Papers
This page provides an incomplete list of papers and books related to cryptography that received more than 2,500 citations according to Google Scholar. The numbers [xx yy: zz] in the brackets means the paper/book received zz citations at the month of xx in the year yy according to Google Scholar.
- A digital signature scheme secure against adaptive chosen-message attacks by Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest, SIAM Journal of Computing, 1988 [Feb 2017: 2784]
- A method for obtaining digital signatures and public-key cryptosystems by Ron Rivest, Adi Shamir, Leonard Adleman, Communications of the ACM, 1978 [Feb 2017: 17923]
- Attribute-based encryption for fine-grained access control of encrypted data by Vipul Goyal, Omkant Pandey, Amit Sahai and Brent Waters, ACM CCS 2006 [Feb 2017: 3022]
- Ciphertext-policy attribute-based encryption by John Bethencourt, Amit Sahai and Brent Waters, IEEE S&P 2007 [Feb 2017: 2602]
- Differential cryptanalysis of DES-like cryptosystems by Eli Biham and Adi Shamir, Journal of Cryptology, 1991 [Feb 2017: 2648]
- Elliptic curve cryptosystems by Neal Koblitz, AMS Mathematics of Computation, 1987 [Feb 2017: 5201]
- Fully homomorphic encryption using ideal lattices by Craig Gentry, STOC 2009 [Feb 2017: 2609]
- Fuzzy Identity-Based Encryption by Amit Sahai and Brent Waters, Eurocrypt 2005 [Sep 2018: 3417]
- HMAC: Keyed-hashing for message authentication by Hugo Krawczyk, Ran Canetti and Mihir Bellare, IETF 1997 [Feb 2017: 2567]
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems by Amos Fiat and Adi Shamir, Crypto 1986 [Feb 2017: 3308]
- How to share a secret by Adi Shamir, Communications of the ACM, 1979 [Feb 2017: 11196]
- Identity-Based Cryptosystems and Signature Schemes by Adi Shamir, Crypto 1984 [Feb 2017: 6676]
- Identity-Based Encryption from the Weil Pairing by Dan Boneh and Matt Franklin, Crypto 2001 [Feb 2017: 7293]
- Information hiding - a survey by Fabien AP Petitcolas, Ross J Anderson, Markus G Kuhn, Proceedings of the IEEE, 1999 [Feb 2017: 3154]
- New directions in cryptography by Whitfield Diffie and Martin Hellman, IEEE Transactions on Information Theory, 1976 [Feb 2017: 15589]
- Probabilistic encryption by Shafi Goldwasser and Silvio Micali, Journal of Computer and System Sciences, 1984 [Feb 2017: 3617]
- Random key predistribution schemes for sensor networks by Haowen Chan, Adrian Perrig, Dawn Song, IEEE S&P 2003 [Feb 2017: 3515]
- Random oracles are practical: A paradigm for designing efficient protocols by Mihir Bellare and Phillip Rogaway, ACM CCS 1993 [Feb 2017: 4334]
- SPINS: Security protocols for sensor networks by Adrian Perrig, Robert Szewczyk, Justin Douglas Tygar, Victor Wen, David E Culler, Wireless Networks, 2002 [Feb 2017: 4866]
- Short Signatures from the Weil Pairing by Dan Boneh, Ben Lynn and Hovav Shacham, Asiacrypt 2001 [Feb 2017: 2577]
- The design of Rijndael: AES-the advanced encryption standard by Joan Daemen and Vincent Rijmen, Springer 2013 [Feb 2017: 3625]
- The Knowledge Complexity of Interactive Proof Systems by Shafi Goldwasser, Silvio Micali, and Charles Rackoff, SIAM Journal of Computing, 1989 [Feb 2017: 3424]
- The MD5 message-digest algorithm by Ronald Rivest, 1992 [Feb 2017: 5633]
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms by David Chaum, Communications of the ACM, 1981 [Feb 2017: 4886]
- Use of Elliptic Curves in Cryptography by Victor S. Miller, Crypto 1985 [Feb 2017: 4499]
- Visual cryptography by Moni Naor and Adi Shamir, Eurocrypt 1994 [Feb 2017: 2626]
This page was last updated on 6 September 2018