Daniel J. Bernstein

From MaRDI portal
Person:819872


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
CryptAttackTester: high-assurance attack analysis
 
2024-12-13Paper
Fast norm computation in smooth-degree abelian number fields
Research in Number Theory
2024-01-04Paper
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
Lecture Notes in Computer Science
2023-08-14Paper
Montgomery Curves and the Montgomery Ladder
Topics in Computational Number Theory Inspired by Peter L. Montgomery
2023-04-21Paper
Sliding right into disaster: left-to-right sliding windows leak
Lecture Notes in Computer Science
2020-06-24Paper
Decisional second-preimage resistance: when does SPR imply PRE?
 
2020-05-11Paper
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
 
2020-02-06Paper
A low-resource quantum factoring algorithm
 
2018-09-12Paper
Post-quantum RSA
 
2018-09-12Paper
HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
 
2018-07-17Paper
Asymptotically faster quantum algorithms to solve multivariate quadratic equations
 
2018-06-22Paper
Low-communication parallel quantum multi-target preimage search
 
2018-04-26Paper
NTRU prime: reducing attack surface at low cost
 
2018-04-26Paper
Short generators without quantum computers: the case of multiquadratics
Lecture Notes in Computer Science
2017-06-13Paper
Hash-Function Based PRFs: AMAC and Its Multi-User Security
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Dual EC: a standardized back door
The New Codebreakers
2016-05-02Paper
Faster binary-field multiplication and faster binary-field macs
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Batch NFS
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Bad directions in cryptographic hash functions
Information Security and Privacy
2015-10-20Paper
scientific article; zbMATH DE number 6488034 (Why is no real title available?)
 
2015-10-01Paper
SPHINCS: practical stateless hash-based signatures
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
TweetNaCl: A Crypto Library in 100 Tweets
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Twisted Hessian curves
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Curve41417: Karatsuba revisited
Advanced Information Systems Engineering
2015-07-21Paper
Kummer strikes back: new DH speed records
Lecture Notes in Computer Science
2015-01-16Paper
Hyper-and-elliptic-curve cryptography
LMS Journal of Computation and Mathematics
2014-09-05Paper
Faster batch forgery identification
Lecture Notes in Computer Science
2014-08-20Paper
SipHash: a fast short-input PRF
Lecture Notes in Computer Science
2014-08-20Paper
Computing small discrete logarithms faster
Lecture Notes in Computer Science
2014-08-20Paper
Non-uniform cracks in the concrete: the power of free precomputation
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Factoring RSA keys from certified smart cards: Coppersmith in the wild
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Never Trust a Bunny
Radio Frequency Identification. Security and Privacy Issues
2013-11-19Paper
McBits: fast constant-time code-based cryptography
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Quantum algorithms for the subset-sum problem
Post-Quantum Cryptography
2013-06-14Paper
ECM using Edwards curves
Mathematics of Computation
2013-03-20Paper
The security impact of a new cryptographic library
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Wild McEliece Incognito
Post-Quantum Cryptography
2011-11-25Paper
Simplified High-Speed High-Distance List Decoding for Alternant Codes
Post-Quantum Cryptography
2011-11-25Paper
High-speed high-security signatures
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Smaller decoding exponents: ball-collision decoding
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Really fast syndrome-based hashing
Lecture Notes in Computer Science
2011-06-29Paper
List Decoding for Binary Goppa Codes
Lecture Notes in Computer Science
2011-06-08Paper
Faster 2-regular information-set decoding
Lecture Notes in Computer Science
2011-06-08Paper
A complete set of addition laws for incomplete Edwards curves
Journal of Number Theory
2011-04-08Paper
Wild McEliece
Selected Areas in Cryptography
2011-03-15Paper
On the correct use of the negation map in the Pollard rho method
Public Key Cryptography – PKC 2011
2011-03-15Paper
ECC2K-130 on NVIDIA GPUs
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Starfish on strike
Lecture Notes in Computer Science
2010-08-31Paper
Type-II optimal polynomial bases
Arithmetic of Finite Fields
2010-07-20Paper
Grover vs. McEliece
Post-Quantum Cryptography
2010-06-17Paper
FSBday
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Batch Binary Edwards
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Analysis and optimization of elliptic-curve single-scalar multiplication
 
2009-07-06Paper
ECM on Graphics Cards
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Fast multiplication and its applications
 
2009-03-24Paper
scientific article; zbMATH DE number 5532109 (Why is no real title available?)
 
2009-03-24Paper
scientific article; zbMATH DE number 5532112 (Why is no real title available?)
 
2009-03-24Paper
Introduction to post-quantum cryptography
Post-Quantum Cryptography
2009-03-12Paper
New AES Software Speed Records
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Attacking and Defending the McEliece Cryptosystem
Post-Quantum Cryptography
2008-11-11Paper
Analysis of QUAD
Fast Software Encryption
2008-09-16Paper
Twisted Edwards Curves
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Faster Addition and Doubling on Elliptic Curves
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
Lecture Notes in Computer Science
2008-05-06Paper
Inverted Edwards Coordinates
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
The Tangent FFT
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Proving Tight Security for Rabin-Williams Signatures
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
Lecture Notes in Computer Science
2008-04-11Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Proving primality in essentially quartic random time
Mathematics of Computation
2007-02-02Paper
Modular exponentiation via the explicit Chinese remainder theorem
Mathematics of Computation
2007-02-02Paper
Detecting perfect powers by factoring into coprimes
Mathematics of Computation
2007-02-02Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Sharper \(ABC\)-based bounds for congruent polynomials
Journal de Théorie des Nombres de Bordeaux
2006-03-30Paper
scientific article; zbMATH DE number 2154272 (Why is no real title available?)
 
2005-04-08Paper
Factoring into coprimes in essentially linear time
Journal of Algorithms
2005-02-22Paper
Prime sieves using binary quadratic forms
Mathematics of Computation
2004-02-12Paper
scientific article; zbMATH DE number 1996321 (Why is no real title available?)
 
2003-12-08Paper
Enumerating solutions to 𝑝(𝑎)+𝑞(𝑏)=𝑟(𝑐)+𝑠(𝑑)
Mathematics of Computation
2000-11-22Paper
How to stretch random functions: The security of protected counter sums
Journal of Cryptology
2000-06-06Paper
Composing power series over a finite ring in essentially linear time
Journal of Symbolic Computation
1999-10-12Paper
scientific article; zbMATH DE number 1186936 (Why is no real title available?)
 
1999-04-08Paper
scientific article; zbMATH DE number 1113822 (Why is no real title available?)
 
1998-09-07Paper
Detecting perfect powers in essentially linear time
Mathematics of Computation
1998-06-14Paper
The 3x+ 1 Conjugacy Map
Canadian Journal of Mathematics
1997-07-07Paper
A Non-Iterative 2-Adic Statement of the 3N + 1 Conjecture
Proceedings of the American Mathematical Society
1995-01-03Paper
scientific article; zbMATH DE number 475436 (Why is no real title available?)
 
1994-01-13Paper


Research outcomes over time


This page was built for person: Daniel J. Bernstein