Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    99 cites at Google Scholar
    736% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    90 cites at Google Scholar
    660% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    76 cites at Google Scholar
    541% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    64 cites at Google Scholar
    440% above average of year
    Last visited: Jan-2021
    Paper: DOI
  5. 5
    Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner:
    Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
    International Cryptology Conference (CRYPTO), 2019
    61 cites at Google Scholar
    415% above average of year
    Last visited: Jan-2021
    Paper: DOI
  6. 6
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    61 cites at Google Scholar
    415% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Albert Cheu, Adam D. Smith, Jonathan Ullman, David Zeber, and Maxim Zhilyaev:
    Distributed Differential Privacy via Shuffling.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    58 cites at Google Scholar
    390% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    52 cites at Google Scholar
    339% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev:
    Scalable Zero Knowledge with No Trusted Setup.
    International Cryptology Conference (CRYPTO), 2019
    50 cites at Google Scholar
    322% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Borja Balle, James Bell, Adrià Gascón, and Kobbi Nissim:
    The Privacy Blanket of the Shuffle Model.
    International Cryptology Conference (CRYPTO), 2019
    49 cites at Google Scholar
    314% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    188 cites at Google Scholar
    806% above average of year
    Last visited: Jan-2021
    Paper: DOI
  2. 2
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    145 cites at Google Scholar
    599% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    142 cites at Google Scholar
    584% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    132 cites at Google Scholar
    536% above average of year
    Last visited: Dec-2020
    Paper: DOI
  5. 5
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    113 cites at Google Scholar
    444% above average of year
    Last visited: Jan-2021
    Paper: DOI
  6. 6
    Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier:
    Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    International Cryptology Conference (CRYPTO), 2018
    95 cites at Google Scholar
    358% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    94 cites at Google Scholar
    353% above average of year
    Last visited: Jan-2021
    Paper: DOI
  8. 8
    Dan Boneh, Manu Drijvers, and Gregory Neven:
    Compact Multi-signatures for Smaller Blockchains.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    88 cites at Google Scholar
    324% above average of year
    Last visited: Jan-2021
    Paper: DOI
  9. 9
    Eike Kiltz, Vadim Lyubashevsky, and Christian Schaffner:
    A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    79 cites at Google Scholar
    281% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, and Zhi Ma:
    IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
    International Cryptology Conference (CRYPTO), 2018
    78 cites at Google Scholar
    276% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    810 cites at Google Scholar
    2068% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    440 cites at Google Scholar
    1078% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    271 cites at Google Scholar
    625% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    261 cites at Google Scholar
    598% above average of year
    Last visited: Jan-2021
    Paper: DOI
  5. 5
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    232 cites at Google Scholar
    521% above average of year
    Last visited: Dec-2020
    Paper: DOI
  6. 6
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    170 cites at Google Scholar
    355% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    154 cites at Google Scholar
    312% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    143 cites at Google Scholar
    283% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Martin R. Albrecht:
    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    132 cites at Google Scholar
    253% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Prabhanjan Ananth, Abhishek Jain, and Amit Sahai:
    Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
    International Cryptology Conference (CRYPTO), 2017
    121 cites at Google Scholar
    224% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    329 cites at Google Scholar
    682% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    293 cites at Google Scholar
    596% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    270 cites at Google Scholar
    542% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Jens Groth:
    On the Size of Pairing-Based Non-interactive Arguments.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    235 cites at Google Scholar
    458% above average of year
    Last visited: Dec-2020
    Paper: DOI
  5. 5
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    212 cites at Google Scholar
    404% above average of year
    Last visited: Dec-2020
    Paper: DOI
  6. 6
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    194 cites at Google Scholar
    361% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    194 cites at Google Scholar
    361% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    192 cites at Google Scholar
    356% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    186 cites at Google Scholar
    342% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    184 cites at Google Scholar
    337% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    980 cites at Google Scholar
    1672% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    356 cites at Google Scholar
    544% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    320 cites at Google Scholar
    479% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    291 cites at Google Scholar
    426% above average of year
    Last visited: Dec-2020
    Paper: DOI
  5. 5
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    264 cites at Google Scholar
    377% above average of year
    Last visited: Dec-2020
    Paper: DOI
  6. 6
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    263 cites at Google Scholar
    376% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    221 cites at Google Scholar
    300% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    214 cites at Google Scholar
    287% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    212 cites at Google Scholar
    283% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman:
    Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    200 cites at Google Scholar
    262% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    447 cites at Google Scholar
    596% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    436 cites at Google Scholar
    579% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    316 cites at Google Scholar
    392% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    294 cites at Google Scholar
    358% above average of year
    Last visited: Dec-2020
    Paper: DOI
  5. 5
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    290 cites at Google Scholar
    351% above average of year
    Last visited: Jan-2021
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    265 cites at Google Scholar
    313% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    242 cites at Google Scholar
    277% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    238 cites at Google Scholar
    271% above average of year
    Last visited: Jan-2021
    Paper: DOI
  9. 9
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    212 cites at Google Scholar
    230% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, and Ling Song:
    Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2014
    204 cites at Google Scholar
    218% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    1047 cites at Google Scholar
    1126% above average of year
    Last visited: Jan-2021
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    745 cites at Google Scholar
    772% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    705 cites at Google Scholar
    725% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    634 cites at Google Scholar
    642% above average of year
    Last visited: Dec-2020
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    517 cites at Google Scholar
    505% above average of year
    Last visited: Dec-2020
    Paper: DOI
  6. 6
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    480 cites at Google Scholar
    462% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    445 cites at Google Scholar
    421% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    427 cites at Google Scholar
    400% above average of year
    Last visited: Jan-2021
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    371 cites at Google Scholar
    334% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    338 cites at Google Scholar
    296% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    835 cites at Google Scholar
    796% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    807 cites at Google Scholar
    766% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    724 cites at Google Scholar
    677% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    706 cites at Google Scholar
    657% above average of year
    Last visited: Jan-2021
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    666 cites at Google Scholar
    614% above average of year
    Last visited: Jan-2021
    Paper: DOI
  6. 6
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    532 cites at Google Scholar
    471% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    509 cites at Google Scholar
    446% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    368 cites at Google Scholar
    295% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    360 cites at Google Scholar
    286% above average of year
    Last visited: Jan-2021
    Paper: DOI
  10. 10
    Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi:
    Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    333 cites at Google Scholar
    257% above average of year
    Last visited: Jan-2021
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1177 cites at Google Scholar
    874% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1063 cites at Google Scholar
    779% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    1020 cites at Google Scholar
    744% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    847 cites at Google Scholar
    601% above average of year
    Last visited: Dec-2020
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    781 cites at Google Scholar
    546% above average of year
    Last visited: Dec-2020
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    612 cites at Google Scholar
    406% above average of year
    Last visited: Dec-2020
    Paper: DOI
  7. 7
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    553 cites at Google Scholar
    357% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    533 cites at Google Scholar
    341% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    530 cites at Google Scholar
    338% above average of year
    Last visited: Dec-2020
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    500 cites at Google Scholar
    314% above average of year
    Last visited: Dec-2020
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1927 cites at Google Scholar
    1246% above average of year
    Last visited: Dec-2020
    Paper: DOI
  2. 2
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1291 cites at Google Scholar
    802% above average of year
    Last visited: Dec-2020
    Paper: DOI
  3. 3
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1283 cites at Google Scholar
    796% above average of year
    Last visited: Dec-2020
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1119 cites at Google Scholar
    682% above average of year
    Last visited: Jan-2021
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    821 cites at Google Scholar
    473% above average of year
    Last visited: Jan-2021
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    643 cites at Google Scholar
    349% above average of year
    Last visited: Jan-2021
    Paper: DOI
  7. 7
    Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, and Paul Zimmermann:
    Factorization of a 768-Bit RSA Modulus.
    International Cryptology Conference (CRYPTO), 2010
    577 cites at Google Scholar
    303% above average of year
    Last visited: Dec-2020
    Paper: DOI
  8. 8
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    551 cites at Google Scholar
    285% above average of year
    Last visited: Dec-2020
    Paper: DOI
  9. 9
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    517 cites at Google Scholar
    261% above average of year
    Last visited: Jan-2021
    Paper: DOI
  10. 10
    Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan:
    Improved Delegation of Computation Using Fully Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2010
    444 cites at Google Scholar
    210% above average of year
    Last visited: Dec-2020
    Paper: DOI