Daniel J. Bernstein

From MaRDI portal
Person:819872

Available identifiers

zbMath Open bernstein.daniel-jDBLPb/DanielJBernsteinWikidataQ92865 ScholiaQ92865MaRDI QIDQ819872

List of research outcomes





PublicationDate of PublicationType
CryptAttackTester: high-assurance attack analysis2024-12-13Paper
Fast norm computation in smooth-degree abelian number fields2024-01-04Paper
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack2023-08-14Paper
Montgomery Curves and the Montgomery Ladder2023-04-21Paper
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak2020-06-24Paper
Decisional second-preimage resistance: when does SPR imply PRE?2020-05-11Paper
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies2020-02-06Paper
A low-resource quantum factoring algorithm2018-09-12Paper
Post-quantum RSA2018-09-12Paper
HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction2018-07-17Paper
Asymptotically faster quantum algorithms to solve multivariate quadratic equations2018-06-22Paper
Low-communication parallel quantum multi-target preimage search2018-04-26Paper
NTRU prime: reducing attack surface at low cost2018-04-26Paper
Short Generators Without Quantum Computers: The Case of Multiquadratics2017-06-13Paper
Hash-Function Based PRFs: AMAC and Its Multi-User Security2016-09-09Paper
Dual EC: A Standardized Back Door2016-05-02Paper
Faster Binary-Field Multiplication and Faster Binary-Field MACs2016-04-13Paper
Batch NFS2016-04-13Paper
Bad Directions in Cryptographic Hash Functions2015-10-20Paper
https://portal.mardi4nfdi.de/entity/Q29494872015-10-01Paper
SPHINCS: Practical Stateless Hash-Based Signatures2015-09-30Paper
TweetNaCl: A Crypto Library in 100 Tweets2015-09-17Paper
Twisted Hessian Curves2015-09-17Paper
Curve41417: Karatsuba Revisited2015-07-21Paper
Kummer Strikes Back: New DH Speed Records2015-01-16Paper
Hyper-and-elliptic-curve cryptography2014-09-05Paper
Faster Batch Forgery Identification2014-08-20Paper
SipHash: A Fast Short-Input PRF2014-08-20Paper
Computing Small Discrete Logarithms Faster2014-08-20Paper
Non-uniform Cracks in the Concrete: The Power of Free Precomputation2013-12-10Paper
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild2013-12-10Paper
Never Trust a Bunny2013-11-19Paper
McBits: Fast Constant-Time Code-Based Cryptography2013-10-10Paper
Quantum Algorithms for the Subset-Sum Problem2013-06-14Paper
ECM using Edwards curves2013-03-20Paper
The Security Impact of a New Cryptographic Library2012-09-21Paper
Wild McEliece Incognito2011-11-25Paper
Simplified High-Speed High-Distance List Decoding for Alternant Codes2011-11-25Paper
High-Speed High-Security Signatures2011-10-07Paper
Smaller Decoding Exponents: Ball-Collision Decoding2011-08-12Paper
Really Fast Syndrome-Based Hashing2011-06-29Paper
List Decoding for Binary Goppa Codes2011-06-08Paper
Faster 2-Regular Information-Set Decoding2011-06-08Paper
A complete set of addition laws for incomplete Edwards curves2011-04-08Paper
Wild McEliece2011-03-15Paper
On the Correct Use of the Negation Map in the Pollard rho Method2011-03-15Paper
ECC2K-130 on NVIDIA GPUs2010-12-07Paper
Starfish on Strike2010-08-31Paper
Type-II Optimal Polynomial Bases2010-07-20Paper
Grover vs. McEliece2010-06-17Paper
FSBday2009-12-17Paper
Batch Binary Edwards2009-10-20Paper
Analysis and optimization of elliptic-curve single-scalar multiplication2009-07-06Paper
ECM on Graphics Cards2009-05-12Paper
Fast multiplication and its applications2009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q36159292009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q36159322009-03-24Paper
Introduction to post-quantum cryptography2009-03-12Paper
New AES Software Speed Records2009-01-22Paper
Attacking and Defending the McEliece Cryptosystem2008-11-11Paper
Analysis of QUAD2008-09-16Paper
Twisted Edwards Curves2008-06-13Paper
Faster Addition and Doubling on Elliptic Curves2008-05-15Paper
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators2008-05-06Paper
Inverted Edwards Coordinates2008-04-17Paper
The Tangent FFT2008-04-17Paper
Proving Tight Security for Rabin-Williams Signatures2008-04-15Paper
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication2008-04-11Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Proving primality in essentially quartic random time2007-02-02Paper
Modular exponentiation via the explicit Chinese remainder theorem2007-02-02Paper
Detecting perfect powers by factoring into coprimes2007-02-02Paper
Fast Software Encryption2006-06-22Paper
Sharper \(ABC\)-based bounds for congruent polynomials2006-03-30Paper
https://portal.mardi4nfdi.de/entity/Q46648332005-04-08Paper
Factoring into coprimes in essentially linear time2005-02-22Paper
Prime sieves using binary quadratic forms2004-02-12Paper
https://portal.mardi4nfdi.de/entity/Q44322942003-12-08Paper
Enumerating solutions to ๐‘(๐‘Ž)+๐‘ž(๐‘)=๐‘Ÿ(๐‘)+๐‘ (๐‘‘)2000-11-22Paper
How to stretch random functions: The security of protected counter sums2000-06-06Paper
Composing power series over a finite ring in essentially linear time1999-10-12Paper
https://portal.mardi4nfdi.de/entity/Q38401551999-04-08Paper
https://portal.mardi4nfdi.de/entity/Q43755941998-09-07Paper
Detecting perfect powers in essentially linear time1998-06-14Paper
The 3x+ 1 Conjugacy Map1997-07-07Paper
A Non-Iterative 2-Adic Statement of the 3N + 1 Conjecture1995-01-03Paper
https://portal.mardi4nfdi.de/entity/Q42736831994-01-13Paper

Research outcomes over time

This page was built for person: Daniel J. Bernstein