BibTeX records: Daniel J. Bernstein

download as .bib file

@article{DBLP:journals/cic/Bernstein24,
  author       = {Daniel J. Bernstein},
  title        = {Understanding binary-Goppa decoding},
  journal      = {{IACR} Commun. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {14},
  year         = {2024},
  url          = {https://doi.org/10.62056/angy4fe-3},
  doi          = {10.62056/ANGY4FE-3},
  timestamp    = {Fri, 21 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cic/Bernstein24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bernstein24,
  author       = {Daniel J. Bernstein},
  title        = {Cryptographic Competitions},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {1},
  pages        = {7},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-023-09467-1},
  doi          = {10.1007/S00145-023-09467-1},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/Bernstein24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BernsteinC24,
  author       = {Daniel J. Bernstein and
                  Tung Chou},
  editor       = {Leonid Reyzin and
                  Douglas Stebila},
  title        = {CryptAttackTester: high-assurance attack analysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024,
                  Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14925},
  pages        = {141--182},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-68391-6\_5},
  doi          = {10.1007/978-3-031-68391-6\_5},
  timestamp    = {Wed, 28 Aug 2024 21:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BernsteinC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein24,
  author       = {Daniel J. Bernstein},
  title        = {Asymptotics for the standard block size in primal lattice attacks:
                  second order, formally verified},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/592},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCL24,
  author       = {Daniel J. Bernstein and
                  Jolijn Cottaar and
                  Tanja Lange},
  title        = {Searching for differential addition chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1044},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBBCCKKPRT24,
  author       = {Daniel J. Bernstein and
                  Karthikeyan Bhargavan and
                  Shivam Bhasin and
                  Anupam Chattopadhyay and
                  Tee Kiah Chia and
                  Matthias J. Kannwischer and
                  Franziskus Kiefer and
                  Thales Paiva and
                  Prasanna Ravi and
                  Goutam Tamvada},
  title        = {KyberSlash: Exploiting secret-dependent division timings in Kyber
                  implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1049},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBBCCKKPRT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL24,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Safe curves for elliptic-curve cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1265},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1265},
  timestamp    = {Sun, 01 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinC23,
  author       = {Daniel J. Bernstein and
                  Tung Chou},
  title        = {CryptAttackTester: formalizing attack analyses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/940},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein23,
  author       = {Daniel J. Bernstein},
  title        = {Quantifying risks in cryptographic selection processes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1838},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1838},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein23a,
  author       = {Daniel J. Bernstein},
  title        = {Predicting performance for post-quantum encrypted-file systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1878},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1878},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein23b,
  author       = {Daniel J. Bernstein},
  title        = {Asymptotics of hybrid primal lattice attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1892},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1892},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein23c,
  author       = {Daniel J. Bernstein},
  title        = {Analyzing the complexity of reference post-quantum software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1924},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1924},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Bernstein22,
  author       = {Daniel J. Bernstein},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {A One-Time Single-bit Fault Leaks All Previous {NTRU-HRSS} Session
                  Keys to a Chosen-Ciphertext Attack},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {617--643},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_27},
  doi          = {10.1007/978-3-031-22912-1\_27},
  timestamp    = {Mon, 09 Jan 2023 17:58:33 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Bernstein22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BernsteinBCT22,
  author       = {Daniel J. Bernstein and
                  Billy Bob Brumley and
                  Ming{-}Shing Chen and
                  Nicola Tuveri},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {OpenSSLNTRU: Faster post-quantum {TLS} key exchange},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {845--862},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/bernstein},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BernsteinBCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein22,
  author       = {Daniel J. Bernstein},
  title        = {Understanding binary-Goppa decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/473},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein22a,
  author       = {Daniel J. Bernstein},
  title        = {Fast norm computation in smooth-degree Abelian number fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/980},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein22b,
  author       = {Daniel J. Bernstein},
  title        = {A one-time single-bit fault leaks all previous {NTRU-HRSS} session
                  keys to a chosen-ciphertext attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1125},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1125},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein22c,
  author       = {Daniel J. Bernstein},
  title        = {Multi-ciphertext security degradation for lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1580},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1580},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanegasBHL21,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein and
                  Iggy van Hoof and
                  Tanja Lange},
  title        = {Concrete quantum cryptanalysis of binary elliptic curves},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {451--472},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.451-472},
  doi          = {10.46586/TCHES.V2021.I1.451-472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BanegasBHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanegasBCCLMSS21,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein and
                  Fabio Campos and
                  Tung Chou and
                  Tanja Lange and
                  Michael Meyer and
                  Benjamin Smith and
                  Jana Sot{\'{a}}kov{\'{a}}},
  title        = {{CTIDH:} faster constant-time {CSIDH}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {351--387},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.351-387},
  doi          = {10.46586/TCHES.V2021.I4.351-387},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BanegasBCCLMSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThomaFKGB21,
  author       = {Jan Philipp Thoma and
                  Jakob Feldtkeller and
                  Markus Krausz and
                  Tim G{\"{u}}neysu and
                  Daniel J. Bernstein},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {BasicBlocker: {ISA} Redesign to Make Spectre-Immune CPUs Faster},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {103--118},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471857},
  doi          = {10.1145/3471621.3471857},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ThomaFKGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08759,
  author       = {Daniel J. Bernstein and
                  Billy Bob Brumley and
                  Ming{-}Shing Chen and
                  Nicola Tuveri},
  title        = {OpenSSLNTRU: Faster post-quantum {TLS} key exchange},
  journal      = {CoRR},
  volume       = {abs/2106.08759},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08759},
  eprinttype    = {arXiv},
  eprint       = {2106.08759},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasBCCLMSS21,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein and
                  Fabio Campos and
                  Tung Chou and
                  Tanja Lange and
                  Michael Meyer and
                  Benjamin Smith and
                  Jana Sot{\'{a}}kov{\'{a}}},
  title        = {{CTIDH:} faster constant-time {CSIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/633},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasBCCLMSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBCT21,
  author       = {Daniel J. Bernstein and
                  Billy Bob Brumley and
                  Ming{-}Shing Chen and
                  Nicola Tuveri},
  title        = {OpenSSLNTRU: Faster post-quantum {TLS} key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/826},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein21,
  author       = {Daniel J. Bernstein},
  title        = {On the looseness of {FO} derandomization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/912},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL21,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Non-randomness of S-unit lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1428},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1428},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Bernstein020,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network
                  Servers},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1731--1748},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/bernstein},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Bernstein020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-10118,
  author       = {Daniel J. Bernstein and
                  Luca De Feo and
                  Antonin Leroux and
                  Benjamin Smith},
  title        = {Faster computation of isogenies of large prime degree},
  journal      = {CoRR},
  volume       = {abs/2003.10118},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.10118},
  eprinttype    = {arXiv},
  eprint       = {2003.10118},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-10118.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-15919,
  author       = {Jan Philipp Thoma and
                  Jakob Feldtkeller and
                  Markus Krausz and
                  Tim G{\"{u}}neysu and
                  Daniel J. Bernstein},
  title        = {BasicBlocker: Redesigning ISAs to Eliminate Speculative-Execution
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/2007.15919},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.15919},
  eprinttype    = {arXiv},
  eprint       = {2007.15919},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-15919.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinFLS20,
  author       = {Daniel J. Bernstein and
                  Luca De Feo and
                  Antonin Leroux and
                  Benjamin Smith},
  title        = {Faster computation of isogenies of large prime degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/341},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinFLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasBHL20,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein and
                  Iggy van Hoof and
                  Tanja Lange},
  title        = {Concrete quantum cryptanalysis of binary elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1296},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1296},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasBHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein20,
  author       = {Daniel J. Bernstein},
  title        = {A discretization attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1370},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1370},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinGT20,
  author       = {Daniel J. Bernstein and
                  Henri Gilbert and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Observations on {COMET}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1445},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1445},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein20a,
  author       = {Daniel J. Bernstein},
  title        = {Verified fast formulas for control bits for permutation networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1493},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1493},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein20b,
  author       = {Daniel J. Bernstein},
  title        = {Cryptographic competitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1608},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1608},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BernsteinY19,
  author       = {Daniel J. Bernstein and
                  Bo{-}Yin Yang},
  title        = {Fast constant-time gcd computation and modular inversion},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {340--398},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.340-398},
  doi          = {10.13154/TCHES.V2019.I3.340-398},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BernsteinY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernsteinH19,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Decisional Second-Preimage Resistance: When Does {SPR} Imply PRE?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_2},
  doi          = {10.1007/978-3-030-34618-8\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernsteinH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BernsteinHKNRS19,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Stefan K{\"{o}}lbl and
                  Ruben Niederhagen and
                  Joost Rijneveld and
                  Peter Schwabe},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {The SPHINCS\({}^{\mbox{+}}\) Signature Framework},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2129--2146},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363229},
  doi          = {10.1145/3319535.3363229},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BernsteinHKNRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Bernstein0MP19,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Chloe Martindale and
                  Lorenz Panny},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Quantum Circuits for the {CSIDH:} Optimizing Quantum Evaluation of
                  Isogenies},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11477},
  pages        = {409--441},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17656-3\_15},
  doi          = {10.1007/978-3-030-17656-3\_15},
  timestamp    = {Tue, 14 May 2019 13:55:31 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Bernstein0MP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinY19,
  author       = {Daniel J. Bernstein and
                  Bo{-}Yin Yang},
  title        = {Fast constant-time gcd computation and modular inversion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinH19,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing},
  title        = {Decisional second-preimage resistance: When does {SPR} imply PRE?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein19,
  author       = {Daniel J. Bernstein},
  title        = {Visualizing size-security tradeoffs for lattice-based encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein19a,
  author       = {Daniel J. Bernstein},
  title        = {Comparing proofs of security for lattice-based encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHKNRS19,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Stefan K{\"{o}}lbl and
                  Ruben Niederhagen and
                  Joost Rijneveld and
                  Peter Schwabe},
  title        = {The {SPHINCS+} Signature Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1086},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHKNRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein019,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {McTiny: fast high-confidence post-quantum key erasure for tiny network
                  servers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1395},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BernsteinB0P18,
  author       = {Daniel J. Bernstein and
                  Leon Groot Bruinderink and
                  Tanja Lange and
                  Lorenz Panny},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {{HILA5} Pindakaas: On the {CCA} Security of Lattice-Based Encryption
                  with Error Correction},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {203--216},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_12},
  doi          = {10.1007/978-3-319-89339-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BernsteinB0P18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinY18,
  author       = {Daniel J. Bernstein and
                  Bo{-}Yin Yang},
  editor       = {Tanja Lange and
                  Rainer Steinwandt},
  title        = {Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic
                  Equations},
  booktitle    = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
                  2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10786},
  pages        = {487--506},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-79063-3\_23},
  doi          = {10.1007/978-3-319-79063-3\_23},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-04520,
  author       = {Daniel J. Bernstein},
  title        = {Is the security of quantum cryptography guaranteed by the laws of
                  physics?},
  journal      = {CoRR},
  volume       = {abs/1803.04520},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.04520},
  eprinttype    = {arXiv},
  eprint       = {1803.04520},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-04520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinP18,
  author       = {Daniel J. Bernstein and
                  Edoardo Persichetti},
  title        = {Towards {KEM} Unification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLMP18,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Chloe Martindale and
                  Lorenz Panny},
  title        = {Quantum circuits for the {CSIDH:} optimizing quantum evaluation of
                  isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1059},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nature/Bernstein017,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Post-quantum cryptography},
  journal      = {Nat.},
  volume       = {549},
  number       = {7671},
  pages        = {188--194},
  year         = {2017},
  url          = {https://doi.org/10.1038/nature23461},
  doi          = {10.1038/NATURE23461},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nature/Bernstein017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Gimli : {A} Cross-Platform Permutation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {299--320},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_15},
  doi          = {10.1007/978-3-319-66787-4\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {555--576},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_27},
  doi          = {10.1007/978-3-319-66787-4\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BauchBVLV17,
  author       = {Jens Bauch and
                  Daniel J. Bernstein and
                  Henry de Valence and
                  Tanja Lange and
                  Christine van Vredendaal},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Short Generators Without Quantum Computers: The Case of Multiquadratics},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {27--59},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_2},
  doi          = {10.1007/978-3-319-56620-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BauchBVLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinHLV17,
  author       = {Daniel J. Bernstein and
                  Nadia Heninger and
                  Paul Lou and
                  Luke Valenta},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {Post-quantum {RSA}},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {311--329},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_18},
  doi          = {10.1007/978-3-319-59879-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinBM17,
  author       = {Daniel J. Bernstein and
                  Jean{-}Fran{\c{c}}ois Biasse and
                  Michele Mosca},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {A Low-Resource Quantum Factoring Algorithm},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_19},
  doi          = {10.1007/978-3-319-59879-6\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BernsteinC0V17,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange and
                  Christine van Vredendaal},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {{NTRU} Prime: Reducing Attack Surface at Low Cost},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {235--260},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_12},
  doi          = {10.1007/978-3-319-72565-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BernsteinC0V17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BanegasB17,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {Low-Communication Parallel Quantum Multi-Target Preimage Search},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {325--335},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_16},
  doi          = {10.1007/978-3-319-72565-9\_16},
  timestamp    = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BanegasB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCL17,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange},
  title        = {Double-base scalar multiplication revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL17,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Montgomery curves and the Montgomery ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL17a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Post-quantum cryptography - dealing with the fallout of physics success},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHLV17,
  author       = {Daniel J. Bernstein and
                  Nadia Heninger and
                  Paul Lou and
                  Luke Valenta},
  title        = {Post-quantum {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBM17,
  author       = {Daniel J. Bernstein and
                  Jean{-}Fran{\c{c}}ois Biasse and
                  Michele Mosca},
  title        = {A low-resource quantum factoring algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauchBVLV17,
  author       = {Jens Bauch and
                  Daniel J. Bernstein and
                  Henry de Valence and
                  Tanja Lange and
                  Christine van Vredendaal},
  title        = {Short generators without quantum computers: the case of multiquadratics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauchBVLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  title        = {Sliding right into disaster: Left-to-right sliding windows leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinKLMMNS17,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  title        = {Gimli: a cross-platform permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasB17,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein},
  title        = {Low-communication parallel quantum multi-target preimage search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {789},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/789},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinY17,
  author       = {Daniel J. Bernstein and
                  Bo{-}Yin Yang},
  title        = {Asymptotically faster quantum algorithms to solve multivariate quadratic
                  equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1206},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinB0P17,
  author       = {Daniel J. Bernstein and
                  Leon Groot Bruinderink and
                  Tanja Lange and
                  Lorenz Panny},
  title        = {{HILA5} Pindakaas: On the {CCA} security of lattice-based encryption
                  with error correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1214},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinB0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BernsteinLN16,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Ruben Niederhagen},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Dual {EC:} {A} Standardized Back Door},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {256--281},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_17},
  doi          = {10.1007/978-3-662-49301-4\_17},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BernsteinLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareBT16,
  author       = {Mihir Bellare and
                  Daniel J. Bernstein and
                  Stefano Tessaro},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Hash-Function Based PRFs: {AMAC} and Its Multi-User Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {566--595},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_22},
  doi          = {10.1007/978-3-662-49890-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBT16,
  author       = {Mihir Bellare and
                  Daniel J. Bernstein and
                  Stefano Tessaro},
  title        = {Hash-Function based PRFs: {AMAC} and its Multi-User Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinELNPS016,
  author       = {Daniel J. Bernstein and
                  Susanne Engels and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christof Paar and
                  Peter Schwabe and
                  Ralf Zimmermann},
  title        = {Faster discrete logarithms on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinELNPS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCLV16,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange and
                  Christine van Vredendaal},
  title        = {{NTRU} Prime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BernsteinHLN15,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Bad Directions in Cryptographic Hash Functions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {488--508},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_28},
  doi          = {10.1007/978-3-319-19962-7\_28},
  timestamp    = {Tue, 07 May 2024 20:09:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BernsteinHLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BernsteinHHLNPS15,
  author       = {Daniel J. Bernstein and
                  Daira Hopwood and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Louiza Papachristodoulou and
                  Michael Schneider and
                  Peter Schwabe and
                  Zooko Wilcox{-}O'Hearn},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {{SPHINCS:} Practical Stateless Hash-Based Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {368--397},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_15},
  doi          = {10.1007/978-3-662-46800-5\_15},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BernsteinHHLNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BernsteinCKL15,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  David Kohel and
                  Tanja Lange},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Twisted Hessian Curves},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {269--294},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_15},
  doi          = {10.1007/978-3-319-22174-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BernsteinCKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BernsteinCCHLLN15,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Chitchanok Chuengsatiansup and
                  Andreas H{\"{u}}lsing and
                  Eran Lambooij and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christine van Vredendaal},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {How to Manipulate Curve Standards: {A} White Paper for the Black Hat
                  http: //bada55.cr.yp.to},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {109--139},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_6},
  doi          = {10.1007/978-3-319-27152-1\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/BernsteinCCHLLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/AubelBN15,
  author       = {Pol Van Aubel and
                  Daniel J. Bernstein and
                  Ruben Niederhagen},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Investigating {SRAM} PUFs in large CPUs and GPUs},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {228--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_14},
  doi          = {10.1007/978-3-319-24126-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/AubelBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AubelBN15,
  author       = {Pol Van Aubel and
                  Daniel J. Bernstein and
                  Ruben Niederhagen},
  title        = {Investigating {SRAM} PUFs in large CPUs and GPUs},
  journal      = {CoRR},
  volume       = {abs/1507.08514},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.08514},
  eprinttype    = {arXiv},
  eprint       = {1507.08514},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AubelBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHLN15,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen},
  title        = {Bad directions in cryptographic hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLV15,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christine van Vredendaal},
  title        = {Tighter, faster, simpler side-channel security evaluations beyond
                  computing power},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCS15,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Peter Schwabe},
  title        = {McBits: fast constant-time code-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinJLSY15,
  author       = {Daniel J. Bernstein and
                  Simon Josefsson and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {EdDSA for more curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinJLSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AubelBN15,
  author       = {Pol Van Aubel and
                  Daniel J. Bernstein and
                  Ruben Niederhagen},
  title        = {Investigating {SRAM} PUFs in large CPUs and GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {760},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/760},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AubelBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLN15,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Ruben Niederhagen},
  title        = {Dual {EC:} {A} Standardized Back Door},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCKL15,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  David Kohel and
                  Tanja Lange},
  title        = {Twisted Hessian curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein15,
  author       = {Daniel J. Bernstein},
  title        = {Multi-user Schnorr security, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/Bernstein014,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Hyper-and-elliptic-curve cryptography},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {17},
  number       = {Theory},
  pages        = {181--202},
  year         = {2014},
  url          = {https://doi.org/10.1112/s1461157014000394},
  doi          = {10.1112/S1461157014000394},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/Bernstein014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernsteinCLS14,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange and
                  Peter Schwabe},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Kummer Strikes Back: New {DH} Speed Records},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {317--337},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_17},
  doi          = {10.1007/978-3-662-45611-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernsteinCLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinCL14,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Curve41417: Karatsuba Revisited},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_18},
  doi          = {10.1007/978-3-662-44709-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BernsteinGJLSS14,
  author       = {Daniel J. Bernstein and
                  Bernard van Gastel and
                  Wesley Janssen and
                  Tanja Lange and
                  Peter Schwabe and
                  Sjaak Smetsers},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {TweetNaCl: {A} Crypto Library in 100 Tweets},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {64--83},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_4},
  doi          = {10.1007/978-3-319-16295-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BernsteinGJLSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BernsteinL14,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Batch {NFS}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {38--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_3},
  doi          = {10.1007/978-3-319-13051-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BernsteinL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BernsteinC14,
  author       = {Daniel J. Bernstein and
                  Tung Chou},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Faster Binary-Field Multiplication and Faster Binary-Field MACs},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_6},
  doi          = {10.1007/978-3-319-13051-4\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BernsteinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CheckowayNE0LRBMSF14,
  author       = {Stephen Checkoway and
                  Ruben Niederhagen and
                  Adam Everspaugh and
                  Matthew Green and
                  Tanja Lange and
                  Thomas Ristenpart and
                  Daniel J. Bernstein and
                  Jake Maskiewicz and
                  Hovav Shacham and
                  Matthew Fredrikson},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {On the Practical Exploitability of Dual {EC} in {TLS} Implementations},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {319--335},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/checkoway},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CheckowayNE0LRBMSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCLS14,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange and
                  Peter Schwabe},
  title        = {Kummer strikes back: new {DH} speed records},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL14,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Hyper-and-elliptic-curve cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCL14,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange},
  title        = {Curve41417: Karatsuba revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCHLNV14,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Chitchanok Chuengsatiansup and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christine van Vredendaal},
  title        = {How to manipulate curve standards: a white paper for the black hat},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCHLNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinC14,
  author       = {Daniel J. Bernstein and
                  Tung Chou},
  title        = {Faster Binary-Field Multiplication and Faster Binary-Field MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {729},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/729},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHHLNPSO14,
  author       = {Daniel J. Bernstein and
                  Daira Hopwood and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Zooko Wilcox{-}O'Hearn},
  title        = {{SPHINCS:} practical stateless hash-based signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {795},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/795},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHHLNPSO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL14a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Batch {NFS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/921},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/BernsteinBLP13,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange and
                  Christiane Peters},
  title        = {{ECM} using Edwards curves},
  journal      = {Math. Comput.},
  volume       = {82},
  number       = {282},
  pages        = {1139--1179},
  year         = {2013},
  url          = {https://doi.org/10.1090/S0025-5718-2012-02633-0},
  doi          = {10.1090/S0025-5718-2012-02633-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/BernsteinBLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernsteinL13,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Non-uniform Cracks in the Concrete: The Power of Free Precomputation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {321--340},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_17},
  doi          = {10.1007/978-3-642-42045-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernsteinL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernsteinCCCHLS13,
  author       = {Daniel J. Bernstein and
                  Yun{-}An Chang and
                  Chen{-}Mou Cheng and
                  Li{-}Ping Chou and
                  Nadia Heninger and
                  Tanja Lange and
                  Nicko van Someren},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Factoring {RSA} Keys from Certified Smart Cards: Coppersmith in the
                  Wild},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {341--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_18},
  doi          = {10.1007/978-3-642-42045-0\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernsteinCCCHLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PetulloZSBL13,
  author       = {W. Michael Petullo and
                  Xu Zhang and
                  Jon A. Solworth and
                  Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {MinimaLT: minimal-latency networking through better security},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {425--438},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516737},
  doi          = {10.1145/2508859.2516737},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PetulloZSBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BernsteinHKL13,
  author       = {Daniel J. Bernstein and
                  Mike Hamburg and
                  Anna Krasnova and
                  Tanja Lange},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Elligator: elliptic-curve points indistinguishable from uniform random
                  strings},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {967--980},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516734},
  doi          = {10.1145/2508859.2516734},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BernsteinHKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinCS13,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Peter Schwabe},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {McBits: Fast Constant-Time Code-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {250--272},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_15},
  doi          = {10.1007/978-3-642-40349-1\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinJLM13,
  author       = {Daniel J. Bernstein and
                  Stacey Jeffery and
                  Tanja Lange and
                  Alexander Meurer},
  editor       = {Philippe Gaborit},
  title        = {Quantum Algorithms for the Subset-Sum Problem},
  booktitle    = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
                  Limoges, France, June 4-7, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7932},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38616-9\_2},
  doi          = {10.1007/978-3-642-38616-9\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinJLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlFardanBPPS13,
  author       = {Nadhem J. AlFardan and
                  Daniel J. Bernstein and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Samuel T. King},
  title        = {On the Security of {RC4} in {TLS}},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {305--320},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/13/Bernstein013,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Gary L. Mullen and
                  Daniel Panario},
  title        = {Addition formulas for elliptic curves},
  booktitle    = {Handbook of Finite Fields},
  series       = {Discrete mathematics and its applications},
  pages        = {440--446},
  publisher    = {{CRC} Press},
  year         = {2013},
  timestamp    = {Mon, 08 Jun 2020 15:38:06 +0200},
  biburl       = {https://dblp.org/rec/books/crc/13/Bernstein013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinJLM13,
  author       = {Daniel J. Bernstein and
                  Stacey Jeffery and
                  Tanja Lange and
                  Alexander Meurer},
  title        = {Quantum algorithms for the subset-sum problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinJLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetulloZSBL13,
  author       = {W. Michael Petullo and
                  Xu Zhang and
                  Jon A. Solworth and
                  Daniel J. Bernstein and
                  Tanja Lange},
  title        = {MinimaLT: Minimal-latency Networking Through Better Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PetulloZSBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinKL13,
  author       = {Daniel J. Bernstein and
                  Anna Krasnova and
                  Tanja Lange},
  title        = {Elligator: Elliptic-curve points indistinguishable from uniform random
                  strings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCCHLS13,
  author       = {Daniel J. Bernstein and
                  Yun{-}An Chang and
                  Chen{-}Mou Cheng and
                  Li{-}Ping Chou and
                  Nadia Heninger and
                  Tanja Lange and
                  Nicko van Someren},
  title        = {Factoring {RSA} keys from certified smart cards: Coppersmith in the
                  wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCCHLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BernsteinDLSY12,
  author       = {Daniel J. Bernstein and
                  Niels Duif and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {High-speed high-security signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {77--89},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0027-1},
  doi          = {10.1007/S13389-012-0027-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BernsteinDLSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinS12,
  author       = {Daniel J. Bernstein and
                  Peter Schwabe},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {{NEON} Crypto},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {320--339},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_19},
  doi          = {10.1007/978-3-642-33027-8\_19},
  timestamp    = {Mon, 15 Jun 2020 17:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinL12,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Computing Small Discrete Logarithms Faster},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {317--338},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_19},
  doi          = {10.1007/978-3-642-34931-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinDLO12,
  author       = {Daniel J. Bernstein and
                  Jeroen Doumen and
                  Tanja Lange and
                  Jan{-}Jaap Oosterwijk},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Faster Batch Forgery Identification},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {454--473},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_26},
  doi          = {10.1007/978-3-642-34931-7\_26},
  timestamp    = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinDLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AumassonB12,
  author       = {Jean{-}Philippe Aumasson and
                  Daniel J. Bernstein},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {SipHash: {A} Fast Short-Input {PRF}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {489--508},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_28},
  doi          = {10.1007/978-3-642-34931-7\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AumassonB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BernsteinLS12,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {The Security Impact of a New Cryptographic Library},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {159--176},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_9},
  doi          = {10.1007/978-3-642-33481-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BernsteinLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BernsteinL12,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {Never Trust a Bunny},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {137--148},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_10},
  doi          = {10.1007/978-3-642-36140-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BernsteinL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCLNSY12,
  author       = {Daniel J. Bernstein and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {{ECC2K-130} on {NVIDIA} GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {The new {SHA-3} software shootout},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCLNSY12a,
  author       = {Daniel J. Bernstein and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {Usable assembly language for GPUs: a success story},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Two grumpy giants and a baby},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12b,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Non-uniform cracks in the concrete: the power of free precomputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonB12,
  author       = {Jean{-}Philippe Aumasson and
                  Daniel J. Bernstein},
  title        = {SipHash: a fast short-input {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12c,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Never trust a bunny},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12d,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Computing small discrete logarithms faster},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinDLO12,
  author       = {Daniel J. Bernstein and
                  Jeroen Doumen and
                  Tanja Lange and
                  Jan{-}Jaap Oosterwijk},
  title        = {Faster batch forgery identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinDLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BernsteinLPS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters and
                  Peter Schwabe},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Really Fast Syndrome-Based Hashing},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {134--152},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_9},
  doi          = {10.1007/978-3-642-21969-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BernsteinLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinDLSY11,
  author       = {Daniel J. Bernstein and
                  Niels Duif and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {High-Speed High-Security Signatures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {124--142},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_9},
  doi          = {10.1007/978-3-642-23951-9\_9},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinDLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/Bernstein11,
  author       = {Daniel J. Bernstein},
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {List Decoding for Binary Goppa Codes},
  booktitle    = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  pages        = {62--80},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7\_4},
  doi          = {10.1007/978-3-642-20901-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/Bernstein11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/BernsteinLPS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters and
                  Peter Schwabe},
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Faster 2-Regular Information-Set Decoding},
  booktitle    = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  pages        = {81--98},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7\_5},
  doi          = {10.1007/978-3-642-20901-7\_5},
  timestamp    = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/BernsteinLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BernsteinLP11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {Phillip Rogaway},
  title        = {Smaller Decoding Exponents: Ball-Collision Decoding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {743--760},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_42},
  doi          = {10.1007/978-3-642-22792-9\_42},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BernsteinLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernsteinLS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On the Correct Use of the Negation Map in the Pollard rho Method},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_8},
  doi          = {10.1007/978-3-642-19379-8\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernsteinLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/Bernstein11,
  author       = {Daniel J. Bernstein},
  editor       = {Bo{-}Yin Yang},
  title        = {Simplified High-Speed High-Distance List Decoding for Alternant Codes},
  booktitle    = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011,
                  Taipei, Taiwan, November 29 - December 2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7071},
  pages        = {200--216},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25405-5\_13},
  doi          = {10.1007/978-3-642-25405-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/Bernstein11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinLP11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {Bo{-}Yin Yang},
  title        = {Wild McEliece Incognito},
  booktitle    = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011,
                  Taipei, Taiwan, November 29 - December 2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7071},
  pages        = {244--254},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25405-5\_16},
  doi          = {10.1007/978-3-642-25405-5\_16},
  timestamp    = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2011,
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6},
  doi          = {10.1007/978-3-642-25578-6},
  isbn         = {978-3-642-25577-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bernstein11,
  author       = {Daniel J. Bernstein},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Factorization Circuits},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {444--445},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_447},
  doi          = {10.1007/978-1-4419-5906-5\_447},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bernstein11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bernstein11a,
  author       = {Daniel J. Bernstein},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Post-Quantum Cryptography},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {949--950},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_386},
  doi          = {10.1007/978-1-4419-5906-5\_386},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bernstein11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  title        = {On the correct use of the negation map in the Pollard rho method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLPS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters and
                  Peter Schwabe},
  title        = {Really fast syndrome-based hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLPS11a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters and
                  Peter Schwabe},
  title        = {Faster 2-regular information-set decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLPS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinDLSY11,
  author       = {Daniel J. Bernstein and
                  Niels Duif and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {High-speed high-security signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinDLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Wild McEliece Incognito},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLS11a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  title        = {The security impact of a new cryptographic library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinCCLNSY10,
  author       = {Daniel J. Bernstein and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {{ECC2K-130} on {NVIDIA} GPUs},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {328--346},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_23},
  doi          = {10.1007/978-3-642-17401-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinCCLNSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BernsteinBL10,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Starfish on Strike},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_4},
  doi          = {10.1007/978-3-642-14712-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BernsteinBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/Bernstein10,
  author       = {Daniel J. Bernstein},
  editor       = {Nicolas Sendrier},
  title        = {Grover vs. McEliece},
  booktitle    = {Post-Quantum Cryptography, Third International Workshop, PQCrypto
                  2010, Darmstadt, Germany, May 25-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6061},
  pages        = {73--80},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12929-2\_6},
  doi          = {10.1007/978-3-642-12929-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/Bernstein10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BernsteinLP10,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Wild McEliece},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {143--158},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_10},
  doi          = {10.1007/978-3-642-19574-7\_10},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BernsteinLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/BernsteinL10,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {M. Anwar Hasan and
                  Tor Helleseth},
  title        = {Type-II Optimal Polynomial Bases},
  booktitle    = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI}
                  2010, Istanbul, Turkey, June 27-30, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6087},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13797-6\_4},
  doi          = {10.1007/978-3-642-13797-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/BernsteinL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9},
  doi          = {10.1007/978-3-642-12678-9},
  isbn         = {978-3-642-12677-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL10,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Type-II Optimal Polynomial Bases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBL10,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange},
  title        = {Starfish on Strike},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP10,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Wild McEliece},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP10a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Smaller decoding exponents: ball-collision decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL10a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Cryptanalysis of Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bernstein09,
  author       = {Daniel J. Bernstein},
  editor       = {Shai Halevi},
  title        = {Batch Binary Edwards},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_19},
  doi          = {10.1007/978-3-642-03356-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bernstein09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BernsteinCCLY09,
  author       = {Daniel J. Bernstein and
                  Tien{-}Ren Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Bo{-}Yin Yang},
  editor       = {Antoine Joux},
  title        = {{ECM} on Graphics Cards},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {483--501},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_28},
  doi          = {10.1007/978-3-642-01001-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BernsteinCCLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinLNPS09,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christiane Peters and
                  Peter Schwabe},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {FSBday},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {18--38},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_2},
  doi          = {10.1007/978-3-642-10628-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinLNPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BangerterBBDPPS09,
  author       = {Endre Bangerter and
                  Manuel Barbosa and
                  Daniel J. Bernstein and
                  Ivan Damg{\aa}rd and
                  Daniel Page and
                  Jakob Illeborg Pagter and
                  Ahmad{-}Reza Sadeghi and
                  Sampo Sovio},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Using Compilers to Enhance Cryptographic Product Development},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {291--301},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_29},
  doi          = {10.1007/978-3-8348-9363-5\_29},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/BangerterBBDPPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/Bernstein09,
  author       = {Daniel J. Bernstein},
  editor       = {Dan Boneh and
                  Alexander Sotirov},
  title        = {Breaking {DNSSEC}},
  booktitle    = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal,
                  Canada, August 10, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  timestamp    = {Wed, 24 May 2023 10:25:04 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/Bernstein09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLNPS09,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christiane Peters and
                  Peter Schwabe},
  title        = {Implementing Wagner's generalized birthday attack against the {SHA-3}
                  round-1 candidate {FSB}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLNPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09,
  author       = {Daniel V. Bailey and
                  Brian Baldwin and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel},
  title        = {The Certicom Challenges {ECC2-X}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09,
  author       = {Daniel V. Bailey and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Luis J. Dominguez Perez and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Ruben Niederhagen and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel and
                  Anthony Van Herrewege and
                  Bo{-}Yin Yang},
  title        = {Breaking {ECC2K-130}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL09,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {A complete set of addition laws for incomplete Edwards curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BernsteinBJLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Marc Joye and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {Serge Vaudenay},
  title        = {Twisted Edwards Curves},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {389--405},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_26},
  doi          = {10.1007/978-3-540-68164-9\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BernsteinBJLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinLF08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Reza Rezaeian Farashahi},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Binary Edwards Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {244--265},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_16},
  doi          = {10.1007/978-3-540-85053-3\_16},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Bernstein08,
  author       = {Daniel J. Bernstein},
  editor       = {Nigel P. Smart},
  title        = {Proving Tight Security for Rabin-Williams Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_5},
  doi          = {10.1007/978-3-540-78967-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Bernstein08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinS08,
  author       = {Daniel J. Bernstein and
                  Peter Schwabe},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {New {AES} Software Speed Records},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_25},
  doi          = {10.1007/978-3-540-89754-5\_25},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinLP08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {Johannes Buchmann and
                  Jintai Ding},
  title        = {Attacking and Defending the McEliece Cryptosystem},
  booktitle    = {Post-Quantum Cryptography, Second International Workshop, PQCrypto
                  2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5299},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88403-3\_3},
  doi          = {10.1007/978-3-540-88403-3\_3},
  timestamp    = {Mon, 16 Nov 2020 15:55:50 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Bernstein08,
  author       = {Daniel J. Bernstein},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {The Salsa20 Family of Stream Ciphers},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_8},
  doi          = {10.1007/978-3-540-68351-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Bernstein08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBJLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Marc Joye and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Twisted Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBJLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange and
                  Christiane Peters},
  title        = {{ECM} using Edwards curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLF08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Reza Rezaeian Farashahi},
  title        = {Binary Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Attacking and defending the McEliece cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinS08,
  author       = {Daniel J. Bernstein and
                  Peter Schwabe},
  title        = {New {AES} software speed records},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCLY08,
  author       = {Daniel J. Bernstein and
                  Tien{-}Ren Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Bo{-}Yin Yang},
  title        = {{ECM} on Graphics Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/BernsteinLP07,
  author       = {Daniel J. Bernstein and
                  Hendrik W. Lenstra Jr. and
                  Jonathan Pila},
  title        = {Detecting perfect powers by factoring into coprimes},
  journal      = {Math. Comput.},
  volume       = {76},
  number       = {257},
  pages        = {385--388},
  year         = {2007},
  url          = {https://doi.org/10.1090/S0025-5718-06-01837-0},
  doi          = {10.1090/S0025-5718-06-01837-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/BernsteinLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/Bernstein07,
  author       = {Daniel J. Bernstein},
  title        = {Proving primality in essentially quartic random time},
  journal      = {Math. Comput.},
  volume       = {76},
  number       = {257},
  pages        = {389--403},
  year         = {2007},
  url          = {https://doi.org/10.1090/S0025-5718-06-01786-8},
  doi          = {10.1090/S0025-5718-06-01786-8},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/Bernstein07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/BernsteinS07,
  author       = {Daniel J. Bernstein and
                  Jonathan P. Sorenson},
  title        = {Modular exponentiation via the explicit Chinese remainder theorem},
  journal      = {Math. Comput.},
  volume       = {76},
  number       = {257},
  pages        = {443--454},
  year         = {2007},
  url          = {https://doi.org/10.1090/S0025-5718-06-01849-7},
  doi          = {10.1090/S0025-5718-06-01849-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/moc/BernsteinS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/BernsteinL07,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {Inverted Edwards Coordinates},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {20--27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_4},
  doi          = {10.1007/978-3-540-77224-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/BernsteinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/Bernstein07,
  author       = {Daniel J. Bernstein},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {The Tangent {FFT}},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_34},
  doi          = {10.1007/978-3-540-77224-8\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/Bernstein07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernsteinL07,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  editor       = {Kaoru Kurosawa},
  title        = {Faster Addition and Doubling on Elliptic Curves},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {29--50},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_3},
  doi          = {10.1007/978-3-540-76900-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernsteinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Bernstein07,
  author       = {Daniel J. Bernstein},
  editor       = {Peng Ning and
                  Vijay Atluri},
  title        = {Some thoughts on security after ten years of qmail 1.0},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture,
                  {CSAW} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314466.1314467},
  doi          = {10.1145/1314466.1314467},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Bernstein07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YangCBC07,
  author       = {Bo{-}Yin Yang and
                  Chia{-}Hsin Owen Chen and
                  Daniel J. Bernstein and
                  Jiun{-}Ming Chen},
  editor       = {Alex Biryukov},
  title        = {Analysis of {QUAD}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {290--308},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_19},
  doi          = {10.1007/978-3-540-74619-5\_19},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/YangCBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinBLP07,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_13},
  doi          = {10.1007/978-3-540-77026-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinBLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL07,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Faster addition and doubling on elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL07a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Inverted Edwards coordinates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBLP07,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Optimizing double-base elliptic-curve single-scalar multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL07b,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Analysis and optimization of elliptic-curve single-scalar multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Bernstein06,
  author       = {Daniel J. Bernstein},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Curve25519: New Diffie-Hellman Speed Records},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {207--228},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_14},
  doi          = {10.1007/11745853\_14},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Bernstein06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/Bernstein05,
  author       = {Daniel J. Bernstein},
  title        = {Factoring into coprimes in essentially linear time},
  journal      = {J. Algorithms},
  volume       = {54},
  number       = {1},
  pages        = {1--30},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jalgor.2004.04.009},
  doi          = {10.1016/J.JALGOR.2004.04.009},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/Bernstein05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Bernstein05,
  author       = {Daniel J. Bernstein},
  editor       = {Ronald Cramer},
  title        = {Stronger Security Bounds for Wegman-Carter-Shoup Authenticators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_10},
  doi          = {10.1007/11426639\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Bernstein05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Bernstein05,
  author       = {Daniel J. Bernstein},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {The Poly1305-AES Message-Authentication Code},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {32--49},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_3},
  doi          = {10.1007/11502760\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Bernstein05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/AtkinB04,
  author       = {A. O. L. Atkin and
                  Daniel J. Bernstein},
  title        = {Prime sieves using binary quadratic forms},
  journal      = {Math. Comput.},
  volume       = {73},
  number       = {246},
  pages        = {1023--1030},
  year         = {2004},
  url          = {https://doi.org/10.1090/S0025-5718-03-01501-1},
  doi          = {10.1090/S0025-5718-03-01501-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/AtkinB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/Bernstein01,
  author       = {Daniel J. Bernstein},
  title        = {Enumerating solutions to p(a) + q(b) = r(c) + s(d)},
  journal      = {Math. Comput.},
  volume       = {70},
  number       = {233},
  pages        = {389--394},
  year         = {2001},
  url          = {https://doi.org/10.1090/S0025-5718-00-01219-9},
  doi          = {10.1090/S0025-5718-00-01219-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/Bernstein01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bernstein99,
  author       = {Daniel J. Bernstein},
  title        = {How to Stretch Random Functions: The Security of Protected Counter
                  Sums},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {185--192},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900051},
  doi          = {10.1007/S001459900051},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Bernstein99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Bernstein98,
  author       = {Daniel J. Bernstein},
  title        = {Composing Power Series Over a Finite Ring in Essentially Linear Time},
  journal      = {J. Symb. Comput.},
  volume       = {26},
  number       = {3},
  pages        = {339--341},
  year         = {1998},
  url          = {https://doi.org/10.1006/jsco.1998.0216},
  doi          = {10.1006/JSCO.1998.0216},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Bernstein98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/Bernstein98,
  author       = {Daniel J. Bernstein},
  title        = {Detecting perfect powers in essentially linear time},
  journal      = {Math. Comput.},
  volume       = {67},
  number       = {223},
  pages        = {1253--1283},
  year         = {1998},
  url          = {https://doi.org/10.1090/S0025-5718-98-00952-1},
  doi          = {10.1090/S0025-5718-98-00952-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/Bernstein98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/Bernstein98,
  author       = {Daniel J. Bernstein},
  editor       = {Joe Buhler},
  title        = {Bounding Smooth Integers},
  booktitle    = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
                  Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1423},
  pages        = {128--130},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054856},
  doi          = {10.1007/BFB0054856},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/Bernstein98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/Bernstein96,
  author       = {Daniel J. Bernstein},
  editor       = {Henri Cohen},
  title        = {Fast Ideal Artithmetic via Lazy Localization},
  booktitle    = {Algorithmic Number Theory, Second International Symposium, ANTS-II,
                  Talence, France, May 18-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1122},
  pages        = {27--34},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61581-4\_38},
  doi          = {10.1007/3-540-61581-4\_38},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/Bernstein96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1143,
  author       = {Daniel J. Bernstein},
  title        = {The {Q} Method of Implementing {TELNET} Option Negotiation},
  journal      = {{RFC}},
  volume       = {1143},
  pages        = {1--10},
  year         = {1990},
  url          = {https://doi.org/10.17487/RFC1143},
  doi          = {10.17487/RFC1143},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1143.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}