Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    29 cites at Google Scholar
    876% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Luca De Feo and Steven D. Galbraith:
    SeaSign: Compact Isogeny Signatures from Class Group Actions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    28 cites at Google Scholar
    843% above average of year
    Last visited: Dec-2019
    Paper: DOI
  3. 3
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    27 cites at Google Scholar
    809% above average of year
    Last visited: Dec-2019
    Paper: DOI
  4. 4
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    23 cites at Google Scholar
    674% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    22 cites at Google Scholar
    641% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    21 cites at Google Scholar
    607% above average of year
    Last visited: Dec-2019
    Paper: DOI
  7. 7
    Samuel Jaques and John M. Schanck:
    Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE.
    International Cryptology Conference (CRYPTO), 2019
    19 cites at Google Scholar
    540% above average of year
    Last visited: Dec-2019
    Paper: DOI
  8. 8
    Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny:
    Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    19 cites at Google Scholar
    540% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Alice Pellet-Mary, Guillaume Hanrot, and Damien Stehlé:
    Approx-SVP in Ideal Lattices with Pre-processing.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    17 cites at Google Scholar
    472% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner:
    Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
    International Cryptology Conference (CRYPTO), 2019
    15 cites at Google Scholar
    405% above average of year
    Last visited: Dec-2019
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    96 cites at Google Scholar
    803% above average of year
    Last visited: Nov-2019
    Paper: DOI
  2. 2
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    74 cites at Google Scholar
    596% above average of year
    Last visited: Dec-2019
    Paper: DOI
  3. 3
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    72 cites at Google Scholar
    577% above average of year
    Last visited: Dec-2019
    Paper: DOI
  4. 4
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    67 cites at Google Scholar
    530% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    60 cites at Google Scholar
    464% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    50 cites at Google Scholar
    370% above average of year
    Last visited: Dec-2019
    Paper: DOI
  7. 7
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    50 cites at Google Scholar
    370% above average of year
    Last visited: Dec-2019
    Paper: DOI
  8. 8
    Seny Kamara and Tarik Moataz:
    SQL on Structurally-Encrypted Databases.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    46 cites at Google Scholar
    333% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Eike Kiltz, Vadim Lyubashevsky, and Christian Schaffner:
    A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    42 cites at Google Scholar
    295% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Zvika Brakerski, Alex Lombardi, Gil Segev, and Vinod Vaikuntanathan:
    Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    42 cites at Google Scholar
    295% above average of year
    Last visited: Dec-2019
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    427 cites at Google Scholar
    1740% above average of year
    Last visited: Nov-2019
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    286 cites at Google Scholar
    1133% above average of year
    Last visited: Dec-2019
    Paper: DOI
  3. 3
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    135 cites at Google Scholar
    482% above average of year
    Last visited: Nov-2019
    Paper: DOI
  4. 4
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    120 cites at Google Scholar
    417% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    115 cites at Google Scholar
    396% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Prabhanjan Ananth, Abhishek Jain, and Amit Sahai:
    Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
    International Cryptology Conference (CRYPTO), 2017
    103 cites at Google Scholar
    344% above average of year
    Last visited: Nov-2019
    Paper: DOI
  7. 7
    Martin R. Albrecht:
    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    90 cites at Google Scholar
    288% above average of year
    Last visited: Nov-2019
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    86 cites at Google Scholar
    271% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Jun Furukawa, Yehuda Lindell, Ariel Nof, and Or Weinstein:
    High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    74 cites at Google Scholar
    219% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Seny Kamara and Tarik Moataz:
    Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    70 cites at Google Scholar
    202% above average of year
    Last visited: Dec-2019
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    204 cites at Google Scholar
    558% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    203 cites at Google Scholar
    555% above average of year
    Last visited: Nov-2019
    Paper: DOI
  3. 3
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    165 cites at Google Scholar
    432% above average of year
    Last visited: Dec-2019
    Paper: DOI
  4. 4
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    161 cites at Google Scholar
    419% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    146 cites at Google Scholar
    371% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    144 cites at Google Scholar
    365% above average of year
    Last visited: Nov-2019
    Paper: DOI
  7. 7
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    142 cites at Google Scholar
    358% above average of year
    Last visited: Dec-2019
    Paper: DOI
  8. 8
    Taechan Kim and Razvan Barbulescu:
    Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case.
    International Cryptology Conference (CRYPTO), 2016
    139 cites at Google Scholar
    348% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    138 cites at Google Scholar
    345% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    136 cites at Google Scholar
    339% above average of year
    Last visited: Nov-2019
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    657 cites at Google Scholar
    1442% above average of year
    Last visited: Nov-2019
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    251 cites at Google Scholar
    489% above average of year
    Last visited: Nov-2019
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    250 cites at Google Scholar
    487% above average of year
    Last visited: Nov-2019
    Paper: DOI
  4. 4
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    236 cites at Google Scholar
    454% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    206 cites at Google Scholar
    384% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    199 cites at Google Scholar
    367% above average of year
    Last visited: Nov-2019
    Paper: DOI
  7. 7
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    181 cites at Google Scholar
    325% above average of year
    Last visited: Nov-2019
    Paper: DOI
  8. 8
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    173 cites at Google Scholar
    306% above average of year
    Last visited: Nov-2019
    Paper: DOI
  9. 9
    Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman:
    Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    161 cites at Google Scholar
    278% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    153 cites at Google Scholar
    259% above average of year
    Last visited: Nov-2019
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    360 cites at Google Scholar
    583% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    319 cites at Google Scholar
    506% above average of year
    Last visited: Nov-2019
    Paper: DOI
  3. 3
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    288 cites at Google Scholar
    447% above average of year
    Last visited: Dec-2019
    Paper: DOI
  4. 4
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    242 cites at Google Scholar
    359% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    223 cites at Google Scholar
    323% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    218 cites at Google Scholar
    314% above average of year
    Last visited: Dec-2019
    Paper: DOI
  7. 7
    Zvika Brakerski and Guy N. Rothblum:
    Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
    Theory of Cryptography Conference (TCC), 2014
    205 cites at Google Scholar
    289% above average of year
    Last visited: Nov-2019
    Paper: DOI
  8. 8
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    191 cites at Google Scholar
    263% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    177 cites at Google Scholar
    236% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom:
    "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2014
    157 cites at Google Scholar
    198% above average of year
    Last visited: Dec-2019
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    832 cites at Google Scholar
    1068% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    675 cites at Google Scholar
    848% above average of year
    Last visited: Dec-2019
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    558 cites at Google Scholar
    683% above average of year
    Last visited: Dec-2019
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    555 cites at Google Scholar
    679% above average of year
    Last visited: Dec-2019
    Paper: DOI
  5. 5
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    396 cites at Google Scholar
    456% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    388 cites at Google Scholar
    445% above average of year
    Last visited: Dec-2019
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    372 cites at Google Scholar
    422% above average of year
    Last visited: Nov-2019
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    345 cites at Google Scholar
    384% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    322 cites at Google Scholar
    352% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    277 cites at Google Scholar
    289% above average of year
    Last visited: Dec-2019
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    637 cites at Google Scholar
    693% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    634 cites at Google Scholar
    689% above average of year
    Last visited: Dec-2019
    Paper: DOI
  3. 3
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    623 cites at Google Scholar
    676% above average of year
    Last visited: Nov-2019
    Paper: DOI
  4. 4
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    571 cites at Google Scholar
    611% above average of year
    Last visited: Nov-2019
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    542 cites at Google Scholar
    575% above average of year
    Last visited: Nov-2019
    Paper: DOI
  6. 6
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    451 cites at Google Scholar
    462% above average of year
    Last visited: Dec-2019
    Paper: DOI
  7. 7
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    419 cites at Google Scholar
    422% above average of year
    Last visited: Dec-2019
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    338 cites at Google Scholar
    321% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    311 cites at Google Scholar
    287% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Allison B. Lewko and Brent Waters:
    New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
    International Cryptology Conference (CRYPTO), 2012
    292 cites at Google Scholar
    264% above average of year
    Last visited: Nov-2019
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1038 cites at Google Scholar
    883% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    963 cites at Google Scholar
    812% above average of year
    Last visited: Dec-2019
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    875 cites at Google Scholar
    728% above average of year
    Last visited: Nov-2019
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    733 cites at Google Scholar
    594% above average of year
    Last visited: Nov-2019
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    672 cites at Google Scholar
    536% above average of year
    Last visited: Dec-2019
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    550 cites at Google Scholar
    421% above average of year
    Last visited: Dec-2019
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    488 cites at Google Scholar
    362% above average of year
    Last visited: Dec-2019
    Paper: DOI
  8. 8
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    447 cites at Google Scholar
    323% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    444 cites at Google Scholar
    320% above average of year
    Last visited: Dec-2019
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    430 cites at Google Scholar
    307% above average of year
    Last visited: Dec-2019
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1699 cites at Google Scholar
    1288% above average of year
    Last visited: Dec-2019
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1153 cites at Google Scholar
    842% above average of year
    Last visited: Nov-2019
    Paper: DOI
  3. 3
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    995 cites at Google Scholar
    713% above average of year
    Last visited: Nov-2019
    Paper: DOI
  4. 4
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    949 cites at Google Scholar
    675% above average of year
    Last visited: Nov-2019
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    704 cites at Google Scholar
    475% above average of year
    Last visited: Nov-2019
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    554 cites at Google Scholar
    353% above average of year
    Last visited: Nov-2019
    Paper: DOI
  7. 7
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    510 cites at Google Scholar
    317% above average of year
    Last visited: Dec-2019
    Paper: DOI
  8. 8
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    483 cites at Google Scholar
    295% above average of year
    Last visited: Dec-2019
    Paper: DOI
  9. 9
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    406 cites at Google Scholar
    232% above average of year
    Last visited: Nov-2019
    Paper: DOI
  10. 10
    Damien Stehlé and Ron Steinfeld:
    Faster Fully Homomorphic Encryption.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2010
    385 cites at Google Scholar
    215% above average of year
    Last visited: Dec-2019
    Paper: DOI