholar
    589% above average of year
    Last visited: Feb-2022
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    694 cites at Google Scholar
    402% above average of year
    Last visited: Mar-2022
    Paper: DOI
  7. 7
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    628 cites at Google Scholar
    354% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    622 cites at Google Scholar
    349% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    598 cites at Google Scholar
    332% above average of year
    Last visited: Mar-2022
    Paper: DOI
  10. 10
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    592 cites at Google Scholar
    328% above average of year
    Last visited: Feb-2022
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    2201 cites at Google Scholar
    1247% above average of year
    Last visited: Mar-2022
    Paper: DOI
  2. 2
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1575 cites at Google Scholar
    864% above average of year
    Last visited: Feb-2022
    Paper: DOI
  3. 3
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1456 cites at Google Scholar
    791% above average of year
    Last visited: Mar-2022
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1266 cites at Google Scholar
    675% above average of year
    Last visited: Feb-2022
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    949 cites at Google Scholar
    481% above average of year
    Last visited: Feb-2022
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    900 cites at Google Scholar
    451% above average of year
    Last visited: Feb-2022
    Paper: DOI
  7. 7
    Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, and Paul Zimmermann:
    Factorization of a 768-Bit RSA Modulus.
    International Cryptology Conference (CRYPTO), 2010
    631 cites at Google Scholar
    286% above average of year
    Last visited: Mar-2022
    Paper: DOI
  8. 8
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    600 cites at Google Scholar
    267% above average of year
    Last visited: Mar-2022
    Paper: DOI
  9. 9
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    565 cites at Google Scholar
    246% above average of year
    Last visited: Feb-2022
    Paper: DOI
  10. 10
    Matthieu Rivain and Emmanuel Prouff:
    Provably Secure Higher-Order Masking of AES.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2010
    516 cites at Google Scholar
    216% above average of year
    Last visited: Feb-2022
    Paper: DOI