Daniel J. Bernstein

From MaRDI portal
Person:819872

Available identifiers

zbMath Open bernstein.daniel-jWikidataQ92865 ScholiaQ92865MaRDI QIDQ819872

List of research outcomes

PublicationDate of PublicationType
Fast norm computation in smooth-degree abelian number fields2024-01-04Paper
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack2023-08-14Paper
Montgomery Curves and the Montgomery Ladder2023-04-21Paper
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak2020-06-24Paper
Decisional second-preimage resistance: when does SPR imply PRE?2020-05-11Paper
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies2020-02-06Paper
Post-quantum RSA2018-09-12Paper
A low-resource quantum factoring algorithm2018-09-12Paper
HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction2018-07-17Paper
Asymptotically faster quantum algorithms to solve multivariate quadratic equations2018-06-22Paper
NTRU prime: reducing attack surface at low cost2018-04-26Paper
Low-communication parallel quantum multi-target preimage search2018-04-26Paper
Short Generators Without Quantum Computers: The Case of Multiquadratics2017-06-13Paper
Hash-Function Based PRFs: AMAC and Its Multi-User Security2016-09-09Paper
Dual EC: A Standardized Back Door2016-05-02Paper
Batch NFS2016-04-13Paper
Faster Binary-Field Multiplication and Faster Binary-Field MACs2016-04-13Paper
Bad Directions in Cryptographic Hash Functions2015-10-20Paper
https://portal.mardi4nfdi.de/entity/Q29494872015-10-01Paper
SPHINCS: Practical Stateless Hash-Based Signatures2015-09-30Paper
Twisted Hessian Curves2015-09-17Paper
TweetNaCl: A Crypto Library in 100 Tweets2015-09-17Paper
Curve41417: Karatsuba Revisited2015-07-21Paper
Kummer Strikes Back: New DH Speed Records2015-01-16Paper
Hyper-and-elliptic-curve cryptography2014-09-05Paper
Computing Small Discrete Logarithms Faster2014-08-20Paper
Faster Batch Forgery Identification2014-08-20Paper
SipHash: A Fast Short-Input PRF2014-08-20Paper
Non-uniform Cracks in the Concrete: The Power of Free Precomputation2013-12-10Paper
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild2013-12-10Paper
Never Trust a Bunny2013-11-19Paper
McBits: Fast Constant-Time Code-Based Cryptography2013-10-10Paper
Quantum Algorithms for the Subset-Sum Problem2013-06-14Paper
ECM using Edwards curves2013-03-20Paper
The Security Impact of a New Cryptographic Library2012-09-21Paper
Simplified High-Speed High-Distance List Decoding for Alternant Codes2011-11-25Paper
Wild McEliece Incognito2011-11-25Paper
High-Speed High-Security Signatures2011-10-07Paper
Smaller Decoding Exponents: Ball-Collision Decoding2011-08-12Paper
Really Fast Syndrome-Based Hashing2011-06-29Paper
List Decoding for Binary Goppa Codes2011-06-08Paper
Faster 2-Regular Information-Set Decoding2011-06-08Paper
A complete set of addition laws for incomplete Edwards curves2011-04-08Paper
Wild McEliece2011-03-15Paper
On the Correct Use of the Negation Map in the Pollard rho Method2011-03-15Paper
ECC2K-130 on NVIDIA GPUs2010-12-07Paper
Starfish on Strike2010-08-31Paper
Type-II Optimal Polynomial Bases2010-07-20Paper
Grover vs. McEliece2010-06-17Paper
FSBday2009-12-17Paper
Batch Binary Edwards2009-10-20Paper
https://portal.mardi4nfdi.de/entity/Q36355332009-07-06Paper
ECM on Graphics Cards2009-05-12Paper
https://portal.mardi4nfdi.de/entity/Q36159262009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q36159292009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q36159322009-03-24Paper
Introduction to post-quantum cryptography2009-03-12Paper
New AES Software Speed Records2009-01-22Paper
Attacking and Defending the McEliece Cryptosystem2008-11-11Paper
Analysis of QUAD2008-09-16Paper
Twisted Edwards Curves2008-06-13Paper
Faster Addition and Doubling on Elliptic Curves2008-05-15Paper
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators2008-05-06Paper
Inverted Edwards Coordinates2008-04-17Paper
The Tangent FFT2008-04-17Paper
Proving Tight Security for Rabin-Williams Signatures2008-04-15Paper
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication2008-04-11Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Detecting perfect powers by factoring into coprimes2007-02-02Paper
Proving primality in essentially quartic random time2007-02-02Paper
Modular exponentiation via the explicit Chinese remainder theorem2007-02-02Paper
Fast Software Encryption2006-06-22Paper
Sharper \(ABC\)-based bounds for congruent polynomials2006-03-30Paper
https://portal.mardi4nfdi.de/entity/Q46648332005-04-08Paper
Factoring into coprimes in essentially linear time2005-02-22Paper
Prime sieves using binary quadratic forms2004-02-12Paper
https://portal.mardi4nfdi.de/entity/Q44322942003-12-08Paper
Enumerating solutions to 𝑝(𝑎)+𝑞(𝑏)=𝑟(𝑐)+𝑠(𝑑)2000-11-22Paper
How to stretch random functions: The security of protected counter sums2000-06-06Paper
Composing power series over a finite ring in essentially linear time1999-10-12Paper
https://portal.mardi4nfdi.de/entity/Q38401551999-04-08Paper
https://portal.mardi4nfdi.de/entity/Q43755941998-09-07Paper
Detecting perfect powers in essentially linear time1998-06-14Paper
The 3x+ 1 Conjugacy Map1997-07-07Paper
A Non-Iterative 2-Adic Statement of the 3N + 1 Conjecture1995-01-03Paper
https://portal.mardi4nfdi.de/entity/Q42736831994-01-13Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Daniel J. Bernstein