These security and cryptography papers are among the most cited
between the years 2013 and 2014. Source data is from
Google Scholar Metrics. The papers are roughly in the order of
citations per year. More recent 2015 and 2016 publications haven't
accumulated enough citations to make the list yet.
-
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
FOCS, 2013
-
Candidate Multilinear Maps from Ideal Lattices.
S Garg, C Gentry, S Halevi
Eurocrypt, 2013
-
FRESCO: Modular Composable Security Services for Software-Defined Networks.
S Shin, PA Porras, V Yegneswaran, MW Fong, G Gu, M Tyson
NDSS, 2013
-
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
C Gentry, A Sahai, B Waters
Crypto, 2013
-
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
ACM CCS, 2013
-
Practical Multilinear Maps over the Integers.
JS Coron, T Lepoint, M Tibouchi
Crypto, 2013
-
Message-Locked Encryption and Secure Deduplication.
M Bellare, S Keelveedhi, T Ristenpart
Eurocrypto, 2013
-
How to use indistinguishability obfuscation: deniable encryption, and more
A Sahai, B Waters
STOC, 2014
-
Pinocchio: Nearly Practical Verifiable Computation
B Parno, J Howell, C Gentry, M Raykova
IEEE S&P, 2013
-
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
I Miers, C Garman, M Green, AD Rubin
IEEE S&P, 2013
-
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
D Arp, M Spreitzenbarth, M Hubner, H Gascon, K Rieck
NDSS, 2014
-
DupLESS: Server-Aided Encryption for Deduplicated Storage.
S Keelveedhi, M Bellare, T Ristenpart
USENIX Security, 2013
-
ZMap: Fast Internet-wide Scanning and Its Security Applications.
Z Durumeric, E Wustrow, JA Halderman
USENIX Security, 2013
-
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
R Barbulescu, P Gaudry, A Joux, E Thomé
Eurocrypt, 2014
-
Attribute-Based Encryption for Circuits from Multilinear Maps.
S Garg, C Gentry, S Halevi, A Sahai, B Waters
Crypto, 2013
-
Reusable garbled circuits and succinct functional encryption
S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
STOC, 2013
-
Practical Control Flow Integrity and Randomization for Binary Executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song
IEEE S&P, 2013
-
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
STOC, 2013
-
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
IEEE S&P, 2013
-
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
NJ Al Fardan, KG Paterson
IEEE S&P, 2013
-
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
Z Brakerski, GN Rothblum
TCC, 2014
-
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
ACM CCS, 2013
-
FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
Y Yarom, K Falkner
USENIX Security, 2014
-
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
D Genkin, A Shamir, E Tromer
Crypto, 2014
-
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
ACM CCS, 2013
-
Zerocash: Decentralized Anonymous Payments from Bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
IEEE S&P, 2014