What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Daniel J. Bernstein
Google Scholar
55
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations.
Daniel J. Bernstein
Karthikeyan Bhargavan
Shivam Bhasin
Anupam Chattopadhyay
Tee Kiah Chia
Matthias J. Kannwischer
Franziskus Kiefer
Thales B. Paiva
Prasanna Ravi
Goutam Tamvada
2025
conf/ndss
PQConnect: Automated Post-Quantum End-to-End Tunnels.
Daniel J. Bernstein
Tanja Lange
Jonathan Levin
Bo-Yin Yang
2024
journals/cic
Understanding binary-Goppa decoding.
Daniel J. Bernstein
2024
journals/joc
Cryptographic Competitions.
Daniel J. Bernstein
2024
conf/crypto
CryptAttackTester: high-assurance attack analysis.
Daniel J. Bernstein
Tung Chou
2022
conf/uss
OpenSSLNTRU: Faster post-quantum TLS key exchange.
Daniel J. Bernstein
Billy Bob Brumley
Ming-Shing Chen
Nicola Tuveri
2021
journals/tches
CTIDH: faster constant-time CSIDH.
Gustavo Banegas
Daniel J. Bernstein
Fabio Campos
Tung Chou
Tanja Lange
Michael Meyer
Benjamin Smith
Jana Sotáková
2021
journals/tches
Concrete quantum cryptanalysis of binary elliptic curves.
Gustavo Banegas
Daniel J. Bernstein
Iggy van Hoof
Tanja Lange
2020
conf/uss
McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.
Daniel J. Bernstein
Tanja Lange
2019
journals/tches
Fast constant-time gcd computation and modular inversion.
Daniel J. Bernstein
Bo-Yin Yang
2019
conf/ccs
The SPHINCS<sup>+</sup> Signature Framework.
Daniel J. Bernstein
Andreas Hülsing
Stefan Kölbl
Ruben Niederhagen
Joost Rijneveld
Peter Schwabe
2019
conf/eurocrypt
Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
Daniel J. Bernstein
Tanja Lange
Chloe Martindale
Lorenz Panny
2019
conf/asiacrypt
Decisional Second-Preimage Resistance: When Does SPR Imply PRE?
Daniel J. Bernstein
Andreas Hülsing
2018
conf/africacrypt
HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction.
Daniel J. Bernstein
Leon Groot Bruinderink
Tanja Lange
Lorenz Panny
2017
conf/ches
Gimli : A Cross-Platform Permutation.
Daniel J. Bernstein
Stefan Kölbl
Stefan Lucks
Pedro Maat Costa Massolino
Florian Mendel
Kashif Nawaz
Tobias Schneider
Peter Schwabe
François-Xavier Standaert
Yosuke Todo
Benoît Viguier
2017
conf/ches
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Daniel J. Bernstein
Joachim Breitner
Daniel Genkin
Leon Groot Bruinderink
Nadia Heninger
Tanja Lange
Christine van Vredendaal
Yuval Yarom
2017
conf/eurocrypt
Short Generators Without Quantum Computers: The Case of Multiquadratics.
Jens Bauch
Daniel J. Bernstein
Henry de Valence
Tanja Lange
Christine van Vredendaal
2017
conf/sacrypt
NTRU Prime: Reducing Attack Surface at Low Cost.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
Tanja Lange
Christine van Vredendaal
2017
conf/sacrypt
Low-Communication Parallel Quantum Multi-Target Preimage Search.
Gustavo Banegas
Daniel J. Bernstein
2016
conf/eurocrypt
Hash-Function Based PRFs: AMAC and Its Multi-User Security.
Mihir Bellare
Daniel J. Bernstein
Stefano Tessaro
2015
conf/latincrypt
Twisted Hessian Curves.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
David Kohel
Tanja Lange
2015
conf/acisp
Bad Directions in Cryptographic Hash Functions.
Daniel J. Bernstein
Andreas Hülsing
Tanja Lange
Ruben Niederhagen
2015
conf/eurocrypt
SPHINCS: Practical Stateless Hash-Based Signatures.
Daniel J. Bernstein
Daira Hopwood
Andreas Hülsing
Tanja Lange
Ruben Niederhagen
Louiza Papachristodoulou
Michael Schneider
Peter Schwabe
Zooko Wilcox-O'Hearn
2014
conf/latincrypt
TweetNaCl: A Crypto Library in 100 Tweets.
Daniel J. Bernstein
Bernard van Gastel
Wesley Janssen
Tanja Lange
Peter Schwabe
Sjaak Smetsers
2014
conf/uss
On the Practical Exploitability of Dual EC in TLS Implementations.
Stephen Checkoway
Ruben Niederhagen
Adam Everspaugh
Matthew Green
Tanja Lange
Thomas Ristenpart
Daniel J. Bernstein
Jake Maskiewicz
Hovav Shacham
Matthew Fredrikson
2014
conf/ches
Curve41417: Karatsuba Revisited.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
Tanja Lange
2014
conf/asiacrypt
Kummer Strikes Back: New DH Speed Records.
Daniel J. Bernstein
Chitchanok Chuengsatiansup
Tanja Lange
Peter Schwabe
2014
conf/sacrypt
Faster Binary-Field Multiplication and Faster Binary-Field MACs.
Daniel J. Bernstein
Tung Chou
2014
conf/sacrypt
Batch NFS.
Daniel J. Bernstein
Tanja Lange
2013
conf/ccs
MinimaLT: minimal-latency networking through better security.
W. Michael Petullo
Xu Zhang
Jon A. Solworth
Daniel J. Bernstein
Tanja Lange
2013
conf/ccs
Elligator: elliptic-curve points indistinguishable from uniform random strings.
Daniel J. Bernstein
Mike Hamburg
Anna Krasnova
Tanja Lange
2013
conf/uss
On the Security of RC4 in TLS.
Nadhem J. AlFardan
Daniel J. Bernstein
Kenneth G. Paterson
Bertram Poettering
Jacob C. N. Schuldt
2013
conf/ches
McBits: Fast Constant-Time Code-Based Cryptography.
Daniel J. Bernstein
Tung Chou
Peter Schwabe
2013
conf/asiacrypt
Non-uniform Cracks in the Concrete: The Power of Free Precomputation.
Daniel J. Bernstein
Tanja Lange
2013
conf/asiacrypt
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild.
Daniel J. Bernstein
Yun-An Chang
Chen-Mou Cheng
Li-Ping Chou
Nadia Heninger
Tanja Lange
Nicko van Someren
2012
conf/latincrypt
The Security Impact of a New Cryptographic Library.
Daniel J. Bernstein
Tanja Lange
Peter Schwabe
2012
conf/ches
NEON Crypto.
Daniel J. Bernstein
Peter Schwabe
2011
conf/crypto
Smaller Decoding Exponents: Ball-Collision Decoding.
Daniel J. Bernstein
Tanja Lange
Christiane Peters
2011
conf/ches
High-Speed High-Security Signatures.
Daniel J. Bernstein
Niels Duif
Tanja Lange
Peter Schwabe
Bo-Yin Yang
2011
conf/pkc
On the Correct Use of the Negation Map in the Pollard rho Method.
Daniel J. Bernstein
Tanja Lange
Peter Schwabe
2011
conf/africacrypt
Really Fast Syndrome-Based Hashing.
Daniel J. Bernstein
Tanja Lange
Christiane Peters
Peter Schwabe
2010
conf/latincrypt
Starfish on Strike.
Daniel J. Bernstein
Peter Birkner
Tanja Lange
2010
conf/sacrypt
Wild McEliece.
Daniel J. Bernstein
Tanja Lange
Christiane Peters
2009
conf/crypto
Batch Binary Edwards.
Daniel J. Bernstein
2009
conf/eurocrypt
ECM on Graphics Cards.
Daniel J. Bernstein
Tien-Ren Chen
Chen-Mou Cheng
Tanja Lange
Bo-Yin Yang
2008
conf/ches
Binary Edwards Curves.
Daniel J. Bernstein
Tanja Lange
Reza Rezaeian Farashahi
2008
conf/eurocrypt
Proving Tight Security for Rabin-Williams Signatures.
Daniel J. Bernstein
2008
conf/africacrypt
Twisted Edwards Curves.
Daniel J. Bernstein
Peter Birkner
Marc Joye
Tanja Lange
Christiane Peters
2007
conf/fse
Analysis of QUAD
Bo-Yin Yang
Chia-Hsin Owen Chen
Daniel J. Bernstein
Jiun-Ming Chen
2007
conf/ccs
Some thoughts on security after ten years of qmail 1.0.
Daniel J. Bernstein
2007
conf/asiacrypt
Faster Addition and Doubling on Elliptic Curves.
Daniel J. Bernstein
Tanja Lange
2006
conf/pkc
Curve25519: New Diffie-Hellman Speed Records.
Daniel J. Bernstein
2005
conf/fse
The Poly1305-AES Message-Authentication Code.
Daniel J. Bernstein
2005
conf/eurocrypt
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators.
Daniel J. Bernstein
1999
journals/joc
How to Stretch Random Functions: The Security of Protected Counter Sums.
Daniel J. Bernstein
Coauthors
Adam Everspaugh
(1)
Andreas Hülsing
(4)
Anna Krasnova
(1)
Anupam Chattopadhyay
(1)
Benjamin Smith
(1)
Benoît Viguier
(1)
Bernard van Gastel
(1)
Bertram Poettering
(1)
Billy Bob Brumley
(1)
Bo-Yin Yang
(5)
Chen-Mou Cheng
(2)
Chia-Hsin Owen Chen
(1)
Chitchanok Chuengsatiansup
(4)
Chloe Martindale
(1)
Christiane Peters
(4)
Christine van Vredendaal
(3)
Daira Hopwood
(1)
Daniel Genkin
(1)
Daniel J. Bernstein
(55)
David Kohel
(1)
Fabio Campos
(1)
Florian Mendel
(1)
François-Xavier Standaert
(1)
Franziskus Kiefer
(1)
Goutam Tamvada
(1)
Gustavo Banegas
(3)
Henry de Valence
(1)
Hovav Shacham
(1)
Iggy van Hoof
(1)
Jacob C. N. Schuldt
(1)
Jake Maskiewicz
(1)
Jana Sotáková
(1)
Jens Bauch
(1)
Jiun-Ming Chen
(1)
Joachim Breitner
(1)
Jon A. Solworth
(1)
Jonathan Levin
(1)
Joost Rijneveld
(1)
Karthikeyan Bhargavan
(1)
Kashif Nawaz
(1)
Kenneth G. Paterson
(1)
Leon Groot Bruinderink
(2)
Li-Ping Chou
(1)
Lorenz Panny
(2)
Louiza Papachristodoulou
(1)
Marc Joye
(1)
Matthew Fredrikson
(1)
Matthew Green
(1)
Matthias J. Kannwischer
(1)
Michael Meyer
(1)
Michael Schneider
(1)
Mihir Bellare
(1)
Mike Hamburg
(1)
Ming-Shing Chen
(1)
Nadhem J. AlFardan
(1)
Nadia Heninger
(2)
Nicko van Someren
(1)
Nicola Tuveri
(1)
Niels Duif
(1)
Pedro Maat Costa Massolino
(1)
Peter Birkner
(2)
Peter Schwabe
(11)
Prasanna Ravi
(1)
Reza Rezaeian Farashahi
(1)
Ruben Niederhagen
(4)
Shivam Bhasin
(1)
Sjaak Smetsers
(1)
Stefan Kölbl
(2)
Stefan Lucks
(1)
Stefano Tessaro
(1)
Stephen Checkoway
(1)
Tanja Lange
(32)
Tee Kiah Chia
(1)
Thales B. Paiva
(1)
Thomas Ristenpart
(1)
Tien-Ren Chen
(1)
Tobias Schneider
(1)
Tung Chou
(4)
W. Michael Petullo
(1)
Wesley Janssen
(1)
Xu Zhang
(1)
Yosuke Todo
(1)
Yun-An Chang
(1)
Yuval Yarom
(1)
Zooko Wilcox-O'Hearn
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to