Crypto Papers from the 2010s

This webpage is an attempt to assemble a ranking of top-cited cryptography papers from the 2010s. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top-cited papers from 2019 ⌄

  1. 1
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    155 cites at Google Scholar
    736% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    117 cites at Google Scholar
    531% above average of year
    Last visited: Sep-2021
    Paper: DOI
  3. 3
    Chris Peikert and Sina Shiehian:
    Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
    International Cryptology Conference (CRYPTO), 2019
    112 cites at Google Scholar
    504% above average of year
    Last visited: Aug-2021
    Paper: DOI
  4. 4
    Dan Boneh, Benedikt Bünz, and Ben Fisch:
    Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
    International Cryptology Conference (CRYPTO), 2019
    102 cites at Google Scholar
    450% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Albert Cheu, Adam D. Smith, Jonathan Ullman, David Zeber, and Maxim Zhilyaev:
    Distributed Differential Privacy via Shuffling.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    102 cites at Google Scholar
    450% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    Borja Balle, James Bell, Adrià Gascón, and Kobbi Nissim:
    The Privacy Blanket of the Shuffle Model.
    International Cryptology Conference (CRYPTO), 2019
    87 cites at Google Scholar
    369% above average of year
    Last visited: Aug-2021
    Paper: DOI
  7. 7
    Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, and Marc Stevens:
    The General Sieve Kernel and New Records in Lattice Reduction.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    82 cites at Google Scholar
    342% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev:
    Scalable Zero Knowledge with No Trusted Setup.
    International Cryptology Conference (CRYPTO), 2019
    81 cites at Google Scholar
    337% above average of year
    Last visited: Aug-2021
    Paper: DOI
  9. 9
    Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song:
    Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation.
    International Cryptology Conference (CRYPTO), 2019
    80 cites at Google Scholar
    332% above average of year
    Last visited: Aug-2021
    Paper: DOI
  10. 10
    Mark Zhandry:
    How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
    International Cryptology Conference (CRYPTO), 2019
    78 cites at Google Scholar
    321% above average of year
    Last visited: Aug-2021
    Paper: DOI

Top-cited papers from 2018 ⌄

  1. 1
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    259 cites at Google Scholar
    838% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    226 cites at Google Scholar
    719% above average of year
    Last visited: Sep-2021
    Paper: DOI
  3. 3
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    207 cites at Google Scholar
    650% above average of year
    Last visited: Sep-2021
    Paper: DOI
  4. 4
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    186 cites at Google Scholar
    574% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Marcel Keller, Valerio Pastro, and Dragos Rotaru:
    Overdrive: Making SPDZ Great Again.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    161 cites at Google Scholar
    483% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier:
    Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    International Cryptology Conference (CRYPTO), 2018
    144 cites at Google Scholar
    422% above average of year
    Last visited: Sep-2021
    Paper: DOI
  7. 7
    Dan Boneh, Manu Drijvers, and Gregory Neven:
    Compact Multi-signatures for Smaller Blockchains.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    132 cites at Google Scholar
    378% above average of year
    Last visited: Aug-2021
    Paper: DOI
  8. 8
    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song:
    Bootstrapping for Approximate Homomorphic Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    125 cites at Google Scholar
    353% above average of year
    Last visited: Sep-2021
    Paper: DOI
  9. 9
    Tsunekazu Saito, Keita Xagawa, and Takashi Yamakawa:
    Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    99 cites at Google Scholar
    259% above average of year
    Last visited: Sep-2021
    Paper: DOI
  10. 10
    Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, and Ian Miers:
    Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
    International Cryptology Conference (CRYPTO), 2018
    99 cites at Google Scholar
    259% above average of year
    Last visited: Sep-2021
    Paper: DOI

Top-cited papers from 2017 ⌄

  1. 1
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    1124 cites at Google Scholar
    2307% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    584 cites at Google Scholar
    1151% above average of year
    Last visited: Aug-2021
    Paper: DOI
  3. 3
    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
    Homomorphic Encryption for Arithmetic of Approximate Numbers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
    442 cites at Google Scholar
    846% above average of year
    Last visited: Sep-2021
    Paper: DOI
  4. 4
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    323 cites at Google Scholar
    592% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz:
    A Modular Analysis of the Fujisaki-Okamoto Transformation.
    Theory of Cryptography Conference (TCC), 2017
    296 cites at Google Scholar
    534% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff:
    Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    235 cites at Google Scholar
    403% above average of year
    Last visited: Sep-2021
    Paper: DOI
  7. 7
    Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth:
    CacheZoom: How SGX Amplifies the Power of Cache Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    214 cites at Google Scholar
    358% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol with Chains of Variable Difficulty.
    International Cryptology Conference (CRYPTO), 2017
    206 cites at Google Scholar
    341% above average of year
    Last visited: Sep-2021
    Paper: DOI
  9. 9
    Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas:
    Bitcoin as a Transaction Ledger: A Composable Treatment.
    International Cryptology Conference (CRYPTO), 2017
    152 cites at Google Scholar
    225% above average of year
    Last visited: Sep-2021
    Paper: DOI
  10. 10
    Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, and Domenic Forte:
    Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2017
    139 cites at Google Scholar
    198% above average of year
    Last visited: Aug-2021
    Paper: DOI

Top-cited papers from 2016 ⌄

  1. 1
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    408 cites at Google Scholar
    724% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    367 cites at Google Scholar
    642% above average of year
    Last visited: Aug-2021
    Paper: DOI
  3. 3
    Mark Bun and Thomas Steinke:
    Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
    Theory of Cryptography Conference (TCC), 2016
    352 cites at Google Scholar
    611% above average of year
    Last visited: Aug-2021
    Paper: DOI
  4. 4
    Jens Groth:
    On the Size of Pairing-Based Non-interactive Arguments.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    349 cites at Google Scholar
    605% above average of year
    Last visited: Aug-2021
    Paper: DOI
  5. 5
    Craig Costello, Patrick Longa, and Michael Naehrig:
    Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
    International Cryptology Conference (CRYPTO), 2016
    259 cites at Google Scholar
    423% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    Yuval Yarom, Daniel Genkin, and Nadia Heninger:
    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    254 cites at Google Scholar
    413% above average of year
    Last visited: Aug-2021
    Paper: DOI
  7. 7
    Yang Xie and Ankur Srivastava:
    Mitigating SAT Attack on Logic Locking.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2016
    237 cites at Google Scholar
    379% above average of year
    Last visited: Aug-2021
    Paper: DOI
  8. 8
    Pratyay Mukherjee and Daniel Wichs:
    Two Round Multiparty Computation via Multi-key FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    231 cites at Google Scholar
    367% above average of year
    Last visited: Sep-2021
    Paper: DOI
  9. 9
    Martin R. Albrecht, Shi Bai, and Léo Ducas:
    A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
    International Cryptology Conference (CRYPTO), 2016
    207 cites at Google Scholar
    318% above average of year
    Last visited: Sep-2021
    Paper: DOI
  10. 10
    Yupu Hu and Huiwen Jia:
    Cryptanalysis of GGH Map.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
    200 cites at Google Scholar
    304% above average of year
    Last visited: Aug-2021
    Paper: DOI

Top-cited papers from 2015 ⌄

  1. 1
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    1297 cites at Google Scholar
    1942% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Léo Ducas and Daniele Micciancio:
    FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    416 cites at Google Scholar
    555% above average of year
    Last visited: Sep-2021
    Paper: DOI
  3. 3
    Samee Zahur, Mike Rosulek, and David Evans:
    Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    374 cites at Google Scholar
    489% above average of year
    Last visited: Sep-2021
    Paper: DOI
  4. 4
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni:
    Midori: A Block Cipher for Low Energy.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015
    353 cites at Google Scholar
    456% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn:
    SPHINCS: Practical Stateless Hash-Based Signatures.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    299 cites at Google Scholar
    371% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    282 cites at Google Scholar
    344% above average of year
    Last visited: Sep-2021
    Paper: DOI
  7. 7
    Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak:
    Proofs of Space.
    International Cryptology Conference (CRYPTO), 2015
    266 cites at Google Scholar
    319% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner:
    Ciphers for MPC and FHE.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    242 cites at Google Scholar
    281% above average of year
    Last visited: Aug-2021
    Paper: DOI
  9. 9
    Craig Gentry, Sergey Gorbunov, and Shai Halevi:
    Graph-Induced Multilinear Maps from Lattices.
    Theory of Cryptography Conference (TCC), 2015
    235 cites at Google Scholar
    270% above average of year
    Last visited: Aug-2021
    Paper: DOI
  10. 10
    Shai Halevi and Victor Shoup:
    Bootstrapping for HElib.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    232 cites at Google Scholar
    265% above average of year
    Last visited: Aug-2021
    Paper: DOI

Top-cited papers from 2014 ⌄

  1. 1
    Shai Halevi and Victor Shoup:
    Algorithms in HElib.
    International Cryptology Conference (CRYPTO), 2014
    500 cites at Google Scholar
    598% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    487 cites at Google Scholar
    580% above average of year
    Last visited: Aug-2021
    Paper: DOI
  3. 3
    Iddo Bentov and Ranjit Kumaresan:
    How to Use Bitcoin to Design Fair Protocols.
    International Cryptology Conference (CRYPTO), 2014
    346 cites at Google Scholar
    383% above average of year
    Last visited: Sep-2021
    Paper: DOI
  4. 4
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, and Emmanuel Thomé:
    A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    340 cites at Google Scholar
    375% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy:
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    334 cites at Google Scholar
    366% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou:
    Multi-input Functional Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    303 cites at Google Scholar
    323% above average of year
    Last visited: Sep-2021
    Paper: DOI
  7. 7
    Jacob Alperin-Sheriff and Chris Peikert:
    Faster Bootstrapping with Polynomial Error.
    International Cryptology Conference (CRYPTO), 2014
    265 cites at Google Scholar
    270% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, and Amit Sahai:
    Protecting Obfuscation against Algebraic Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014
    257 cites at Google Scholar
    259% above average of year
    Last visited: Sep-2021
    Paper: DOI
  9. 9
    Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, and Ling Song:
    Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2014
    240 cites at Google Scholar
    235% above average of year
    Last visited: Aug-2021
    Paper: DOI
  10. 10
    Dan Boneh and Mark Zhandry:
    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
    International Cryptology Conference (CRYPTO), 2014
    234 cites at Google Scholar
    227% above average of year
    Last visited: Aug-2021
    Paper: DOI

Top-cited papers from 2013 ⌄

  1. 1
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    1173 cites at Google Scholar
    1138% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    793 cites at Google Scholar
    737% above average of year
    Last visited: Aug-2021
    Paper: DOI
  3. 3
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    790 cites at Google Scholar
    734% above average of year
    Last visited: Aug-2021
    Paper: DOI
  4. 4
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    713 cites at Google Scholar
    652% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
    Quadratic Span Programs and Succinct NIZKs without PCPs.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    624 cites at Google Scholar
    559% above average of year
    Last visited: Aug-2021
    Paper: DOI
  6. 6
    Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza:
    SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
    International Cryptology Conference (CRYPTO), 2013
    542 cites at Google Scholar
    472% above average of year
    Last visited: Sep-2021
    Paper: DOI
  7. 7
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky:
    Lattice Signatures and Bimodal Gaussians.
    International Cryptology Conference (CRYPTO), 2013
    529 cites at Google Scholar
    458% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi:
    Practical Multilinear Maps over the Integers.
    International Cryptology Conference (CRYPTO), 2013
    450 cites at Google Scholar
    375% above average of year
    Last visited: Aug-2021
    Paper: DOI
  9. 9
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun:
    Batch Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    399 cites at Google Scholar
    321% above average of year
    Last visited: Sep-2021
    Paper: DOI
  10. 10
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    A Toolkit for Ring-LWE Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    387 cites at Google Scholar
    308% above average of year
    Last visited: Sep-2021
    Paper: DOI

Top-cited papers from 2012 ⌄

  1. 1
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    981 cites at Google Scholar
    850% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    924 cites at Google Scholar
    795% above average of year
    Last visited: Sep-2021
    Paper: DOI
  3. 3
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    821 cites at Google Scholar
    695% above average of year
    Last visited: Sep-2021
    Paper: DOI
  4. 4
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    794 cites at Google Scholar
    669% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    739 cites at Google Scholar
    616% above average of year
    Last visited: Aug-2021
    Paper: DOI
  6. 6
    Vadim Lyubashevsky:
    Lattice Signatures without Trapdoors.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    599 cites at Google Scholar
    480% above average of year
    Last visited: Aug-2021
    Paper: DOI
  7. 7
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Fully Homomorphic Encryption with Polylog Overhead.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    552 cites at Google Scholar
    435% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan:
    How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
    Theory of Cryptography Conference (TCC), 2012
    404 cites at Google Scholar
    291% above average of year
    Last visited: Aug-2021
    Paper: DOI
  9. 9
    Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra:
    A New Approach to Practical Active-Secure Two-Party Computation.
    International Cryptology Conference (CRYPTO), 2012
    397 cites at Google Scholar
    285% above average of year
    Last visited: Sep-2021
    Paper: DOI
  10. 10
    Abhishek Banerjee, Chris Peikert, and Alon Rosen:
    Pseudorandom Functions and Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    375 cites at Google Scholar
    263% above average of year
    Last visited: Aug-2021
    Paper: DOI

Top-cited papers from 2011 ⌄

  1. 1
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1310 cites at Google Scholar
    898% above average of year
    Last visited: Aug-2021
    Paper: DOI
  2. 2
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1164 cites at Google Scholar
    787% above average of year
    Last visited: Aug-2021
    Paper: DOI
  3. 3
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    1112 cites at Google Scholar
    747% above average of year
    Last visited: Aug-2021
    Paper: DOI
  4. 4
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    916 cites at Google Scholar
    598% above average of year
    Last visited: Sep-2021
    Paper: DOI
  5. 5
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    884 cites at Google Scholar
    573% above average of year
    Last visited: Aug-2021
    Paper: DOI
  6. 6
    Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger:
    Biclique Cryptanalysis of the Full AES.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    660 cites at Google Scholar
    403% above average of year
    Last visited: Aug-2021
    Paper: DOI
  7. 7
    Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill:
    Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
    International Cryptology Conference (CRYPTO), 2011
    601 cites at Google Scholar
    358% above average of year
    Last visited: Aug-2021
    Paper: DOI
  8. 8
    Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi:
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
    International Cryptology Conference (CRYPTO), 2011
    585 cites at Google Scholar
    346% above average of year
    Last visited: Sep-2021
    Paper: DOI
  9. 9
    Yuanmi Chen and Phong Q. Nguyen:
    BKZ 2.0: Better Lattice Security Estimates.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2011
    575 cites at Google Scholar
    338% above average of year
    Last visited: Aug-2021
    Paper: DOI
  10. 10
    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai:
    Piccolo: An Ultra-Lightweight Blockcipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    557 cites at Google Scholar
    324% above average of year
    Last visited: Sep-2021
    Paper: DOI

Top-cited papers from 2010 ⌄

  1. 1
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    2113 cites at Google Scholar
    1266% above average of year
    Last visited: Sep-2021
    Paper: DOI
  2. 2
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1438 cites at Google Scholar
    830% above average of year
    Last visited: Sep-2021
    Paper: DOI
  3. 3
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1404 cites at Google Scholar
    808% above average of year
    Last visited: Aug-2021
    Paper: DOI
  4. 4
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1216 cites at Google Scholar
    686% above average of year
    Last visited: Aug-2021
    Paper: DOI
  5. 5
    Shweta Agrawal, Dan Boneh, and Xavier Boyen:
    Efficient Lattice (H)IBE in the Standard Model.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    908 cites at Google Scholar
    487% above average of year
    Last visited: Sep-2021
    Paper: DOI
  6. 6
    David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert:
    Bonsai Trees, or How to Delegate a Lattice Basis.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    705 cites at Google Scholar
    356% above average of year
    Last visited: Sep-2021
    Paper: DOI
  7. 7
    Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, and Paul Zimmermann:
    Factorization of a 768-Bit RSA Modulus.
    International Cryptology Conference (CRYPTO), 2010
    598 cites at Google Scholar
    287% above average of year
    Last visited: Sep-2021
    Paper: DOI
  8. 8
    Allison B. Lewko and Brent Waters:
    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
    Theory of Cryptography Conference (TCC), 2010
    584 cites at Google Scholar
    278% above average of year
    Last visited: Aug-2021
    Paper: DOI
  9. 9
    Tatsuaki Okamoto and Katsuyuki Takashima:
    Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
    International Cryptology Conference (CRYPTO), 2010
    547 cites at Google Scholar
    254% above average of year
    Last visited: Sep-2021
    Paper: DOI
  10. 10
    Matthieu Rivain and Emmanuel Prouff:
    Provably Secure Higher-Order Masking of AES.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2010
    493 cites at Google Scholar
    219% above average of year
    Last visited: Sep-2021
    Paper: DOI