Top-100 Crypto Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of cryptography. The ranking has been created based on citations of papers published at top cryptography conferences. More details are available here.

Top 100 papers from 1982 to 2019 ⌄

  1. 1
    Taher El Gamal:
    A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.
    International Cryptology Conference (CRYPTO), 1984
    9428 cites at Google Scholar
    1451% above average of year
    Last visited: Oct-2019
    Paper: DOI
  2. 2
    Dan Boneh and Matthew K. Franklin:
    Identity-Based Encryption from the Weil Pairing.
    International Cryptology Conference (CRYPTO), 2001
    8498 cites at Google Scholar
    2815% above average of year
    Last visited: Sep-2019
    Paper: DOI
  3. 3
    Adi Shamir:
    Identity-Based Cryptosystems and Signature Schemes.
    International Cryptology Conference (CRYPTO), 1984
    7834 cites at Google Scholar
    1188% above average of year
    Last visited: Oct-2019
    Paper: DOI
  4. 4
    Paul C. Kocher, Joshua Jaffe, and Benjamin Jun:
    Differential Power Analysis.
    International Cryptology Conference (CRYPTO), 1999
    7590 cites at Google Scholar
    2972% above average of year
    Last visited: Sep-2019
    Paper: DOI
  5. 5
    Pascal Paillier:
    Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1999
    5569 cites at Google Scholar
    2154% above average of year
    Last visited: Sep-2019
    Paper: DOI
  6. 6
    Victor S. Miller:
    Use of Elliptic Curves in Cryptography.
    International Cryptology Conference (CRYPTO), 1985
    5384 cites at Google Scholar
    2161% above average of year
    Last visited: Sep-2019
    Paper: DOI
  7. 7
    Paul C. Kocher:
    Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.
    International Cryptology Conference (CRYPTO), 1996
    4771 cites at Google Scholar
    2032% above average of year
    Last visited: Sep-2019
    Paper: DOI
  8. 8
    Amos Fiat and Adi Shamir:
    How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
    International Cryptology Conference (CRYPTO), 1986
    3967 cites at Google Scholar
    1514% above average of year
    Last visited: Sep-2019
    Paper: DOI
  9. 9
    Yehuda Lindell and Benny Pinkas:
    Privacy Preserving Data Mining.
    International Cryptology Conference (CRYPTO), 2000
    3840 cites at Google Scholar
    1838% above average of year
    Last visited: Sep-2019
    Paper: DOI
  10. 10
    Amit Sahai and Brent Waters:
    Fuzzy Identity-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    3704 cites at Google Scholar
    1913% above average of year
    Last visited: Oct-2019
    Paper: DOI
  11. 11
    Eli Biham and Adi Shamir:
    Differential Cryptanalysis of DES-like Cryptosystems.
    International Cryptology Conference (CRYPTO), 1990
    3198 cites at Google Scholar
    2522% above average of year
    Last visited: Aug-2019
    Paper: DOI
  12. 12
    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith:
    Calibrating Noise to Sensitivity in Private Data Analysis.
    Theory of Cryptography Conference (TCC), 2006
    3139 cites at Google Scholar
    2364% above average of year
    Last visited: Sep-2019
    Paper: DOI
  13. 13
    Dan Boneh, Ben Lynn, and Hovav Shacham:
    Short Signatures from the Weil Pairing.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001
    3023 cites at Google Scholar
    937% above average of year
    Last visited: Sep-2019
    Paper: DOI
  14. 14
    Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano:
    Public Key Encryption with Keyword Search.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    2600 cites at Google Scholar
    1282% above average of year
    Last visited: Aug-2019
    Paper: DOI
  15. 15
    Torben P. Pedersen:
    Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
    International Cryptology Conference (CRYPTO), 1991
    2239 cites at Google Scholar
    1415% above average of year
    Last visited: Oct-2019
    Paper: DOI
  16. 16
    Brent Waters:
    Efficient Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    2133 cites at Google Scholar
    1059% above average of year
    Last visited: Sep-2019
    Paper: DOI
  17. 17
    Sattam S. Al-Riyami and Kenneth G. Paterson:
    Certificateless Public Key Cryptography.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2003
    2130 cites at Google Scholar
    1088% above average of year
    Last visited: Sep-2019
    Paper: DOI
  18. 18
    Dan Boneh, Xavier Boyen, and Hovav Shacham:
    Short Group Signatures.
    International Cryptology Conference (CRYPTO), 2004
    2022 cites at Google Scholar
    975% above average of year
    Last visited: Sep-2019
    Paper: DOI
  19. 19
    Mihir Bellare, Ran Canetti, and Hugo Krawczyk:
    Keying Hash Functions for Message Authentication.
    International Cryptology Conference (CRYPTO), 1996
    1991 cites at Google Scholar
    790% above average of year
    Last visited: Sep-2019
    Paper: DOI
  20. 20
    Eric Brier, Christophe Clavier, and Francis Olivier:
    Correlation Power Analysis with a Leakage Model.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    1975 cites at Google Scholar
    950% above average of year
    Last visited: Sep-2019
    Paper: DOI
  21. 21
    Claus-Peter Schnorr:
    Efficient Identification and Signatures for Smart Cards.
    International Cryptology Conference (CRYPTO), 1989
    1912 cites at Google Scholar
    701% above average of year
    Last visited: Oct-2019
    Paper: DOI
  22. 22
    Mihir Bellare and Phillip Rogaway:
    Entity Authentication and Key Distribution.
    International Cryptology Conference (CRYPTO), 1993
    1883 cites at Google Scholar
    733% above average of year
    Last visited: Sep-2019
    Paper: DOI
  23. 23
    Dan Boneh, Richard A. DeMillo, and Richard J. Lipton:
    On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1997
    1878 cites at Google Scholar
    572% above average of year
    Last visited: Oct-2019
    Paper: DOI
  24. 24
    Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe:
    PRESENT: An Ultra-Lightweight Block Cipher.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
    1851 cites at Google Scholar
    1568% above average of year
    Last visited: Jan-2019
    Paper: DOI
  25. 25
    Dan Boneh and Xavier Boyen:
    Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1791 cites at Google Scholar
    852% above average of year
    Last visited: Sep-2019
    Paper: DOI
  26. 26
    Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham:
    Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1787 cites at Google Scholar
    897% above average of year
    Last visited: Sep-2019
    Paper: DOI
  27. 27
    Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu:
    Finding Collisions in the Full SHA-1.
    International Cryptology Conference (CRYPTO), 2005
    1772 cites at Google Scholar
    863% above average of year
    Last visited: Sep-2019
    Paper: DOI
  28. 28
    Ralph C. Merkle:
    A Certified Digital Signature.
    International Cryptology Conference (CRYPTO), 1989
    1767 cites at Google Scholar
    640% above average of year
    Last visited: Oct-2019
    Paper: DOI
  29. 29
    Amos Fiat and Moni Naor:
    Broadcast Encryption.
    International Cryptology Conference (CRYPTO), 1993
    1750 cites at Google Scholar
    674% above average of year
    Last visited: Sep-2019
    Paper: DOI
  30. 30
    David Chaum, Claude Crépeau, and Ivan Damgård:
    Multiparty Unconditionally Secure Protocols (Abstract).
    International Cryptology Conference (CRYPTO), 1987
    1727 cites at Google Scholar
    839% above average of year
    Last visited: Sep-2019
    Paper: DOI
  31. 31
    Eli Biham and Adi Shamir:
    Differential Fault Analysis of Secret Key Cryptosystems.
    International Cryptology Conference (CRYPTO), 1997
    1716 cites at Google Scholar
    514% above average of year
    Last visited: Sep-2019
    Paper: DOI
  32. 32
    David Chaum, Amos Fiat, and Moni Naor:
    Untraceable Electronic Cash.
    International Cryptology Conference (CRYPTO), 1988
    1712 cites at Google Scholar
    861% above average of year
    Last visited: Sep-2019
    Paper: DOI
  33. 33
    Yevgeniy Dodis, Leonid Reyzin, and Adam D. Smith:
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1698 cites at Google Scholar
    803% above average of year
    Last visited: Sep-2019
    Paper: DOI
  34. 34
    Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan:
    Fully Homomorphic Encryption over the Integers.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1626 cites at Google Scholar
    1280% above average of year
    Last visited: Oct-2019
    Paper: DOI
  35. 35
    Ronald Cramer and Victor Shoup:
    A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
    International Cryptology Conference (CRYPTO), 1998
    1615 cites at Google Scholar
    902% above average of year
    Last visited: Sep-2019
    Paper: DOI
  36. 36
    Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford:
    CAPTCHA: Using Hard AI Problems for Security.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1586 cites at Google Scholar
    785% above average of year
    Last visited: Oct-2019
    Paper: DOI
  37. 37
    Shimon Even, Oded Goldreich, and Abraham Lempel:
    A Randomized Protocol for Signing Contracts.
    International Cryptology Conference (CRYPTO), 1982
    1531 cites at Google Scholar
    897% above average of year
    Last visited: Sep-2019
    Paper: DOI
  38. 38
    Mihir Bellare, David Pointcheval, and Phillip Rogaway:
    Authenticated Key Exchange Secure against Dictionary Attacks.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2000
    1528 cites at Google Scholar
    671% above average of year
    Last visited: Sep-2019
    Paper: DOI
  39. 39
    Yuliang Zheng:
    Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption).
    International Cryptology Conference (CRYPTO), 1997
    1520 cites at Google Scholar
    444% above average of year
    Last visited: Sep-2019
    Paper: DOI
  40. 40
    Dan Boneh, Eu-Jin Goh, and Kobbi Nissim:
    Evaluating 2-DNF Formulas on Ciphertexts.
    Theory of Cryptography Conference (TCC), 2005
    1509 cites at Google Scholar
    720% above average of year
    Last visited: Oct-2019
    Paper: DOI
  41. 41
    Ronald L. Rivest, Adi Shamir, and Yael Tauman:
    How to Leak a Secret.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001
    1506 cites at Google Scholar
    417% above average of year
    Last visited: Sep-2019
    Paper: DOI
  42. 42
    Hovav Shacham and Brent Waters:
    Compact Proofs of Retrievability.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2008
    1488 cites at Google Scholar
    1347% above average of year
    Last visited: Sep-2019
    Paper: DOI
  43. 43
    Matt Blaze, Gerrit Bleumer, and Martin Strauss:
    Divertible Protocols and Atomic Proxy Cryptography.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1998
    1441 cites at Google Scholar
    794% above average of year
    Last visited: Sep-2019
    Paper: DOI
  44. 44
    David Chaum and Torben P. Pedersen:
    Wallet Databases with Observers.
    International Cryptology Conference (CRYPTO), 1992
    1416 cites at Google Scholar
    629% above average of year
    Last visited: Sep-2019
    Paper: DOI
  45. 45
    Craig Gentry and Alice Silverberg:
    Hierarchical ID-Based Cryptography.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2002
    1404 cites at Google Scholar
    667% above average of year
    Last visited: Sep-2019
    Paper: DOI
  46. 46
    Jan Camenisch and Markus Stadler:
    Efficient Group Signature Schemes for Large Groups (Extended Abstract).
    International Cryptology Conference (CRYPTO), 1997
    1395 cites at Google Scholar
    399% above average of year
    Last visited: Sep-2019
    Paper: DOI
  47. 47
    Ivan Damgård:
    A Design Principle for Hash Functions.
    International Cryptology Conference (CRYPTO), 1989
    1376 cites at Google Scholar
    477% above average of year
    Last visited: Feb-2019
    Paper: DOI
  48. 48
    Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott:
    Efficient Algorithms for Pairing-Based Cryptosystems.
    International Cryptology Conference (CRYPTO), 2002
    1370 cites at Google Scholar
    649% above average of year
    Last visited: Sep-2019
    Paper: DOI
  49. 49
    Yvo Desmedt and Yair Frankel:
    Threshold Cryptosystems.
    International Cryptology Conference (CRYPTO), 1989
    1362 cites at Google Scholar
    471% above average of year
    Last visited: Oct-2019
    Paper: DOI
  50. 50
    Ran Canetti and Hugo Krawczyk:
    Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2001
    1353 cites at Google Scholar
    364% above average of year
    Last visited: Sep-2019
    Paper: DOI
  51. 51
    Ralph C. Merkle:
    A Digital Signature Based on a Conventional Encryption Function.
    International Cryptology Conference (CRYPTO), 1987
    1349 cites at Google Scholar
    633% above average of year
    Last visited: Sep-2019
    Paper: DOI
  52. 52
    Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang:
    On the (Im)possibility of Obfuscating Programs.
    International Cryptology Conference (CRYPTO), 2001
    1341 cites at Google Scholar
    360% above average of year
    Last visited: Oct-2019
    Paper: DOI
  53. 53
    Dan Boneh, Xavier Boyen, and Eu-Jin Goh:
    Hierarchical Identity Based Encryption with Constant Size Ciphertext.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2005
    1340 cites at Google Scholar
    628% above average of year
    Last visited: Oct-2019
    Paper: DOI
  54. 54
    Dan Boneh and Brent Waters:
    Conjunctive, Subset, and Range Queries on Encrypted Data.
    Theory of Cryptography Conference (TCC), 2007
    1327 cites at Google Scholar
    1095% above average of year
    Last visited: Oct-2019
    Paper: DOI
  55. 55
    Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz:
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    1322 cites at Google Scholar
    603% above average of year
    Last visited: Oct-2019
    Paper: DOI
  56. 56
    Gustavus J. Simmons:
    The Prisoners' Problem and the Subliminal Channel.
    International Cryptology Conference (CRYPTO), 1983
    1319 cites at Google Scholar
    1285% above average of year
    Last visited: Sep-2019
    Paper: DOI
  57. 57
    Dalit Naor, Moni Naor, and Jeffery Lotspiech:
    Revocation and Tracing Schemes for Stateless Receivers.
    International Cryptology Conference (CRYPTO), 2001
    1318 cites at Google Scholar
    352% above average of year
    Last visited: Aug-2019
    Paper: DOI
  58. 58
    Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung:
    Perfectly-Secure Key Distribution for Dynamic Conferences.
    International Cryptology Conference (CRYPTO), 1992
    1301 cites at Google Scholar
    570% above average of year
    Last visited: Sep-2019
    Paper: DOI
  59. 59
    Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway:
    Relations Among Notions of Security for Public-Key Encryption Schemes.
    International Cryptology Conference (CRYPTO), 1998
    1289 cites at Google Scholar
    700% above average of year
    Last visited: Sep-2019
    Paper: DOI
  60. 60
    Karine Gandolfi, Christophe Mourtel, and Francis Olivier:
    Electromagnetic Analysis: Concrete Results.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2001
    1287 cites at Google Scholar
    341% above average of year
    Last visited: Sep-2019
    Paper: DOI
  61. 61
    Jan Camenisch and Anna Lysyanskaya:
    An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2001
    1278 cites at Google Scholar
    338% above average of year
    Last visited: Sep-2019
    Paper: DOI
  62. 62
    Cynthia Dwork and Moni Naor:
    Pricing via Processing or Combatting Junk Mail.
    International Cryptology Conference (CRYPTO), 1992
    1186 cites at Google Scholar
    510% above average of year
    Last visited: Sep-2019
    Paper: DOI
  63. 63
    Jean-Sébastien Coron:
    Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 1999
    1165 cites at Google Scholar
    371% above average of year
    Last visited: Sep-2019
    Paper: DOI
  64. 64
    Ronald Cramer, Ivan Damgård, and Berry Schoenmakers:
    Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
    International Cryptology Conference (CRYPTO), 1994
    1160 cites at Google Scholar
    861% above average of year
    Last visited: Sep-2019
    Paper: DOI
  65. 65
    Charles Rackoff and Daniel R. Simon:
    Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
    International Cryptology Conference (CRYPTO), 1991
    1155 cites at Google Scholar
    682% above average of year
    Last visited: Sep-2019
    Paper: DOI
  66. 66
    Mihir Bellare and Phillip Rogaway:
    The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1996
    1142 cites at Google Scholar
    410% above average of year
    Last visited: Sep-2019
    Paper: DOI
  67. 67
    Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik:
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
    International Cryptology Conference (CRYPTO), 2000
    1133 cites at Google Scholar
    472% above average of year
    Last visited: Sep-2019
    Paper: DOI
  68. 68
    Victor Shoup:
    Lower Bounds for Discrete Logarithms and Related Problems.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1997
    1126 cites at Google Scholar
    303% above average of year
    Last visited: Sep-2019
    Paper: DOI
  69. 69
    Nicolas Courtois and Willi Meier:
    Algebraic Attacks on Stream Ciphers with Linear Feedback.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2003
    1120 cites at Google Scholar
    525% above average of year
    Last visited: Sep-2019
    Paper: DOI
  70. 70
    David Pointcheval and Jacques Stern:
    Security Proofs for Signature Schemes.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1996
    1109 cites at Google Scholar
    396% above average of year
    Last visited: Sep-2018
    Paper: DOI
  71. 71
    Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters:
    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    1109 cites at Google Scholar
    841% above average of year
    Last visited: Sep-2019
    Paper: DOI
  72. 72
    Michael J. Freedman, Kobbi Nissim, and Benny Pinkas:
    Efficient Private Matching and Set Intersection.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    1104 cites at Google Scholar
    487% above average of year
    Last visited: Sep-2019
    Paper: DOI
  73. 73
    Dan Boneh and James Shaw:
    Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).
    International Cryptology Conference (CRYPTO), 1995
    1100 cites at Google Scholar
    782% above average of year
    Last visited: Sep-2019
    Paper: DOI
  74. 74
    Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels:
    RFID Systems and Security and Privacy Implications.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002
    1097 cites at Google Scholar
    500% above average of year
    Last visited: Sep-2019
    Paper: DOI
  75. 75
    Ralph C. Merkle:
    One Way Hash Functions and DES.
    International Cryptology Conference (CRYPTO), 1989
    1094 cites at Google Scholar
    358% above average of year
    Last visited: Jan-2019
    Paper: DOI
  76. 76
    Michael Luby and Charles Rackoff:
    How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract).
    International Cryptology Conference (CRYPTO), 1985
    1086 cites at Google Scholar
    356% above average of year
    Last visited: Sep-2019
    Paper: DOI
  77. 77
    Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers:
    A Secure and Optimally Efficient Multi-Authority Election Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1997
    1084 cites at Google Scholar
    288% above average of year
    Last visited: Sep-2019
    Paper: DOI
  78. 78
    Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi:
    Template Attacks.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002
    1079 cites at Google Scholar
    490% above average of year
    Last visited: Sep-2019
    Paper: DOI
  79. 79
    Stuart Haber and W. Scott Stornetta:
    How to Time-Stamp a Digital Document.
    International Cryptology Conference (CRYPTO), 1990
    1063 cites at Google Scholar
    771% above average of year
    Last visited: Sep-2019
    Paper: DOI
  80. 80
    Dan Boneh, Craig Gentry, and Brent Waters:
    Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
    International Cryptology Conference (CRYPTO), 2005
    1060 cites at Google Scholar
    476% above average of year
    Last visited: Sep-2019
    Paper: DOI
  81. 81
    Stefan Brands:
    Untraceable Off-line Cash in Wallets with Observers (Extended Abstract).
    International Cryptology Conference (CRYPTO), 1993
    1060 cites at Google Scholar
    369% above average of year
    Last visited: Sep-2019
    Paper: DOI
  82. 82
    Ronald L. Rivest:
    The MD4 Message Digest Algorithm.
    International Cryptology Conference (CRYPTO), 1990
    1054 cites at Google Scholar
    764% above average of year
    Last visited: Jul-2019
    Paper: DOI
  83. 83
    Nicolas Courtois and Josef Pieprzyk:
    Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2002
    1038 cites at Google Scholar
    467% above average of year
    Last visited: Oct-2019
    Paper: DOI
  84. 84
    Jonathan Katz, Amit Sahai, and Brent Waters:
    Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008
    1007 cites at Google Scholar
    879% above average of year
    Last visited: Sep-2019
    Paper: DOI
  85. 85
    Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, and Pim Tuyls:
    FPGA Intrinsic PUFs and Their Use for IP Protection.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007
    993 cites at Google Scholar
    795% above average of year
    Last visited: Sep-2019
    Paper: DOI
  86. 86
    Markus Jakobsson, Kazue Sako, and Russell Impagliazzo:
    Designated Verifier Proofs and Their Applications.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1996
    968 cites at Google Scholar
    333% above average of year
    Last visited: Sep-2019
    Paper: DOI
  87. 87
    Eiichiro Fujisaki and Tatsuaki Okamoto:
    Secure Integration of Asymmetric and Symmetric Encryption Schemes.
    International Cryptology Conference (CRYPTO), 1999
    953 cites at Google Scholar
    286% above average of year
    Last visited: Sep-2019
    Paper: DOI
  88. 88
    Rosario Gennaro, Craig Gentry, and Bryan Parno:
    Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
    International Cryptology Conference (CRYPTO), 2010
    952 cites at Google Scholar
    708% above average of year
    Last visited: Sep-2019
    Paper: DOI
  89. 89
    Melissa Chase:
    Multi-authority Attribute Based Encryption.
    Theory of Cryptography Conference (TCC), 2007
    946 cites at Google Scholar
    752% above average of year
    Last visited: Sep-2019
    Paper: DOI
  90. 90
    Mihir Bellare and Chanathip Namprempre:
    Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
    Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2000
    945 cites at Google Scholar
    377% above average of year
    Last visited: Sep-2019
    Paper: DOI
  91. 91
    Allison B. Lewko and Brent Waters:
    Decentralizing Attribute-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    928 cites at Google Scholar
    822% above average of year
    Last visited: Sep-2019
    Paper: DOI
  92. 92
    Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi:
    Towards Sound Approaches to Counteract Power-Analysis Attacks.
    International Cryptology Conference (CRYPTO), 1999
    917 cites at Google Scholar
    271% above average of year
    Last visited: Oct-2019
    Paper: DOI
  93. 93
    Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer:
    Strong Authentication for RFID Systems Using the AES Algorithm.
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
    914 cites at Google Scholar
    386% above average of year
    Last visited: Sep-2019
    Paper: DOI
  94. 94
    Craig Gentry and Shai Halevi:
    Implementing Gentry's Fully-Homomorphic Encryption Scheme.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011
    912 cites at Google Scholar
    806% above average of year
    Last visited: Sep-2019
    Paper: DOI
  95. 95
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev:
    On Ideal Lattices and Learning with Errors over Rings.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010
    885 cites at Google Scholar
    651% above average of year
    Last visited: Sep-2019
    Paper: DOI
  96. 96
    Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung:
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
    International Cryptology Conference (CRYPTO), 1995
    882 cites at Google Scholar
    608% above average of year
    Last visited: Sep-2019
    Paper: DOI
  97. 97
    Ran Canetti, Shai Halevi, and Jonathan Katz:
    Chosen-Ciphertext Security from Identity-Based Encryption.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004
    882 cites at Google Scholar
    369% above average of year
    Last visited: Sep-2019
    Paper: DOI
  98. 98
    Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi:
    The EM Side-Channel(s).
    Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002
    867 cites at Google Scholar
    374% above average of year
    Last visited: Oct-2019
    Paper: DOI
  99. 99
    Jan Camenisch and Anna Lysyanskaya:
    Signature Schemes and Anonymous Credentials from Bilinear Maps.
    International Cryptology Conference (CRYPTO), 2004
    866 cites at Google Scholar
    360% above average of year
    Last visited: Sep-2019
    Paper: DOI
  100. 100
    Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor:
    Our Data, Ourselves: Privacy Via Distributed Noise Generation.
    Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2006
    863 cites at Google Scholar
    577% above average of year
    Last visited: Sep-2019
    Paper: DOI