Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    21 cites at Google Scholar
    618% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    18 cites at Google Scholar
    516% above average of year
    Last visited: Sep-2019
    Paper: DOI
  3. 3
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    18 cites at Google Scholar
    516% above average of year
    Last visited: Sep-2019
    Paper: DOI
  4. 4
    Luca De Feo and Steven D. Galbraith:
    SeaSign: Compact Isogeny Signatures from Class Group Actions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    17 cites at Google Scholar
    482% above average of year
    Last visited: Sep-2019
    Paper: DOI
  5. 5
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    16 cites at Google Scholar
    447% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Alice Pellet-Mary, Guillaume Hanrot, and Damien Stehlé:
    Approx-SVP in Ideal Lattices with Pre-processing.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    14 cites at Google Scholar
    379% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny:
    Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    13 cites at Google Scholar
    345% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    12 cites at Google Scholar
    311% above average of year
    Last visited: Aug-2019
    Paper: DOI
  9. 9
    Saikrishna Badrinarayanan and Akshayaram Srinivasan:
    Revisiting Non-Malleable Secret Sharing.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    10 cites at Google Scholar
    242% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Divesh Aggarwal, Nico Döttling, Jesper Buus Nielsen, Maciej Obremski, and Erick Purwanto:
    Continuous Non-Malleable Codes in the 8-Split-State Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    10 cites at Google Scholar
    242% above average of year
    Last visited: Oct-2019
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    79 cites at Google Scholar
    819% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    60 cites at Google Scholar
    598% above average of year
    Last visited: Oct-2019
    Paper: DOI
  3. 3
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    48 cites at Google Scholar
    458% above average of year
    Last visited: Sep-2019
    Paper: DOI
  4. 4
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    48 cites at Google Scholar
    458% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    40 cites at Google Scholar
    365% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    38 cites at Google Scholar
    342% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Zvika Brakerski, Alex Lombardi, Gil Segev, and Vinod Vaikuntanathan:
    Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    37 cites at Google Scholar
    330% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Sanjam Garg and Akshayaram Srinivasan:
    Two-Round Multiparty Secure Computation from Minimal Assumptions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    37 cites at Google Scholar
    330% above average of year
    Last visited: Oct-2019
    Paper: DOI
  9. 9
    Seny Kamara and Tarik Moataz:
    SQL on Structurally-Encrypted Databases.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    36 cites at Google Scholar
    319% above average of year
    Last visited: Aug-2019
    Paper: DOI
  10. 10
    Eike Kiltz, Vadim Lyubashevsky, and Christian Schaffner:
    A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    35 cites at Google Scholar
    307% above average of year
    Last visited: Sep-2019
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    385 cites at Google Scholar
    1783% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    249 cites at Google Scholar
    1118% above average of year
    Last visited: Oct-2019
    Paper: DOI
  3. 3
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    120 cites at Google Scholar
    487% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Prabhanjan Ananth, Abhishek Jain, and Amit Sahai:
    Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
    International Cryptology Conference (CRYPTO), 2017
    102 cites at Google Scholar
    399% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    100 cites at Google Scholar
    389% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    93 cites at Google Scholar
    355% above average of year
    Last visited: Sep-2019
    Paper: DOI
  7. 7
    Martin R. Albrecht:
    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    82 cites at Google Scholar
    301% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    80 cites at Google Scholar
    291% above average of year
    Last visited: Oct-2019
    Paper: DOI
  9. 9
    Jun Furukawa, Yehuda Lindell, Ariel Nof, and Or Weinstein:
    High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    68 cites at Google Scholar
    233% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Seny Kamara and Tarik Moataz:
    Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    65 cites at Google Scholar
    218% above average of year
    Last visited: Oct-2019
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    185 cites at Google Scholar
    554% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    170 cites at Google Scholar
    501% above average of year
    Last visited: Sep-2019
    Paper: DOI
  3. 3
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    158 cites at Google Scholar
    459% above average of year
    Last visited: Sep-2019
    Paper: DOI
  4. 4
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    148 cites at Google Scholar
    424% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    136 cites at Google Scholar
    381% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    131 cites at Google Scholar
    363% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Taechan Kim and Razvan Barbulescu:
    Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case.
    International Cryptology Conference (CRYPTO), 2016
    131 cites at Google Scholar
    363% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    129 cites at Google Scholar
    356% above average of year
    Last visited: Sep-2019
    Paper: DOI
  9. 9
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    129 cites at Google Scholar
    356% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    126 cites at Google Scholar
    346% above average of year
    Last visited: Sep-2019
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    612 cites at Google Scholar
    1441% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    244 cites at Google Scholar
    514% above average of year
    Last visited: Oct-2019
    Paper: DOI
  3. 3
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    239 cites at Google Scholar
    502% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    227 cites at Google Scholar
    471% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    192 cites at Google Scholar
    383% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    189 cites at Google Scholar
    376% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    177 cites at Google Scholar
    346% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    164 cites at Google Scholar
    313% above average of year
    Last visited: Oct-2019
    Paper: DOI
  9. 9
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    144 cites at Google Scholar
    262% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    New Multilinear Maps Over the Integers.
    International Cryptology Conference (CRYPTO), 2015
    141 cites at Google Scholar
    255% above average of year
    Last visited: Oct-2019
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    341 cites at Google Scholar
    578% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    297 cites at Google Scholar
    490% above average of year
    Last visited: Oct-2019
    Paper: DOI
  3. 3
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    281 cites at Google Scholar
    459% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    227 cites at Google Scholar
    351% above average of year
    Last visited: Sep-2019
    Paper: DOI
  5. 5
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    218 cites at Google Scholar
    333% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    204 cites at Google Scholar
    306% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Zvika Brakerski and Guy N. Rothblum:
    Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
    Theory of Cryptography Conference (TCC), 2014
    203 cites at Google Scholar
    304% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    183 cites at Google Scholar
    264% above average of year
    Last visited: Oct-2019
    Paper: DOI
  9. 9
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    168 cites at Google Scholar
    234% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom:
    "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2014
    150 cites at Google Scholar
    198% above average of year
    Last visited: Oct-2019
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    758 cites at Google Scholar
    1021% above average of year
    Last visited: Sep-2019
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    652 cites at Google Scholar
    864% above average of year
    Last visited: Sep-2019
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    507 cites at Google Scholar
    650% above average of year
    Last visited: Aug-2019
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    473 cites at Google Scholar
    600% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    367 cites at Google Scholar
    443% above average of year
    Last visited: Sep-2019
    Paper: DOI
  6. 6
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    364 cites at Google Scholar
    438% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    355 cites at Google Scholar
    425% above average of year
    Last visited: Sep-2019
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    319 cites at Google Scholar
    372% above average of year
    Last visited: Oct-2019
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    313 cites at Google Scholar
    363% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    262 cites at Google Scholar
    288% above average of year
    Last visited: Oct-2019
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    613 cites at Google Scholar
    693% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    606 cites at Google Scholar
    684% above average of year
    Last visited: Oct-2019
    Paper: DOI
  3. 3
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    599 cites at Google Scholar
    675% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    547 cites at Google Scholar
    608% above average of year
    Last visited: Sep-2019
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    528 cites at Google Scholar
    583% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    432 cites at Google Scholar
    459% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    399 cites at Google Scholar
    416% above average of year
    Last visited: Oct-2019
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    319 cites at Google Scholar
    313% above average of year
    Last visited: Sep-2019
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    300 cites at Google Scholar
    288% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi:
    Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    285 cites at Google Scholar
    269% above average of year
    Last visited: Sep-2019
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    928 cites at Google Scholar
    817% above average of year
    Last visited: Sep-2019
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    912 cites at Google Scholar
    801% above average of year
    Last visited: Sep-2019
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    844 cites at Google Scholar
    734% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    707 cites at Google Scholar
    599% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    638 cites at Google Scholar
    531% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    516 cites at Google Scholar
    410% above average of year
    Last visited: Sep-2019
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    476 cites at Google Scholar
    370% above average of year
    Last visited: Sep-2019
    Paper: DOI
  8. 8
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    421 cites at Google Scholar
    316% above average of year
    Last visited: Oct-2019
    Paper: DOI
  9. 9
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    410 cites at Google Scholar
    305% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    407 cites at Google Scholar
    302% above average of year
    Last visited: Aug-2019
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1626 cites at Google Scholar
    1271% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1109 cites at Google Scholar
    835% above average of year
    Last visited: Sep-2019
    Paper: DOI
  3. 3
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    964 cites at Google Scholar
    713% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    908 cites at Google Scholar
    666% above average of year
    Last visited: Oct-2019
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    680 cites at Google Scholar
    473% above average of year
    Last visited: Oct-2019
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    537 cites at Google Scholar
    353% above average of year
    Last visited: Oct-2019
    Paper: DOI
  7. 7
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    498 cites at Google Scholar
    320% above average of year
    Last visited: Sep-2019
    Paper: DOI
  8. 8
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    473 cites at Google Scholar
    299% above average of year
    Last visited: Sep-2019
    Paper: DOI
  9. 9
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    401 cites at Google Scholar
    238% above average of year
    Last visited: Oct-2019
    Paper: DOI
  10. 10
    Damien Stehlé and Ron Steinfeld:
    Faster Fully Homomorphic Encryption.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2010
    374 cites at Google Scholar
    215% above average of year
    Last visited: Oct-2019
    Paper: DOI