Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    58 cites at Google Scholar
    773% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    54 cites at Google Scholar
    713% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Luca De Feo and Steven D. Galbraith:
    SeaSign: Compact Isogeny Signatures from Class Group Actions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    39 cites at Google Scholar
    487% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    38 cites at Google Scholar
    472% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    35 cites at Google Scholar
    427% above average of year
    Last visited: Jun-2020
    Paper: DOI
  6. 6
    Andrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, and Thomas Vidick:
    Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    33 cites at Google Scholar
    397% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner:
    Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
    International Cryptology Conference (CRYPTO), 2019
    33 cites at Google Scholar
    397% above average of year
    Last visited: May-2020
    Paper: DOI
  8. 8
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    32 cites at Google Scholar
    382% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny:
    Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    32 cites at Google Scholar
    382% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    31 cites at Google Scholar
    367% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    142 cites at Google Scholar
    826% above average of year
    Last visited: May-2020
    Paper: DOI
  2. 2
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    103 cites at Google Scholar
    572% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    98 cites at Google Scholar
    539% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    96 cites at Google Scholar
    526% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    82 cites at Google Scholar
    435% above average of year
    Last visited: May-2020
    Paper: DOI
  6. 6
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    62 cites at Google Scholar
    304% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    62 cites at Google Scholar
    304% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    61 cites at Google Scholar
    298% above average of year
    Last visited: May-2020
    Paper: DOI
  9. 9
    Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier:
    Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    International Cryptology Conference (CRYPTO), 2018
    61 cites at Google Scholar
    298% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Dan Boneh, Manu Drijvers, and Gregory Neven:
    Compact Multi-signatures for Smaller Blockchains.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    59 cites at Google Scholar
    285% above average of year
    Last visited: May-2020
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    644 cites at Google Scholar
    2041% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    341 cites at Google Scholar
    1034% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    221 cites at Google Scholar
    635% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    188 cites at Google Scholar
    525% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    177 cites at Google Scholar
    489% above average of year
    Last visited: Jun-2020
    Paper: DOI
  6. 6
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    138 cites at Google Scholar
    359% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Martin R. Albrecht:
    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    118 cites at Google Scholar
    292% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    110 cites at Google Scholar
    266% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Prabhanjan Ananth, Abhishek Jain, and Amit Sahai:
    Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
    International Cryptology Conference (CRYPTO), 2017
    108 cites at Google Scholar
    259% above average of year
    Last visited: May-2020
    Paper: DOI
  10. 10
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    98 cites at Google Scholar
    226% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    274 cites at Google Scholar
    662% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    240 cites at Google Scholar
    567% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    198 cites at Google Scholar
    450% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    183 cites at Google Scholar
    409% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    177 cites at Google Scholar
    392% above average of year
    Last visited: May-2020
    Paper: DOI
  6. 6
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    173 cites at Google Scholar
    381% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Jens Groth:
    On the Size of Pairing-Based Non-interactive Arguments.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    169 cites at Google Scholar
    370% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    165 cites at Google Scholar
    359% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    165 cites at Google Scholar
    359% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    161 cites at Google Scholar
    347% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    828 cites at Google Scholar
    1622% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    302 cites at Google Scholar
    528% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    274 cites at Google Scholar
    470% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    249 cites at Google Scholar
    418% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    246 cites at Google Scholar
    411% above average of year
    Last visited: Jun-2020
    Paper: DOI
  6. 6
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    242 cites at Google Scholar
    403% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    203 cites at Google Scholar
    322% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    193 cites at Google Scholar
    301% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    187 cites at Google Scholar
    289% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman:
    Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    174 cites at Google Scholar
    262% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    403 cites at Google Scholar
    593% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    387 cites at Google Scholar
    566% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    299 cites at Google Scholar
    414% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    266 cites at Google Scholar
    358% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    250 cites at Google Scholar
    330% above average of year
    Last visited: May-2020
    Paper: DOI
  6. 6
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    229 cites at Google Scholar
    294% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    229 cites at Google Scholar
    294% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    213 cites at Google Scholar
    266% above average of year
    Last visited: May-2020
    Paper: DOI
  9. 9
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    193 cites at Google Scholar
    232% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, and Ling Song:
    Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2014
    176 cites at Google Scholar
    203% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    916 cites at Google Scholar
    1071% above average of year
    Last visited: May-2020
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    712 cites at Google Scholar
    810% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    630 cites at Google Scholar
    705% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    602 cites at Google Scholar
    669% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    459 cites at Google Scholar
    487% above average of year
    Last visited: Jun-2020
    Paper: DOI
  6. 6
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    434 cites at Google Scholar
    455% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    395 cites at Google Scholar
    405% above average of year
    Last visited: May-2020
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    392 cites at Google Scholar
    401% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    341 cites at Google Scholar
    336% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    305 cites at Google Scholar
    290% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    728 cites at Google Scholar
    747% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    712 cites at Google Scholar
    729% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    663 cites at Google Scholar
    672% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    623 cites at Google Scholar
    625% above average of year
    Last visited: May-2020
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    599 cites at Google Scholar
    597% above average of year
    Last visited: May-2020
    Paper: DOI
  6. 6
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    487 cites at Google Scholar
    467% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    472 cites at Google Scholar
    449% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    360 cites at Google Scholar
    319% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    327 cites at Google Scholar
    281% above average of year
    Last visited: May-2020
    Paper: DOI
  10. 10
    Allison B. Lewko and Brent Waters:
    New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
    International Cryptology Conference (CRYPTO), 2012
    312 cites at Google Scholar
    263% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1134 cites at Google Scholar
    908% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1003 cites at Google Scholar
    791% above average of year
    Last visited: Jun-2020
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    935 cites at Google Scholar
    731% above average of year
    Last visited: May-2020
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    788 cites at Google Scholar
    600% above average of year
    Last visited: Jun-2020
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    705 cites at Google Scholar
    526% above average of year
    Last visited: May-2020
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    574 cites at Google Scholar
    410% above average of year
    Last visited: Jun-2020
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    523 cites at Google Scholar
    365% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    490 cites at Google Scholar
    335% above average of year
    Last visited: Jun-2020
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    481 cites at Google Scholar
    327% above average of year
    Last visited: Jun-2020
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    460 cites at Google Scholar
    309% above average of year
    Last visited: Jun-2020
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1790 cites at Google Scholar
    1273% above average of year
    Last visited: Jun-2020
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1221 cites at Google Scholar
    837% above average of year
    Last visited: May-2020
    Paper: DOI
  3. 3
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1136 cites at Google Scholar
    772% above average of year
    Last visited: Jun-2020
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1058 cites at Google Scholar
    712% above average of year
    Last visited: May-2020
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    747 cites at Google Scholar
    473% above average of year
    Last visited: May-2020
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    588 cites at Google Scholar
    351% above average of year
    Last visited: May-2020
    Paper: DOI
  7. 7
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    531 cites at Google Scholar
    307% above average of year
    Last visited: Jun-2020
    Paper: DOI
  8. 8
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    499 cites at Google Scholar
    283% above average of year
    Last visited: May-2020
    Paper: DOI
  9. 9
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    428 cites at Google Scholar
    228% above average of year
    Last visited: May-2020
    Paper: DOI
  10. 10
    Matthieu Rivain and Emmanuel Prouff:
    Provably Secure Higher-Order Masking of AES.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2010
    403 cites at Google Scholar
    209% above average of year
    Last visited: Jun-2020
    Paper: DOI