Normalized Top-100 Crypto Papers
End of life:
As of July 1, 2022, this ranking will no longer be updated. Due to the
large number of publications in both cryptography and security, it is
unfortunately not possible to collect citations for both areas in
reasonable time. The ranking of security
papers will continue to be updated.
This webpage is an attempt to assemble a ranking of top-cited
papers from the area of cryptography. The ranking has been
created based on citations of papers published at top
cryptography conferences. More details are available here.
Absolute citations are not necessarily a good indicator for the
impact of a paper, as the number of citations usually grows with
the age of a paper. The following list shows an alternative
ranking, where the citations are normalized by the age of each
paper.
Top 100 papers normalized by age ⌄
-
1
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith:
Calibrating Noise to Sensitivity in Private Data Analysis.
Theory of Cryptography Conference (TCC), 2006
3372% above average of year
Last visited: Jun-2022
-
2
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun:
Differential Power Analysis.
International Cryptology Conference (CRYPTO), 1999
3044% above average of year
Last visited: Jun-2022
-
3
Dan Boneh and Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing.
International Cryptology Conference (CRYPTO), 2001
2842% above average of year
Last visited: Jun-2022
-
4
Eli Biham and Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
International Cryptology Conference (CRYPTO), 1990
2632% above average of year
Last visited: May-2022
-
5
Pascal Paillier:
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1999
2411% above average of year
Last visited: May-2022
-
6
Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov:
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
International Cryptology Conference (CRYPTO), 2017
2276% above average of year
Last visited: Jun-2022
-
7
Paul C. Kocher:
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.
International Cryptology Conference (CRYPTO), 1996
2234% above average of year
Last visited: Jun-2022
-
8
Victor S. Miller:
Use of Elliptic Curves in Cryptography.
International Cryptology Conference (CRYPTO), 1985
2180% above average of year
Last visited: Jun-2022
-
9
Geoffroy Couteau and Pierre Meyer:
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2021
2079% above average of year
Last visited: Jun-2022
-
10
Amit Sahai and Brent Waters:
Fuzzy Identity-Based Encryption.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
2048% above average of year
Last visited: Jun-2022
-
11
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher.
Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
1983% above average of year
Last visited: Jun-2022
-
12
Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos:
The Bitcoin Backbone Protocol: Analysis and Applications.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
1864% above average of year
Last visited: Jun-2022
-
13
Amos Fiat and Adi Shamir:
How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
International Cryptology Conference (CRYPTO), 1986
1656% above average of year
Last visited: May-2022
-
14
Torben P. Pedersen:
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
International Cryptology Conference (CRYPTO), 1991
1597% above average of year
Last visited: Jun-2022
-
15
Taher El Gamal:
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.
International Cryptology Conference (CRYPTO), 1984
1483% above average of year
Last visited: Jun-2022
-
16
Hovav Shacham and Brent Waters:
Compact Proofs of Retrievability.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2008
1448% above average of year
Last visited: Jun-2022
-
17
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano:
Public Key Encryption with Keyword Search.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
1419% above average of year
Last visited: May-2022
-
18
Gustavus J. Simmons:
The Prisoners' Problem and the Subliminal Channel.
International Cryptology Conference (CRYPTO), 1983
1350% above average of year
Last visited: Jun-2022
-
19
Stuart Haber and W. Scott Stornetta:
How to Time-Stamp a Digital Document.
International Cryptology Conference (CRYPTO), 1990
1329% above average of year
Last visited: Jun-2022
-
20
Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
Fully Homomorphic Encryption over the Integers.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
1244% above average of year
Last visited: Jun-2022
-
21
Craig Gentry, Amit Sahai, and Brent Waters:
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
International Cryptology Conference (CRYPTO), 2013
1230% above average of year
Last visited: Jun-2022
-
22
Adi Shamir:
Identity-Based Cryptosystems and Signature Schemes.
International Cryptology Conference (CRYPTO), 1984
1186% above average of year
Last visited: Jun-2022
-
23
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song:
Homomorphic Encryption for Arithmetic of Approximate Numbers.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2017
1161% above average of year
Last visited: Jun-2022
-
24
Sattam S. Al-Riyami and Kenneth G. Paterson:
Certificateless Public Key Cryptography.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2003
1117% above average of year
Last visited: Jun-2022
-
25
Dan Boneh and Brent Waters:
Conjunctive, Subset, and Range Queries on Encrypted Data.
Theory of Cryptography Conference (TCC), 2007
1062% above average of year
Last visited: Jun-2022
-
26
Rafael Pass, Lior Seeman, and Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
1035% above average of year
Last visited: Jun-2022
-
27
Eric Brier, Christophe Clavier, and Francis Olivier:
Correlation Power Analysis with a Leakage Model.
Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
1032% above average of year
Last visited: Jun-2022
-
28
Dan Boneh, Ben Lynn, and Hovav Shacham:
Short Signatures from the Weil Pairing.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001
974% above average of year
Last visited: Jun-2022
-
29
Matt Blaze, Gerrit Bleumer, and Martin Strauss:
Divertible Protocols and Atomic Proxy Cryptography.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1998
932% above average of year
Last visited: May-2022
-
30
Brent Waters:
Efficient Identity-Based Encryption Without Random Oracles.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
920% above average of year
Last visited: Jun-2022
-
31
Dan Boneh, Xavier Boyen, and Hovav Shacham:
Short Group Signatures.
International Cryptology Conference (CRYPTO), 2004
920% above average of year
Last visited: Jun-2022
-
32
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
916% above average of year
Last visited: Jun-2022
-
33
Ivan Damgård, Valerio Pastro, Nigel P. Smart, and Sarah Zakarias:
Multiparty Computation from Somewhat Homomorphic Encryption.
International Cryptology Conference (CRYPTO), 2012
913% above average of year
Last visited: Jun-2022
-
34
Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Noah Vesely, and Nicholas P. Ward:
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
911% above average of year
Last visited: Jun-2022
-
35
Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
On Ideal Lattices and Learning with Errors over Rings.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
898% above average of year
Last visited: Jun-2022
-
36
Ronald Cramer, Ivan Damgård, and Berry Schoenmakers:
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
International Cryptology Conference (CRYPTO), 1994
893% above average of year
Last visited: May-2022
-
37
Allison B. Lewko and Brent Waters:
Decentralizing Attribute-Based Encryption.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
892% above average of year
Last visited: May-2022
-
38
Ronald Cramer and Victor Shoup:
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
International Cryptology Conference (CRYPTO), 1998
872% above average of year
Last visited: May-2022
-
39
Jonathan Katz, Amit Sahai, and Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
869% above average of year
Last visited: Jun-2022
-
40
Ralph C. Merkle:
A Digital Signature Based on a Conventional Encryption Function.
International Cryptology Conference (CRYPTO), 1987
855% above average of year
Last visited: Jun-2022
-
41
Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell:
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2018
847% above average of year
Last visited: Jun-2022
-
42
Yevgeniy Dodis, Leonid Reyzin, and Adam D. Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
845% above average of year
Last visited: Jun-2022
-
43
Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch:
Verifiable Delay Functions.
International Cryptology Conference (CRYPTO), 2018
841% above average of year
Last visited: Jun-2022
-
44
David Chaum, Amos Fiat, and Moni Naor:
Untraceable Electronic Cash.
International Cryptology Conference (CRYPTO), 1988
841% above average of year
Last visited: Jun-2022
-
45
Daniele Micciancio and Chris Peikert:
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2012
834% above average of year
Last visited: Jun-2022
-
46
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor:
Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2006
832% above average of year
Last visited: Jun-2022
-
47
Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, and Pim Tuyls:
FPGA Intrinsic PUFs and Their Use for IP Protection.
Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
831% above average of year
Last visited: May-2022
-
48
David Chaum, Claude Crépeau, and Ivan Damgård:
Multiparty Unconditionally Secure Protocols (Abstract).
International Cryptology Conference (CRYPTO), 1987
826% above average of year
Last visited: Jun-2022
-
49
Melissa Chase:
Multi-authority Attribute Based Encryption.
Theory of Cryptography Conference (TCC), 2007
814% above average of year
Last visited: May-2022
-
50
Baiyu Li and Daniele Micciancio:
On the Security of Homomorphic Encryption on Approximate Numbers.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2021
790% above average of year
Last visited: Jun-2022
-
51
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
788% above average of year
Last visited: Jun-2022
-
52
Mihir Bellare, Ran Canetti, and Hugo Krawczyk:
Keying Hash Functions for Message Authentication.
International Cryptology Conference (CRYPTO), 1996
777% above average of year
Last visited: Jun-2022
-
53
Dan Boneh and Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles.
International Cryptology Conference (CRYPTO), 2004
776% above average of year
Last visited: May-2022
-
54
Craig Gentry and Shai Halevi:
Implementing Gentry's Fully-Homomorphic Encryption Scheme.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
774% above average of year
Last visited: May-2022
-
55
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford:
CAPTCHA: Using Hard AI Problems for Security.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
772% above average of year
Last visited: Jun-2022
-
56
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
International Cryptology Conference (CRYPTO), 2016
770% above average of year
Last visited: Jun-2022
-
57
Jens Groth:
On the Size of Pairing-Based Non-interactive Arguments.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2016
768% above average of year
Last visited: Jun-2022
-
58
Zvika Brakerski and Vinod Vaikuntanathan:
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
International Cryptology Conference (CRYPTO), 2011
765% above average of year
Last visited: May-2022
-
59
Benedikt Bünz, Ben Fisch, and Alan Szepieniec:
Transparent SNARKs from DARK Compilers.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2020
757% above average of year
Last visited: Jun-2022
-
60
David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
International Cryptology Conference (CRYPTO), 2013
748% above average of year
Last visited: May-2022
-
61
Mihir Bellare, David Pointcheval, and Phillip Rogaway:
Authenticated Key Exchange Secure against Dictionary Attacks.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2000
740% above average of year
Last visited: Jun-2022
-
62
Zvika Brakerski:
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
International Cryptology Conference (CRYPTO), 2012
738% above average of year
Last visited: Jun-2022
-
63
Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill:
Order-Preserving Symmetric Encryption.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2009
729% above average of year
Last visited: Jun-2022
-
64
Dan Boneh, Eu-Jin Goh, and Kobbi Nissim:
Evaluating 2-DNF Formulas on Ciphertexts.
Theory of Cryptography Conference (TCC), 2005
727% above average of year
Last visited: Jun-2022
-
65
Mihir Bellare and Phillip Rogaway:
Entity Authentication and Key Distribution.
International Cryptology Conference (CRYPTO), 1993
727% above average of year
Last visited: May-2022
-
66
Dan Boneh and James Shaw:
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).
International Cryptology Conference (CRYPTO), 1995
721% above average of year
Last visited: Jun-2022
-
67
Sanjam Garg, Craig Gentry, and Shai Halevi:
Candidate Multilinear Maps from Ideal Lattices.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
718% above average of year
Last visited: May-2022
-
68
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes:
CSIDH: An Efficient Post-Quantum Commutative Group Action.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2018
716% above average of year
Last visited: Jun-2022
-
69
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène:
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2016
711% above average of year
Last visited: May-2022
-
70
Mark Bun and Thomas Steinke:
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.
Theory of Cryptography Conference (TCC), 2016
711% above average of year
Last visited: Jun-2022
-
71
Claus-Peter Schnorr:
Efficient Identification and Signatures for Smart Cards.
International Cryptology Conference (CRYPTO), 1989
703% above average of year
Last visited: Jun-2022
-
72
Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward:
Aurora: Transparent Succinct Arguments for R1CS.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
699% above average of year
Last visited: Jun-2022
-
73
Xiaoyun Wang and Hongbo Yu:
How to Break MD5 and Other Hash Functions.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
692% above average of year
Last visited: Jun-2022
-
74
Craig Gentry, Shai Halevi, and Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit.
International Cryptology Conference (CRYPTO), 2012
674% above average of year
Last visited: Jun-2022
-
75
Cynthia Dwork and Moni Naor:
Pricing via Processing or Combatting Junk Mail.
International Cryptology Conference (CRYPTO), 1992
674% above average of year
Last visited: Jun-2022
-
76
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway:
Relations Among Notions of Security for Public-Key Encryption Schemes.
International Cryptology Conference (CRYPTO), 1998
671% above average of year
Last visited: Jun-2022
-
77
Rosario Gennaro, Craig Gentry, and Bryan Parno:
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
International Cryptology Conference (CRYPTO), 2010
671% above average of year
Last visited: Jun-2022
-
78
Amos Fiat and Moni Naor:
Broadcast Encryption.
International Cryptology Conference (CRYPTO), 1993
670% above average of year
Last visited: Jun-2022
-
79
Charles Rackoff and Daniel R. Simon:
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
International Cryptology Conference (CRYPTO), 1991
663% above average of year
Last visited: Jun-2022
-
80
Yehuda Lindell and Benny Pinkas:
Privacy Preserving Data Mining.
International Cryptology Conference (CRYPTO), 2000
663% above average of year
Last visited: May-2022
-
81
Ralph C. Merkle:
A Certified Digital Signature.
International Cryptology Conference (CRYPTO), 1989
657% above average of year
Last visited: Jun-2022
-
82
Jens Groth and Amit Sahai:
Efficient Non-interactive Proof Systems for Bilinear Groups.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
654% above average of year
Last visited: Jun-2022
-
83
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu:
Finding Collisions in the Full SHA-1.
International Cryptology Conference (CRYPTO), 2005
650% above average of year
Last visited: May-2020
-
84
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart:
Message-Locked Encryption and Secure Deduplication.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
641% above average of year
Last visited: Jun-2022
-
85
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012
635% above average of year
Last visited: May-2022
-
86
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi:
Template Attacks.
Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002
630% above average of year
Last visited: Jun-2022
-
87
Craig Gentry and Alice Silverberg:
Hierarchical ID-Based Cryptography.
Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2002
628% above average of year
Last visited: Jun-2022
-
88
Léo Ducas and Daniele Micciancio:
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015
627% above average of year
Last visited: Jun-2022
-
89
Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013
621% above average of year
Last visited: Jun-2022
-
90
Shai Halevi and Victor Shoup:
Algorithms in HElib.
International Cryptology Conference (CRYPTO), 2014
621% above average of year
Last visited: Jun-2022
-
91
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton:
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1997
614% above average of year
Last visited: Jun-2022
-
92
David Chaum and Torben P. Pedersen:
Wallet Databases with Observers.
International Cryptology Conference (CRYPTO), 1992
613% above average of year
Last visited: Jun-2022
-
93
Hoeteck Wee and Daniel Wichs:
Candidate Obfuscation via Oblivious LWE Sampling.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2021
608% above average of year
Last visited: Jun-2022
-
94
Dan Boneh, Amit Sahai, and Brent Waters:
Functional Encryption: Definitions and Challenges.
Theory of Cryptography Conference (TCC), 2011
604% above average of year
Last visited: Jun-2022
-
95
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov:
The First Collision for Full SHA-1.
International Cryptology Conference (CRYPTO), 2017
600% above average of year
Last visited: Jun-2022
-
96
Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill:
Deterministic and Efficiently Searchable Encryption.
International Cryptology Conference (CRYPTO), 2007
598% above average of year
Last visited: Jun-2022
-
97
Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw:
The LED Block Cipher.
Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011
594% above average of year
Last visited: Jun-2022
-
98
François-Xavier Standaert, Tal Malkin, and Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2009
592% above average of year
Last visited: Jun-2022
-
99
Brent Waters:
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
International Cryptology Conference (CRYPTO), 2009
590% above average of year
Last visited: Jun-2022
-
100
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
International Cryptology Conference (CRYPTO), 1995
590% above average of year
Last visited: Jun-2022