Normalized Top-100 Crypto Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of cryptography. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Absolute citations are not necessarily a good indicator for the impact of a paper, as the number of citations usually grows with the age of a paper. The following list shows an alternative ranking, where the citations are normalized by the age of each paper.

Top 100 papers normalized by age ⌄

  1. 1
    Paul C. Kocher, Joshua Jaffe, and Benjamin Jun:
    Differential Power Analysis.
    International Cryptology Conference (CRYPTO), 1999
    8240 cites at Google Scholar
    2962% above average of year
    Last visited: Jul-2020
    Paper: DOI
  2. 2
    Eli Biham and Adi Shamir:
    Differential Cryptanalysis of DES-like Cryptosystems.
    International Cryptology Conference (CRYPTO), 1990
    3494 cites at Google Scholar
    2884% above average of year
    Last visited: Jul-2020
    Paper: DOI
  3. 3
    Dan Boneh and Matthew K. Franklin:
    Identity-Based Encryption from the Weil Pairing.
    International Cryptology Conference (CRYPTO), 2001
    9294 cites at Google Scholar
    2882% above average of year
    Last visited: Jul-2020
    Paper: DOI
  4. 4
    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith:
    Calibrating Noise to Sensitivity in Private Data Analysis.
    Theory of Cryptography Conference (TCC), 2006
    3968 cites at Google Scholar
    2745% above average of year
    Last visited: Jul-2020
    Paper: DOI
  5. 5
    Pascal Paillier:
    Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1999
    6250 cites at Google Scholar
    2222% above average of year
    Last visited: Jul-2020
    Paper: DOI
  6. 6
    Victor S. Miller:
    Use of Elliptic Curves in Cryptography.
    International Cryptology Conference (CRYPTO), 1985
    5789 cites at Google Scholar
    2132% above average of year
    Last visited: Jul-2020
    Paper: DOI
  7. 7
    Paul C. Kocher:
    Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.
    International Cryptology Conference (CRYPTO), 1996
    5209 cites at Google Scholar
    2096% above average of year
    Last visited: Jul-2020
    Paper: DOI
  8. 8
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
    Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
    International Cryptology Conference (CRYPTO), 2017
    664 cites at Google Scholar
    1974% above average of year
    Last visited: Jul-2020
    Paper: DOI
  9. 9
    Amit Sahai and Brent Waters:
    Fuzzy Identity-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    4311 cites at Google Scholar
    1901% above average of year
    Last visited: Aug-2020
    Paper: DOI
  10. 10
    Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe:
    PRESENT: An Ultra-Lightweight Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
    2353 cites at Google Scholar
    1788% above average of year
    Last visited: Jul-2020
    Paper: DOI
  11. 11
    Amos Fiat and Adi Shamir:
    How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
    International Cryptology Conference (CRYPTO), 1986
    4281 cites at Google Scholar
    1612% above average of year
    Last visited: Jul-2020
    Paper: DOI
  12. 12
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
    The Bitcoin Backbone Protocol: Analysis and Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
    859 cites at Google Scholar
    1592% above average of year
    Last visited: Jul-2020
    Paper: DOI
  13. 13
    Xavier Bonnetain and André Schrottenloher:
    Quantum Security Analysis of CSIDH.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    30 cites at Google Scholar
    1511% above average of year
    Last visited: Jul-2020
    Paper: DOI
  14. 14
    Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, and Elaine Shi:
    OptORAMa: Optimal Oblivious RAM.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    30 cites at Google Scholar
    1511% above average of year
    Last visited: Jul-2020
    Paper: DOI
  15. 15
    Torben P. Pedersen:
    Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
    International Cryptology Conference (CRYPTO), 1991
    2452 cites at Google Scholar
    1491% above average of year
    Last visited: Jul-2020
    Paper: DOI
  16. 16
    Taher El Gamal:
    A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.
    International Cryptology Conference (CRYPTO), 1984
    10257 cites at Google Scholar
    1463% above average of year
    Last visited: Jul-2020
    Paper: DOI
  17. 17
    Hovav Shacham and Brent Waters:
    Compact Proofs of Retrievability.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2008
    1731 cites at Google Scholar
    1428% above average of year
    Last visited: Jul-2020
    Paper: DOI
  18. 18
    Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Noah Vesely, and Nicholas P. Ward:
    Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    27 cites at Google Scholar
    1350% above average of year
    Last visited: Jul-2020
    Paper: DOI
  19. 19
    Gustavus J. Simmons:
    The Prisoners' Problem and the Subliminal Channel.
    International Cryptology Conference (CRYPTO), 1983
    1428 cites at Google Scholar
    1314% above average of year
    Last visited: Aug-2020
    Paper: DOI
  20. 20
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1836 cites at Google Scholar
    1279% above average of year
    Last visited: Jul-2020
    Paper: DOI
  21. 21
    Adi Shamir:
    Identity-Based Cryptosystems and Signature Schemes.
    International Cryptology Conference (CRYPTO), 1984
    8421 cites at Google Scholar
    1183% above average of year
    Last visited: Jul-2020
    Paper: DOI
  22. 22
    Craig Gentry, Amit Sahai, and Brent Waters:
    Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
    International Cryptology Conference (CRYPTO), 2013
    960 cites at Google Scholar
    1097% above average of year
    Last visited: Aug-2020
    Paper: DOI
  23. 23
    Stuart Haber and W. Scott Stornetta:
    How to Time-Stamp a Digital Document.
    International Cryptology Conference (CRYPTO), 1990
    1397 cites at Google Scholar
    1093% above average of year
    Last visited: Aug-2020
    Paper: DOI
  24. 24
    Dan Boneh and Brent Waters:
    Conjunctive, Subset, and Range Queries on Encrypted Data.
    Theory of Cryptography Conference (TCC), 2007
    1475 cites at Google Scholar
    1083% above average of year
    Last visited: Jul-2020
    Paper: DOI
  25. 25
    Benedikt Bünz, Ben Fisch, and Alan Szepieniec:
    Transparent SNARKs from DARK Compilers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    22 cites at Google Scholar
    1081% above average of year
    Last visited: Jul-2020
    Paper: DOI
  26. 26
    Rafael Pass, Lior Seeman, and Abhi Shelat:
    Analysis of the Blockchain Protocol in Asynchronous Networks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    372 cites at Google Scholar
    1062% above average of year
    Last visited: Jul-2020
    Paper: DOI
  27. 27
    Sattam S. Al-Riyami and Kenneth G. Paterson:
    Certificateless Public Key Cryptography.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2003
    2356 cites at Google Scholar
    1048% above average of year
    Last visited: Aug-2020
    Paper: DOI
  28. 28
    Eric Brier, Christophe Clavier, and Francis Olivier:
    Correlation Power Analysis with a Leakage Model.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    2225 cites at Google Scholar
    1027% above average of year
    Last visited: Jul-2020
    Paper: DOI
  29. 29
    Dan Boneh, Xavier Boyen, and Hovav Shacham:
    Short Group Signatures.
    International Cryptology Conference (CRYPTO), 2004
    2188 cites at Google Scholar
    1008% above average of year
    Last visited: Jul-2020
    Paper: DOI
  30. 30
    Brent Waters:
    Efficient Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    2281 cites at Google Scholar
    959% above average of year
    Last visited: Jul-2020
    Paper: DOI
  31. 31
    Dan Boneh, Ben Lynn, and Hovav Shacham:
    Short Signatures from the Weil Pairing.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001
    3204 cites at Google Scholar
    928% above average of year
    Last visited: Jul-2020
    Paper: DOI
  32. 32
    Ronald Cramer and Victor Shoup:
    A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
    International Cryptology Conference (CRYPTO), 1998
    1679 cites at Google Scholar
    902% above average of year
    Last visited: Jul-2020
    Paper: DOI
  33. 33
    Jonathan Katz, Amit Sahai, and Brent Waters:
    Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
    1123 cites at Google Scholar
    891% above average of year
    Last visited: Aug-2020
    Paper: DOI
  34. 34
    Dan Boneh and Xavier Boyen:
    Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1923 cites at Google Scholar
    874% above average of year
    Last visited: Aug-2020
    Paper: DOI
  35. 35
    Yevgeniy Dodis, Leonid Reyzin, and Adam D. Smith:
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1919 cites at Google Scholar
    872% above average of year
    Last visited: Jul-2020
    Paper: DOI
  36. 36
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1103 cites at Google Scholar
    860% above average of year
    Last visited: Jul-2020
    Paper: DOI
  37. 37
    Ronald Cramer, Ivan Damgård, and Berry Schoenmakers:
    Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
    International Cryptology Conference (CRYPTO), 1994
    1231 cites at Google Scholar
    858% above average of year
    Last visited: Jul-2020
    Paper: DOI
  38. 38
    Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham:
    Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1948 cites at Google Scholar
    849% above average of year
    Last visited: Jul-2020
    Paper: DOI
  39. 39
    David Chaum, Amos Fiat, and Moni Naor:
    Untraceable Electronic Cash.
    International Cryptology Conference (CRYPTO), 1988
    1796 cites at Google Scholar
    842% above average of year
    Last visited: Aug-2020
    Paper: DOI
  40. 40
    David Chaum, Claude Crépeau, and Ivan Damgård:
    Multiparty Unconditionally Secure Protocols (Abstract).
    International Cryptology Conference (CRYPTO), 1987
    1863 cites at Google Scholar
    831% above average of year
    Last visited: Jul-2020
    Paper: DOI
  41. 41
    Matt Blaze, Gerrit Bleumer, and Martin Strauss:
    Divertible Protocols and Atomic Proxy Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1998
    1559 cites at Google Scholar
    830% above average of year
    Last visited: Jul-2020
    Paper: DOI
  42. 42
    Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
    Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
    154 cites at Google Scholar
    824% above average of year
    Last visited: Aug-2020
    Paper: DOI
  43. 43
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1227 cites at Google Scholar
    822% above average of year
    Last visited: Jul-2020
    Paper: DOI
  44. 44
    Sanjam Garg, Craig Gentry, and Shai Halevi:
    Candidate Multilinear Maps from Ideal Lattices.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    721 cites at Google Scholar
    799% above average of year
    Last visited: Jul-2020
    Paper: DOI
  45. 45
    Mihir Bellare, Ran Canetti, and Hugo Krawczyk:
    Keying Hash Functions for Message Authentication.
    International Cryptology Conference (CRYPTO), 1996
    2129 cites at Google Scholar
    798% above average of year
    Last visited: Aug-2020
    Paper: DOI
  46. 46
    Melissa Chase:
    Multi-authority Attribute Based Encryption.
    Theory of Cryptography Conference (TCC), 2007
    1104 cites at Google Scholar
    786% above average of year
    Last visited: Jul-2020
    Paper: DOI
  47. 47
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    1013 cites at Google Scholar
    782% above average of year
    Last visited: Jul-2020
    Paper: DOI
  48. 48
    Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, and Pim Tuyls:
    FPGA Intrinsic PUFs and Their Use for IP Protection.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
    1089 cites at Google Scholar
    774% above average of year
    Last visited: Jul-2020
    Paper: DOI
  49. 49
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1160 cites at Google Scholar
    771% above average of year
    Last visited: Jul-2020
    Paper: DOI
  50. 50
    Chris Peikert:
    He Gives C-Sieves on the CSIDH.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    16 cites at Google Scholar
    759% above average of year
    Last visited: Jul-2020
    Paper: DOI
  51. 51
    Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford:
    CAPTCHA: Using Hard AI Problems for Security.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1758 cites at Google Scholar
    757% above average of year
    Last visited: Jul-2020
    Paper: DOI
  52. 52
    Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu:
    Finding Collisions in the Full SHA-1.
    International Cryptology Conference (CRYPTO), 2005
    1839 cites at Google Scholar
    753% above average of year
    Last visited: May-2020
    Paper: DOI
  53. 53
    Benjamin Wesolowski:
    Efficient Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    67 cites at Google Scholar
    746% above average of year
    Last visited: Jul-2020
    Paper: DOI
  54. 54
    Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
    Multiparty Computation from Somewhat Homomorphic Encryption.
    International Cryptology Conference (CRYPTO), 2012
    743 cites at Google Scholar
    742% above average of year
    Last visited: Jul-2020
    Paper: DOI
  55. 55
    Zvika Brakerski and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
    International Cryptology Conference (CRYPTO), 2011
    957 cites at Google Scholar
    733% above average of year
    Last visited: Jul-2020
    Paper: DOI
  56. 56
    Daniele Micciancio and Chris Peikert:
    Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
    735 cites at Google Scholar
    733% above average of year
    Last visited: Jul-2020
    Paper: DOI
  57. 57
    Mihir Bellare and Phillip Rogaway:
    Entity Authentication and Key Distribution.
    International Cryptology Conference (CRYPTO), 1993
    1989 cites at Google Scholar
    732% above average of year
    Last visited: Jul-2020
    Paper: DOI
  58. 58
    Dan Boneh and James Shaw:
    Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).
    International Cryptology Conference (CRYPTO), 1995
    1165 cites at Google Scholar
    732% above average of year
    Last visited: Jul-2020
    Paper: DOI
  59. 59
    Mihir Bellare, David Pointcheval, and Phillip Rogaway:
    Authenticated Key Exchange Secure against Dictionary Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2000
    1635 cites at Google Scholar
    730% above average of year
    Last visited: Jul-2020
    Paper: DOI
  60. 60
    Ralph C. Merkle:
    A Digital Signature Based on a Conventional Encryption Function.
    International Cryptology Conference (CRYPTO), 1987
    1652 cites at Google Scholar
    726% above average of year
    Last visited: Aug-2020
    Paper: DOI
  61. 61
    Xiaoyun Wang and Hongbo Yu:
    How to Break MD5 and Other Hash Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    1772 cites at Google Scholar
    722% above average of year
    Last visited: Jul-2020
    Paper: DOI
  62. 62
    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
    Aurora: Transparent Succinct Arguments for R1CS.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    65 cites at Google Scholar
    721% above average of year
    Last visited: Jul-2020
    Paper: DOI
  63. 63
    Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway:
    Relations Among Notions of Security for Public-Key Encryption Schemes.
    International Cryptology Conference (CRYPTO), 1998
    1359 cites at Google Scholar
    711% above average of year
    Last visited: Jul-2020
    Paper: DOI
  64. 64
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    1076 cites at Google Scholar
    708% above average of year
    Last visited: Aug-2020
    Paper: DOI
  65. 65
    Alessandro Chiesa, Dev Ojha, and Nicholas Spooner:
    Fractal: Post-quantum and Transparent Recursive Proofs from Holography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    15 cites at Google Scholar
    705% above average of year
    Last visited: Jul-2020
    Paper: DOI
  66. 66
    David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
    Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
    International Cryptology Conference (CRYPTO), 2013
    642 cites at Google Scholar
    700% above average of year
    Last visited: Jul-2020
    Paper: DOI
  67. 67
    Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill:
    Order-Preserving Symmetric Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2009
    963 cites at Google Scholar
    698% above average of year
    Last visited: Aug-2020
    Paper: DOI
  68. 68
    Dan Boneh, Eu-Jin Goh, and Kobbi Nissim:
    Evaluating 2-DNF Formulas on Ciphertexts.
    Theory of Cryptography Conference (TCC), 2005
    1687 cites at Google Scholar
    683% above average of year
    Last visited: Jul-2020
    Paper: DOI
  69. 69
    Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor:
    Our Data, Ourselves: Privacy Via Distributed Noise Generation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2006
    1091 cites at Google Scholar
    682% above average of year
    Last visited: Jul-2020
    Paper: DOI
  70. 70
    Charles Rackoff and Daniel R. Simon:
    Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
    International Cryptology Conference (CRYPTO), 1991
    1202 cites at Google Scholar
    680% above average of year
    Last visited: Aug-2020
    Paper: DOI
  71. 71
    Claus-Peter Schnorr:
    Efficient Identification and Signatures for Smart Cards.
    International Cryptology Conference (CRYPTO), 1989
    2084 cites at Google Scholar
    672% above average of year
    Last visited: Aug-2020
    Paper: DOI
  72. 72
    Craig Gentry, Shai Halevi, and Nigel P. Smart:
    Homomorphic Evaluation of the AES Circuit.
    International Cryptology Conference (CRYPTO), 2012
    681 cites at Google Scholar
    671% above average of year
    Last visited: Jul-2020
    Paper: DOI
  73. 73
    Amos Fiat and Moni Naor:
    Broadcast Encryption.
    International Cryptology Conference (CRYPTO), 1993
    1841 cites at Google Scholar
    670% above average of year
    Last visited: Aug-2020
    Paper: DOI
  74. 74
    Naomi Ephraim, Cody Freitag, Ilan Komargodski, and Rafael Pass:
    Continuous Verifiable Delay Functions.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
    14 cites at Google Scholar
    652% above average of year
    Last visited: Aug-2020
    Paper: DOI
  75. 75
    Zvika Brakerski:
    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
    International Cryptology Conference (CRYPTO), 2012
    658 cites at Google Scholar
    645% above average of year
    Last visited: Aug-2020
    Paper: DOI
  76. 76
    Yehuda Lindell and Benny Pinkas:
    Privacy Preserving Data Mining.
    International Cryptology Conference (CRYPTO), 2000
    1468 cites at Google Scholar
    645% above average of year
    Last visited: Jul-2020
    Paper: DOI
  77. 77
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
    The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
    International Cryptology Conference (CRYPTO), 2016
    280 cites at Google Scholar
    645% above average of year
    Last visited: Jul-2020
    Paper: DOI
  78. 78
    Craig Gentry and Alice Silverberg:
    Hierarchical ID-Based Cryptography.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2002
    1461 cites at Google Scholar
    644% above average of year
    Last visited: Jul-2020
    Paper: DOI
  79. 79
    Jens Groth and Amit Sahai:
    Efficient Non-interactive Proof Systems for Bilinear Groups.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
    840 cites at Google Scholar
    641% above average of year
    Last visited: Aug-2020
    Paper: DOI
  80. 80
    Dan Boneh and Xavier Boyen:
    Short Signatures Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1462 cites at Google Scholar
    640% above average of year
    Last visited: Jul-2020
    Paper: DOI
  81. 81
    Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
    The First Collision for Full SHA-1.
    International Cryptology Conference (CRYPTO), 2017
    234 cites at Google Scholar
    631% above average of year
    Last visited: Aug-2020
    Paper: DOI
  82. 82
    Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
    Message-Locked Encryption and Secure Deduplication.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
    579 cites at Google Scholar
    622% above average of year
    Last visited: Jul-2020
    Paper: DOI
  83. 83
    Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott:
    Efficient Algorithms for Pairing-Based Cryptosystems.
    International Cryptology Conference (CRYPTO), 2002
    1418 cites at Google Scholar
    622% above average of year
    Last visited: Jul-2020
    Paper: DOI
  84. 84
    Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz:
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    1420 cites at Google Scholar
    619% above average of year
    Last visited: Jul-2020
    Paper: DOI
  85. 85
    Ralph C. Merkle:
    A Certified Digital Signature.
    International Cryptology Conference (CRYPTO), 1989
    1928 cites at Google Scholar
    614% above average of year
    Last visited: Jul-2020
    Paper: DOI
  86. 86
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
    629 cites at Google Scholar
    612% above average of year
    Last visited: Aug-2020
    Paper: DOI
  87. 87
    David Chaum and Torben P. Pedersen:
    Wallet Databases with Observers.
    International Cryptology Conference (CRYPTO), 1992
    1486 cites at Google Scholar
    611% above average of year
    Last visited: Jul-2020
    Paper: DOI
  88. 88
    Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill:
    Deterministic and Efficiently Searchable Encryption.
    International Cryptology Conference (CRYPTO), 2007
    879 cites at Google Scholar
    605% above average of year
    Last visited: Aug-2020
    Paper: DOI
  89. 89
    Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
    The LED Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
    808 cites at Google Scholar
    603% above average of year
    Last visited: Jul-2020
    Paper: DOI
  90. 90
    Brent Waters:
    Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
    International Cryptology Conference (CRYPTO), 2009
    842 cites at Google Scholar
    598% above average of year
    Last visited: Aug-2020
    Paper: DOI
  91. 91
    Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
    Verifiable Delay Functions.
    International Cryptology Conference (CRYPTO), 2018
    115 cites at Google Scholar
    590% above average of year
    Last visited: Jul-2020
    Paper: DOI
  92. 92
    Dan Boneh, Richard A. DeMillo, and Richard J. Lipton:
    On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1997
    1969 cites at Google Scholar
    590% above average of year
    Last visited: Jul-2020
    Paper: DOI
  93. 93
    Cynthia Dwork and Moni Naor:
    Pricing via Processing or Combatting Junk Mail.
    International Cryptology Conference (CRYPTO), 1992
    1419 cites at Google Scholar
    579% above average of year
    Last visited: Aug-2020
    Paper: DOI
  94. 94
    Dan Boneh, Xavier Boyen, and Eu-Jin Goh:
    Hierarchical Identity Based Encryption with Constant Size Ciphertext.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    1455 cites at Google Scholar
    575% above average of year
    Last visited: Aug-2020
    Paper: DOI
  95. 95
    Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung:
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
    International Cryptology Conference (CRYPTO), 1995
    945 cites at Google Scholar
    575% above average of year
    Last visited: Aug-2020
    Paper: DOI
  96. 96
    Daniel Genkin, Adi Shamir, and Eran Tromer:
    RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
    International Cryptology Conference (CRYPTO), 2014
    412 cites at Google Scholar
    574% above average of year
    Last visited: Jul-2020
    Paper: DOI
  97. 97
    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
    Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
    253 cites at Google Scholar
    573% above average of year
    Last visited: Jul-2020
    Paper: DOI
  98. 98
    Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung:
    Perfectly-Secure Key Distribution for Dynamic Conferences.
    International Cryptology Conference (CRYPTO), 1992
    1367 cites at Google Scholar
    554% above average of year
    Last visited: Jul-2020
    Paper: DOI
  99. 99
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
    CSIDH: An Efficient Post-Quantum Commutative Group Action.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
    109 cites at Google Scholar
    554% above average of year
    Last visited: Jul-2020
    Paper: DOI
  100. 100
    Dan Boneh, Amit Sahai, and Brent Waters:
    Functional Encryption: Definitions and Challenges.
    Theory of Cryptography Conference (TCC), 2011
    741 cites at Google Scholar
    545% above average of year
    Last visited: Aug-2020
    Paper: DOI