Normalized Top-100 Crypto Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of cryptography. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Absolute citations are not necessarily a good indicator for the impact of a paper, as the number of citations usually grows with the age of a paper. The following list shows an alternative ranking, where the citations are normalized by the age of each paper.

Top 100 papers normalized by age ⌄

  1. 1
    Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny:
    Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    6 cites at Google Scholar
    2900% above average of year
    Last visited: May-2019
    Paper: DOI
  2. 2
    Paul C. Kocher, Joshua Jaffe, and Benjamin Jun:
    Differential Power Analysis.
    International Cryptology Conference (CRYPTO), 1999
    7373 cites at Google Scholar
    2879% above average of year
    Last visited: May-2019
    Paper: DOI
  3. 3
    Dan Boneh and Matthew K. Franklin:
    Identity-Based Encryption from the Weil Pairing.
    International Cryptology Conference (CRYPTO), 2001
    8586 cites at Google Scholar
    2842% above average of year
    Last visited: Feb-2019
    Paper: DOI
  4. 4
    Eli Biham and Adi Shamir:
    Differential Cryptanalysis of DES-like Cryptosystems.
    International Cryptology Conference (CRYPTO), 1990
    3150 cites at Google Scholar
    2477% above average of year
    Last visited: May-2019
    Paper: DOI
  5. 5
    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith:
    Calibrating Noise to Sensitivity in Private Data Analysis.
    Theory of Cryptography Conference (TCC), 2006
    2634 cites at Google Scholar
    2057% above average of year
    Last visited: Nov-2018
    Paper: DOI
  6. 6
    Pascal Paillier:
    Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1999
    5309 cites at Google Scholar
    2045% above average of year
    Last visited: Mar-2019
    Paper: DOI
  7. 7
    Paul C. Kocher:
    Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.
    International Cryptology Conference (CRYPTO), 1996
    4638 cites at Google Scholar
    1914% above average of year
    Last visited: May-2019
    Paper: DOI
  8. 8
    Victor S. Miller:
    Use of Elliptic Curves in Cryptography.
    International Cryptology Conference (CRYPTO), 1985
    5256 cites at Google Scholar
    1902% above average of year
    Last visited: Mar-2019
    Paper: DOI
  9. 9
    Amit Sahai and Brent Waters:
    Fuzzy Identity-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    3625 cites at Google Scholar
    1888% above average of year
    Last visited: May-2019
    Paper: DOI
  10. 10
    Yehuda Lindell and Benny Pinkas:
    Privacy Preserving Data Mining.
    International Cryptology Conference (CRYPTO), 2000
    3858 cites at Google Scholar
    1836% above average of year
    Last visited: May-2019
    Paper: DOI
  11. 11
    Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe:
    PRESENT: An Ultra-Lightweight Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
    1851 cites at Google Scholar
    1586% above average of year
    Last visited: May-2019
    Paper: DOI
  12. 12
    Hovav Shacham and Brent Waters:
    Compact Proofs of Retrievability.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2008
    1656 cites at Google Scholar
    1529% above average of year
    Last visited: Feb-2019
    Paper: DOI
  13. 13
    Amos Fiat and Adi Shamir:
    How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
    International Cryptology Conference (CRYPTO), 1986
    3827 cites at Google Scholar
    1440% above average of year
    Last visited: Feb-2019
    Paper: DOI
  14. 14
    Taher El Gamal:
    A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.
    International Cryptology Conference (CRYPTO), 1984
    9297 cites at Google Scholar
    1404% above average of year
    Last visited: May-2019
    Paper: DOI
  15. 15
    Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, and Takashi Yamakawa:
    Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    3 cites at Google Scholar
    1400% above average of year
    Last visited: May-2019
    Paper: DOI
  16. 16
    Willy Quach, Ron D. Rothblum, and Daniel Wichs:
    Reusable Designated-Verifier NIZKs for all NP from CDH.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    3 cites at Google Scholar
    1400% above average of year
    Last visited: May-2019
    Paper: DOI
  17. 17
    Torben P. Pedersen:
    Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
    International Cryptology Conference (CRYPTO), 1991
    2159 cites at Google Scholar
    1338% above average of year
    Last visited: May-2019
    Paper: DOI
  18. 18
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    211 cites at Google Scholar
    1290% above average of year
    Last visited: Feb-2019
    Paper: DOI
  19. 19
    Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano:
    Public Key Encryption with Keyword Search.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    2535 cites at Google Scholar
    1263% above average of year
    Last visited: May-2019
    Paper: DOI
  20. 20
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1536 cites at Google Scholar
    1263% above average of year
    Last visited: May-2019
    Paper: DOI
  21. 21
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    468 cites at Google Scholar
    1240% above average of year
    Last visited: May-2019
    Paper: DOI
  22. 22
    Gustavus J. Simmons:
    The Prisoners' Problem and the Subliminal Channel.
    International Cryptology Conference (CRYPTO), 1983
    1325 cites at Google Scholar
    1224% above average of year
    Last visited: May-2019
    Paper: DOI
  23. 23
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    198 cites at Google Scholar
    1204% above average of year
    Last visited: May-2019
    Paper: DOI
  24. 24
    Adi Shamir:
    Identity-Based Cryptosystems and Signature Schemes.
    International Cryptology Conference (CRYPTO), 1984
    7711 cites at Google Scholar
    1148% above average of year
    Last visited: Feb-2019
    Paper: DOI
  25. 25
    Dan Boneh and Brent Waters:
    Conjunctive, Subset, and Range Queries on Encrypted Data.
    Theory of Cryptography Conference (TCC), 2007
    1308 cites at Google Scholar
    1091% above average of year
    Last visited: May-2019
    Paper: DOI
  26. 26
    Sattam S. Al-Riyami and Kenneth G. Paterson:
    Certificateless Public Key Cryptography.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2003
    2130 cites at Google Scholar
    1079% above average of year
    Last visited: Feb-2019
    Paper: DOI
  27. 27
    Brent Waters:
    Efficient Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    2102 cites at Google Scholar
    1053% above average of year
    Last visited: Feb-2019
    Paper: DOI
  28. 28
    Dan Boneh, Xavier Boyen, and Hovav Shacham:
    Short Group Signatures.
    International Cryptology Conference (CRYPTO), 2004
    2097 cites at Google Scholar
    1028% above average of year
    Last visited: Mar-2019
    Paper: DOI
  29. 29
    Dan Boneh, Ben Lynn, and Hovav Shacham:
    Short Signatures from the Weil Pairing.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001
    2996 cites at Google Scholar
    927% above average of year
    Last visited: Jan-2019
    Paper: DOI
  30. 30
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    649 cites at Google Scholar
    921% above average of year
    Last visited: Feb-2019
    Paper: DOI
  31. 31
    Eric Brier, Christophe Clavier, and Francis Olivier:
    Correlation Power Analysis with a Leakage Model.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    1872 cites at Google Scholar
    907% above average of year
    Last visited: Mar-2019
    Paper: DOI
  32. 32
    Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu:
    Finding Collisions in the Full SHA-1.
    International Cryptology Conference (CRYPTO), 2005
    1829 cites at Google Scholar
    903% above average of year
    Last visited: Feb-2019
    Paper: DOI
  33. 33
    Satrajit Ghosh and Tobias Nilges:
    An Algebraic Approach to Maliciously Secure Private Set Intersection.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    2 cites at Google Scholar
    900% above average of year
    Last visited: May-2019
    Paper: DOI
  34. 34
    Ronald Cramer and Victor Shoup:
    A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
    International Cryptology Conference (CRYPTO), 1998
    1609 cites at Google Scholar
    893% above average of year
    Last visited: May-2019
    Paper: DOI
  35. 35
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    629 cites at Google Scholar
    889% above average of year
    Last visited: May-2019
    Paper: DOI
  36. 36
    Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham:
    Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1767 cites at Google Scholar
    878% above average of year
    Last visited: May-2019
    Paper: DOI
  37. 37
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    949 cites at Google Scholar
    876% above average of year
    Last visited: May-2019
    Paper: DOI
  38. 38
    Jonathan Katz, Amit Sahai, and Brent Waters:
    Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
    988 cites at Google Scholar
    872% above average of year
    Last visited: May-2019
    Paper: DOI
  39. 39
    Ronald L. Rivest:
    The MD4 Message Digest Algorithm.
    International Cryptology Conference (CRYPTO), 1990
    1188 cites at Google Scholar
    872% above average of year
    Last visited: May-2019
    Paper: DOI
  40. 40
    Dan Boneh and Xavier Boyen:
    Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1789 cites at Google Scholar
    862% above average of year
    Last visited: May-2019
    Paper: DOI
  41. 41
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1072 cites at Google Scholar
    851% above average of year
    Last visited: May-2019
    Paper: DOI
  42. 42
    Shimon Even, Oded Goldreich, and Abraham Lempel:
    A Randomized Protocol for Signing Contracts.
    International Cryptology Conference (CRYPTO), 1982
    1522 cites at Google Scholar
    846% above average of year
    Last visited: Mar-2019
    Paper: DOI
  43. 43
    David Chaum, Amos Fiat, and Moni Naor:
    Untraceable Electronic Cash.
    International Cryptology Conference (CRYPTO), 1988
    1690 cites at Google Scholar
    831% above average of year
    Last visited: Apr-2019
    Paper: DOI
  44. 44
    David Chaum, Claude Crépeau, and Ivan Damgård:
    Multiparty Unconditionally Secure Protocols (Abstract).
    International Cryptology Conference (CRYPTO), 1987
    1682 cites at Google Scholar
    809% above average of year
    Last visited: Mar-2019
    Paper: DOI
  45. 45
    Ronald Cramer, Ivan Damgård, and Berry Schoenmakers:
    Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
    International Cryptology Conference (CRYPTO), 1994
    1135 cites at Google Scholar
    797% above average of year
    Last visited: Mar-2019
    Paper: DOI
  46. 46
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    872 cites at Google Scholar
    796% above average of year
    Last visited: May-2019
    Paper: DOI
  47. 47
    Melissa Chase:
    Multi-authority Attribute Based Encryption.
    Theory of Cryptography Conference (TCC), 2007
    962 cites at Google Scholar
    776% above average of year
    Last visited: Jan-2019
    Paper: DOI
  48. 48
    Yevgeniy Dodis, Leonid Reyzin, and Adam D. Smith:
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1629 cites at Google Scholar
    776% above average of year
    Last visited: Mar-2019
    Paper: DOI
  49. 49
    Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, and Pim Tuyls:
    FPGA Intrinsic PUFs and Their Use for IP Protection.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
    955 cites at Google Scholar
    770% above average of year
    Last visited: May-2019
    Paper: DOI
  50. 50
    Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford:
    CAPTCHA: Using Hard AI Problems for Security.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1566 cites at Google Scholar
    767% above average of year
    Last visited: Feb-2019
    Paper: DOI
  51. 51
    Mihir Bellare, Ran Canetti, and Hugo Krawczyk:
    Keying Hash Functions for Message Authentication.
    International Cryptology Conference (CRYPTO), 1996
    1982 cites at Google Scholar
    761% above average of year
    Last visited: Feb-2019
    Paper: DOI
  52. 52
    Matt Blaze, Gerrit Bleumer, and Martin Strauss:
    Divertible Protocols and Atomic Proxy Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1998
    1394 cites at Google Scholar
    760% above average of year
    Last visited: May-2019
    Paper: DOI
  53. 53
    Dan Boneh and James Shaw:
    Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).
    International Cryptology Conference (CRYPTO), 1995
    1107 cites at Google Scholar
    758% above average of year
    Last visited: May-2019
    Paper: DOI
  54. 54
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    911 cites at Google Scholar
    708% above average of year
    Last visited: Mar-2019
    Paper: DOI
  55. 55
    Mihir Bellare and Phillip Rogaway:
    Entity Authentication and Key Distribution.
    International Cryptology Conference (CRYPTO), 1993
    1860 cites at Google Scholar
    707% above average of year
    Last visited: Feb-2019
    Paper: DOI
  56. 56
    Stuart Haber and W. Scott Stornetta:
    How to Time-Stamp a Digital Document.
    International Cryptology Conference (CRYPTO), 1990
    985 cites at Google Scholar
    706% above average of year
    Last visited: May-2019
    Paper: DOI
  57. 57
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    508 cites at Google Scholar
    699% above average of year
    Last visited: Jan-2019
    Paper: DOI
  58. 58
    Dan Boneh, Eu-Jin Goh, and Kobbi Nissim:
    Evaluating 2-DNF Formulas on Ciphertexts.
    Theory of Cryptography Conference (TCC), 2005
    1455 cites at Google Scholar
    698% above average of year
    Last visited: May-2019
    Paper: DOI
  59. 59
    Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway:
    Relations Among Notions of Security for Public-Key Encryption Schemes.
    International Cryptology Conference (CRYPTO), 1998
    1277 cites at Google Scholar
    688% above average of year
    Last visited: Mar-2019
    Paper: DOI
  60. 60
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    760 cites at Google Scholar
    681% above average of year
    Last visited: Feb-2019
    Paper: DOI
  61. 61
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    560 cites at Google Scholar
    679% above average of year
    Last visited: Mar-2019
    Paper: DOI
  62. 62
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    36 cites at Google Scholar
    679% above average of year
    Last visited: Mar-2019
    Paper: DOI
  63. 63
    Claus-Peter Schnorr:
    Efficient Identification and Signatures for Smart Cards.
    International Cryptology Conference (CRYPTO), 1989
    1871 cites at Google Scholar
    670% above average of year
    Last visited: May-2019
    Paper: DOI
  64. 64
    Craig Gentry and Alice Silverberg:
    Hierarchical ID-Based Cryptography.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2002
    1382 cites at Google Scholar
    664% above average of year
    Last visited: Feb-2019
    Paper: DOI
  65. 65
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    544 cites at Google Scholar
    657% above average of year
    Last visited: Mar-2019
    Paper: DOI
  66. 66
    Mihir Bellare, David Pointcheval, and Phillip Rogaway:
    Authenticated Key Exchange Secure against Dictionary Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2000
    1509 cites at Google Scholar
    657% above average of year
    Last visited: Feb-2019
    Paper: DOI
  67. 67
    Charles Rackoff and Daniel R. Simon:
    Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
    International Cryptology Conference (CRYPTO), 1991
    1136 cites at Google Scholar
    657% above average of year
    Last visited: Feb-2019
    Paper: DOI
  68. 68
    Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott:
    Efficient Algorithms for Pairing-Based Cryptosystems.
    International Cryptology Conference (CRYPTO), 2002
    1366 cites at Google Scholar
    656% above average of year
    Last visited: Feb-2019
    Paper: DOI
  69. 69
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    850 cites at Google Scholar
    654% above average of year
    Last visited: May-2019
    Paper: DOI
  70. 70
    Amos Fiat and Moni Naor:
    Broadcast Encryption.
    International Cryptology Conference (CRYPTO), 1993
    1735 cites at Google Scholar
    653% above average of year
    Last visited: Mar-2019
    Paper: DOI
  71. 71
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    473 cites at Google Scholar
    644% above average of year
    Last visited: May-2019
    Paper: DOI
  72. 72
    Dan Boneh, Xavier Boyen, and Eu-Jin Goh:
    Hierarchical Identity Based Encryption with Constant Size Ciphertext.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    1325 cites at Google Scholar
    627% above average of year
    Last visited: May-2019
    Paper: DOI
  73. 73
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    519 cites at Google Scholar
    622% above average of year
    Last visited: Mar-2019
    Paper: DOI
  74. 74
    Jens Groth and Amit Sahai:
    Efficient Non-interactive Proof Systems for Bilinear Groups.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
    727 cites at Google Scholar
    615% above average of year
    Last visited: Feb-2019
    Paper: DOI
  75. 75
    Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill:
    Order-Preserving Symmetric Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2009
    784 cites at Google Scholar
    612% above average of year
    Last visited: May-2019
    Paper: DOI
  76. 76
    Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill:
    Deterministic and Efficiently Searchable Encryption.
    International Cryptology Conference (CRYPTO), 2007
    781 cites at Google Scholar
    611% above average of year
    Last visited: May-2019
    Paper: DOI
  77. 77
    Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz:
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    1315 cites at Google Scholar
    607% above average of year
    Last visited: Feb-2019
    Paper: DOI
  78. 78
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    501 cites at Google Scholar
    597% above average of year
    Last visited: May-2019
    Paper: DOI
  79. 79
    David Chaum and Torben P. Pedersen:
    Wallet Databases with Observers.
    International Cryptology Conference (CRYPTO), 1992
    1419 cites at Google Scholar
    597% above average of year
    Last visited: Feb-2019
    Paper: DOI
  80. 80
    Ralph C. Merkle:
    A Certified Digital Signature.
    International Cryptology Conference (CRYPTO), 1989
    1692 cites at Google Scholar
    597% above average of year
    Last visited: Feb-2019
    Paper: DOI
  81. 81
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    673 cites at Google Scholar
    592% above average of year
    Last visited: May-2019
    Paper: DOI
  82. 82
    Brent Waters:
    Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
    International Cryptology Conference (CRYPTO), 2009
    745 cites at Google Scholar
    577% above average of year
    Last visited: May-2019
    Paper: DOI
  83. 83
    Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung:
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
    International Cryptology Conference (CRYPTO), 1995
    868 cites at Google Scholar
    573% above average of year
    Last visited: May-2019
    Paper: DOI
  84. 84
    Rafael Pass and Elaine Shi:
    Thunderella: Blockchains with Optimistic Instant Confirmation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    31 cites at Google Scholar
    571% above average of year
    Last visited: Feb-2019
    Paper: DOI
  85. 85
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    481 cites at Google Scholar
    570% above average of year
    Last visited: Mar-2019
    Paper: DOI
  86. 86
    Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor:
    Our Data, Ourselves: Privacy Via Distributed Noise Generation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2006
    817 cites at Google Scholar
    569% above average of year
    Last visited: May-2019
    Paper: DOI
  87. 87
    Nicolas Courtois:
    Fast Algebraic Attacks on Stream Ciphers with Linear Feedback.
    International Cryptology Conference (CRYPTO), 2003
    1198 cites at Google Scholar
    563% above average of year
    Last visited: May-2019
    Paper: DOI
  88. 88
    Nicolas Courtois and Willi Meier:
    Algebraic Attacks on Stream Ciphers with Linear Feedback.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1198 cites at Google Scholar
    563% above average of year
    Last visited: Apr-2019
    Paper: DOI
  89. 89
    Craig Gentry:
    Practical Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2006
    803 cites at Google Scholar
    558% above average of year
    Last visited: May-2019
    Paper: DOI
  90. 90
    Ralph C. Merkle:
    A Digital Signature Based on a Conventional Encryption Function.
    International Cryptology Conference (CRYPTO), 1987
    1202 cites at Google Scholar
    549% above average of year
    Last visited: Mar-2019
    Paper: DOI
  91. 91
    Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung:
    Perfectly-Secure Key Distribution for Dynamic Conferences.
    International Cryptology Conference (CRYPTO), 1992
    1308 cites at Google Scholar
    543% above average of year
    Last visited: Feb-2019
    Paper: DOI
  92. 92
    Dan Boneh, Richard A. DeMillo, and Richard J. Lipton:
    On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1997
    1817 cites at Google Scholar
    536% above average of year
    Last visited: Mar-2019
    Paper: DOI
  93. 93
    Prabhanjan Ananth, Abhishek Jain, and Amit Sahai:
    Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
    International Cryptology Conference (CRYPTO), 2017
    96 cites at Google Scholar
    532% above average of year
    Last visited: Mar-2019
    Paper: DOI
  94. 94
    Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels:
    RFID Systems and Security and Privacy Implications.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002
    1130 cites at Google Scholar
    525% above average of year
    Last visited: May-2019
    Paper: DOI
  95. 95
    Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, and Damien Stehlé:
    Cryptanalysis of the Multilinear Map over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    217 cites at Google Scholar
    521% above average of year
    Last visited: May-2019
    Paper: DOI
  96. 96
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    600 cites at Google Scholar
    517% above average of year
    Last visited: May-2019
    Paper: DOI
  97. 97
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    294 cites at Google Scholar
    516% above average of year
    Last visited: Feb-2019
    Paper: DOI
  98. 98
    Benny Chor, Amos Fiat, and Moni Naor:
    Tracing Traitors.
    International Cryptology Conference (CRYPTO), 1994
    779 cites at Google Scholar
    516% above average of year
    Last visited: Apr-2019
    Paper: DOI
  99. 99
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    147 cites at Google Scholar
    511% above average of year
    Last visited: May-2019
    Paper: DOI
  100. 100
    François-Xavier Standaert, Tal Malkin, and Moti Yung:
    A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2009
    671 cites at Google Scholar
    510% above average of year
    Last visited: Mar-2019
    Paper: DOI