Introduction to post-quantum cryptography DJ Bernstein Post-quantum cryptography, 1-14, 2009 | 1460 | 2009 |
Curve25519: new Diffie-Hellman speed records DJ Bernstein Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006 | 1162 | 2006 |
Cache-timing attacks on AES DJ Bernstein | 1041 | 2005 |
High-speed high-security signatures DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang Journal of cryptographic engineering 2 (2), 77-89, 2012 | 800 | 2012 |
Faster addition and doubling on elliptic curves DJ Bernstein, T Lange Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 648 | 2007 |
Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters Lecture Notes in Computer Science 5023, 389-405, 2008 | 586 | 2008 |
The Salsa20 family of stream ciphers DJ Bernstein New stream cipher designs: the eSTREAM finalists, 84-97, 2008 | 558 | 2008 |
ChaCha, a variant of Salsa20 DJ Bernstein Workshop record of SASC 8 (1), 3-5, 2008 | 514 | 2008 |
Attacking and defending the McEliece cryptosystem DJ Bernstein, T Lange, C Peters Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 477 | 2008 |
Post-quantum cryptography DJ Bernstein Encyclopedia of Cryptography and Security, 949-950, 2011 | 446* | 2011 |
The Poly1305-AES message-authentication code DJ Bernstein Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005 | 441 | 2005 |
SPHINCS: practical stateless hash-based signatures DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ... Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 410 | 2015 |
SipHash: a fast short-input PRF JP Aumasson, DJ Bernstein Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012 | 405 | 2012 |
The security impact of a new cryptographic library DJ Bernstein, T Lange, P Schwabe Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012 | 315 | 2012 |
eBACS: ECRYPT benchmarking of cryptographic systems DJ Bernstein, T Lange | 307 | 2009 |
NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 300* | 2018 |
Cache-timing attacks on AES, 2005 DJ Bernstein | 268 | 2005 |
On the Security of RC4 in TLS. NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt USENIX Security Symposium 2013, 2013 | 245 | 2013 |
Smaller decoding exponents: ball-collision decoding DJ Bernstein, T Lange, C Peters Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 237 | 2011 |
Explicit-formulas database DJ Bernstein http://www. hyperelliptic. org/EFD, 2007 | 234 | 2007 |