These security and cryptography papers are among the most cited between the years 2013 and 2014. Source data is from Google Scholar Metrics. The papers are roughly in the order of citations per year.

  1. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
    S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters, FOCS, 2013
  2. Candidate Multilinear Maps from Ideal Lattices
    S Garg, C Gentry, S Halevi, Eurocrypt, 2013
  3. FRESCO: Modular Composable Security Services for Software-Defined Networks
    S Shin, PA Porras, V Yegneswaran, MW Fong, G Gu, M Tyson, NDSS, 2013
  4. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
    C Gentry, A Sahai, B Waters, Crypto, 2013
  5. Path ORAM: an extremely simple oblivious RAM protocol
    E Stefanov, M van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas, ACM CCS, 2013
  6. Practical Multilinear Maps over the Integers
    JS Coron, T Lepoint, M Tibouchi, Crypto, 2013
  7. Message-Locked Encryption and Secure Deduplication
    M Bellare, S Keelveedhi, T Ristenpart, Eurocrypt, 2013
  8. How to use indistinguishability obfuscation: deniable encryption, and more
    A Sahai, B Waters, STOC, 2014
  9. Pinocchio: Nearly Practical Verifiable Computation
    B Parno, J Howell, C Gentry, M Raykova, IEEE S&P, 2013
  10. Zerocoin: Anonymous Distributed E-Cash from Bitcoin
    I Miers, C Garman, M Green, AD Rubin, IEEE S&P, 2013
  11. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket
    D Arp, M Spreitzenbarth, M Hubner, H Gascon, K Rieck, NDSS, 2014
  12. DupLESS: Server-Aided Encryption for Deduplicated Storage
    S Keelveedhi, M Bellare, T Ristenpart, USENIX Security, 2013
  13. ZMap: Fast Internet-wide Scanning and Its Security Applications
    Z Durumeric, E Wustrow, JA Halderman, USENIX Security, 2013
  14. A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic
    R Barbulescu, P Gaudry, A Joux, E Thomé, Eurocrypt, 2014
  15. Attribute-Based Encryption for Circuits from Multilinear Maps
    S Garg, C Gentry, S Halevi, A Sahai, B Waters, Crypto, 2013
  16. Reusable garbled circuits and succinct functional encryption
    S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich, STOC, 2013
  17. Practical Control Flow Integrity and Randomization for Binary Executables
    C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, IEEE S&P, 2013
  18. Attribute-based encryption for circuits
    S Gorbunov, V Vaikuntanathan, H Wee, STOC, 2013
  19. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
    KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi, IEEE S&P, 2013
  20. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
    NJ Al Fardan, KG Paterson, IEEE S&P, 2013
  21. Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
    Z Brakerski, GN Rothblum, TCC, 2014
  22. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection
    Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang, ACM CCS, 2013
  23. FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
    Y Yarom, K Falkner, USENIX Security, 2014
  24. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
    D Genkin, A Shamir, E Tromer, Crypto, 2014
  25. Vetting undesirable behaviors in android apps with permission use analysis
    Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang, ACM CCS, 2013
  26. Zerocash: Decentralized Anonymous Payments from Bitcoin
    EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza, IEEE S&P, 2014