default search action
BibTeX records: Daniel J. Bernstein
@article{DBLP:journals/cic/Bernstein24, author = {Daniel J. Bernstein}, title = {Understanding binary-Goppa decoding}, journal = {{IACR} Commun. Cryptol.}, volume = {1}, number = {1}, pages = {14}, year = {2024}, url = {https://doi.org/10.62056/angy4fe-3}, doi = {10.62056/ANGY4FE-3}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cic/Bernstein24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bernstein24, author = {Daniel J. Bernstein}, title = {Cryptographic Competitions}, journal = {J. Cryptol.}, volume = {37}, number = {1}, pages = {7}, year = {2024}, url = {https://doi.org/10.1007/s00145-023-09467-1}, doi = {10.1007/S00145-023-09467-1}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/Bernstein24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BernsteinC24, author = {Daniel J. Bernstein and Tung Chou}, editor = {Leonid Reyzin and Douglas Stebila}, title = {CryptAttackTester: high-assurance attack analysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14925}, pages = {141--182}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68391-6\_5}, doi = {10.1007/978-3-031-68391-6\_5}, timestamp = {Wed, 28 Aug 2024 21:54:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BernsteinC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein24, author = {Daniel J. Bernstein}, title = {Asymptotics for the standard block size in primal lattice attacks: second order, formally verified}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2024}, url = {https://eprint.iacr.org/2024/592}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCL24, author = {Daniel J. Bernstein and Jolijn Cottaar and Tanja Lange}, title = {Searching for differential addition chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2024}, url = {https://eprint.iacr.org/2024/1044}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBBCCKKPRT24, author = {Daniel J. Bernstein and Karthikeyan Bhargavan and Shivam Bhasin and Anupam Chattopadhyay and Tee Kiah Chia and Matthias J. Kannwischer and Franziskus Kiefer and Thales Paiva and Prasanna Ravi and Goutam Tamvada}, title = {KyberSlash: Exploiting secret-dependent division timings in Kyber implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2024}, url = {https://eprint.iacr.org/2024/1049}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBBCCKKPRT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL24, author = {Daniel J. Bernstein and Tanja Lange}, title = {Safe curves for elliptic-curve cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1265}, year = {2024}, url = {https://eprint.iacr.org/2024/1265}, timestamp = {Sun, 01 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinC23, author = {Daniel J. Bernstein and Tung Chou}, title = {CryptAttackTester: formalizing attack analyses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2023}, url = {https://eprint.iacr.org/2023/940}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein23, author = {Daniel J. Bernstein}, title = {Quantifying risks in cryptographic selection processes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1838}, year = {2023}, url = {https://eprint.iacr.org/2023/1838}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein23a, author = {Daniel J. Bernstein}, title = {Predicting performance for post-quantum encrypted-file systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1878}, year = {2023}, url = {https://eprint.iacr.org/2023/1878}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein23b, author = {Daniel J. Bernstein}, title = {Asymptotics of hybrid primal lattice attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1892}, year = {2023}, url = {https://eprint.iacr.org/2023/1892}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein23c, author = {Daniel J. Bernstein}, title = {Analyzing the complexity of reference post-quantum software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1924}, year = {2023}, url = {https://eprint.iacr.org/2023/1924}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Bernstein22, author = {Daniel J. Bernstein}, editor = {Takanori Isobe and Santanu Sarkar}, title = {A One-Time Single-bit Fault Leaks All Previous {NTRU-HRSS} Session Keys to a Chosen-Ciphertext Attack}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {617--643}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_27}, doi = {10.1007/978-3-031-22912-1\_27}, timestamp = {Mon, 09 Jan 2023 17:58:33 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/Bernstein22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BernsteinBCT22, author = {Daniel J. Bernstein and Billy Bob Brumley and Ming{-}Shing Chen and Nicola Tuveri}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {OpenSSLNTRU: Faster post-quantum {TLS} key exchange}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {845--862}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/bernstein}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/BernsteinBCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein22, author = {Daniel J. Bernstein}, title = {Understanding binary-Goppa decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2022}, url = {https://eprint.iacr.org/2022/473}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein22a, author = {Daniel J. Bernstein}, title = {Fast norm computation in smooth-degree Abelian number fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2022}, url = {https://eprint.iacr.org/2022/980}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein22b, author = {Daniel J. Bernstein}, title = {A one-time single-bit fault leaks all previous {NTRU-HRSS} session keys to a chosen-ciphertext attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1125}, year = {2022}, url = {https://eprint.iacr.org/2022/1125}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein22c, author = {Daniel J. Bernstein}, title = {Multi-ciphertext security degradation for lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1580}, year = {2022}, url = {https://eprint.iacr.org/2022/1580}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BanegasBHL21, author = {Gustavo Banegas and Daniel J. Bernstein and Iggy van Hoof and Tanja Lange}, title = {Concrete quantum cryptanalysis of binary elliptic curves}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {451--472}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.451-472}, doi = {10.46586/TCHES.V2021.I1.451-472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BanegasBHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BanegasBCCLMSS21, author = {Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sot{\'{a}}kov{\'{a}}}, title = {{CTIDH:} faster constant-time {CSIDH}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {351--387}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.351-387}, doi = {10.46586/TCHES.V2021.I4.351-387}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BanegasBCCLMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomaFKGB21, author = {Jan Philipp Thoma and Jakob Feldtkeller and Markus Krausz and Tim G{\"{u}}neysu and Daniel J. Bernstein}, editor = {Leyla Bilge and Tudor Dumitras}, title = {BasicBlocker: {ISA} Redesign to Make Spectre-Immune CPUs Faster}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {103--118}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471857}, doi = {10.1145/3471621.3471857}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ThomaFKGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08759, author = {Daniel J. Bernstein and Billy Bob Brumley and Ming{-}Shing Chen and Nicola Tuveri}, title = {OpenSSLNTRU: Faster post-quantum {TLS} key exchange}, journal = {CoRR}, volume = {abs/2106.08759}, year = {2021}, url = {https://arxiv.org/abs/2106.08759}, eprinttype = {arXiv}, eprint = {2106.08759}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasBCCLMSS21, author = {Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sot{\'{a}}kov{\'{a}}}, title = {{CTIDH:} faster constant-time {CSIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2021}, url = {https://eprint.iacr.org/2021/633}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BanegasBCCLMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBCT21, author = {Daniel J. Bernstein and Billy Bob Brumley and Ming{-}Shing Chen and Nicola Tuveri}, title = {OpenSSLNTRU: Faster post-quantum {TLS} key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2021}, url = {https://eprint.iacr.org/2021/826}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein21, author = {Daniel J. Bernstein}, title = {On the looseness of {FO} derandomization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2021}, url = {https://eprint.iacr.org/2021/912}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL21, author = {Daniel J. Bernstein and Tanja Lange}, title = {Non-randomness of S-unit lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1428}, year = {2021}, url = {https://eprint.iacr.org/2021/1428}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bernstein020, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Srdjan Capkun and Franziska Roesner}, title = {McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1731--1748}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/bernstein}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/Bernstein020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-10118, author = {Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith}, title = {Faster computation of isogenies of large prime degree}, journal = {CoRR}, volume = {abs/2003.10118}, year = {2020}, url = {https://arxiv.org/abs/2003.10118}, eprinttype = {arXiv}, eprint = {2003.10118}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-10118.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-15919, author = {Jan Philipp Thoma and Jakob Feldtkeller and Markus Krausz and Tim G{\"{u}}neysu and Daniel J. Bernstein}, title = {BasicBlocker: Redesigning ISAs to Eliminate Speculative-Execution Attacks}, journal = {CoRR}, volume = {abs/2007.15919}, year = {2020}, url = {https://arxiv.org/abs/2007.15919}, eprinttype = {arXiv}, eprint = {2007.15919}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-15919.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinFLS20, author = {Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith}, title = {Faster computation of isogenies of large prime degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2020}, url = {https://eprint.iacr.org/2020/341}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinFLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasBHL20, author = {Gustavo Banegas and Daniel J. Bernstein and Iggy van Hoof and Tanja Lange}, title = {Concrete quantum cryptanalysis of binary elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1296}, year = {2020}, url = {https://eprint.iacr.org/2020/1296}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BanegasBHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein20, author = {Daniel J. Bernstein}, title = {A discretization attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1370}, year = {2020}, url = {https://eprint.iacr.org/2020/1370}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinGT20, author = {Daniel J. Bernstein and Henri Gilbert and Meltem S{\"{o}}nmez Turan}, title = {Observations on {COMET}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1445}, year = {2020}, url = {https://eprint.iacr.org/2020/1445}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein20a, author = {Daniel J. Bernstein}, title = {Verified fast formulas for control bits for permutation networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1493}, year = {2020}, url = {https://eprint.iacr.org/2020/1493}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein20b, author = {Daniel J. Bernstein}, title = {Cryptographic competitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1608}, year = {2020}, url = {https://eprint.iacr.org/2020/1608}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BernsteinY19, author = {Daniel J. Bernstein and Bo{-}Yin Yang}, title = {Fast constant-time gcd computation and modular inversion}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {340--398}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.340-398}, doi = {10.13154/TCHES.V2019.I3.340-398}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BernsteinY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernsteinH19, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Decisional Second-Preimage Resistance: When Does {SPR} Imply PRE?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {33--62}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_2}, doi = {10.1007/978-3-030-34618-8\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernsteinH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BernsteinHKNRS19, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Stefan K{\"{o}}lbl and Ruben Niederhagen and Joost Rijneveld and Peter Schwabe}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {The SPHINCS\({}^{\mbox{+}}\) Signature Framework}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2129--2146}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363229}, doi = {10.1145/3319535.3363229}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BernsteinHKNRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bernstein0MP19, author = {Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Quantum Circuits for the {CSIDH:} Optimizing Quantum Evaluation of Isogenies}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {409--441}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_15}, doi = {10.1007/978-3-030-17656-3\_15}, timestamp = {Tue, 14 May 2019 13:55:31 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bernstein0MP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinY19, author = {Daniel J. Bernstein and Bo{-}Yin Yang}, title = {Fast constant-time gcd computation and modular inversion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2019}, url = {https://eprint.iacr.org/2019/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinH19, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing}, title = {Decisional second-preimage resistance: When does {SPR} imply PRE?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2019}, url = {https://eprint.iacr.org/2019/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein19, author = {Daniel J. Bernstein}, title = {Visualizing size-security tradeoffs for lattice-based encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2019}, url = {https://eprint.iacr.org/2019/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein19a, author = {Daniel J. Bernstein}, title = {Comparing proofs of security for lattice-based encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2019}, url = {https://eprint.iacr.org/2019/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHKNRS19, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Stefan K{\"{o}}lbl and Ruben Niederhagen and Joost Rijneveld and Peter Schwabe}, title = {The {SPHINCS+} Signature Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1086}, year = {2019}, url = {https://eprint.iacr.org/2019/1086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHKNRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein019, author = {Daniel J. Bernstein and Tanja Lange}, title = {McTiny: fast high-confidence post-quantum key erasure for tiny network servers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1395}, year = {2019}, url = {https://eprint.iacr.org/2019/1395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BernsteinB0P18, author = {Daniel J. Bernstein and Leon Groot Bruinderink and Tanja Lange and Lorenz Panny}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {{HILA5} Pindakaas: On the {CCA} Security of Lattice-Based Encryption with Error Correction}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {203--216}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_12}, doi = {10.1007/978-3-319-89339-6\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BernsteinB0P18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinY18, author = {Daniel J. Bernstein and Bo{-}Yin Yang}, editor = {Tanja Lange and Rainer Steinwandt}, title = {Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations}, booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10786}, pages = {487--506}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-79063-3\_23}, doi = {10.1007/978-3-319-79063-3\_23}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-04520, author = {Daniel J. Bernstein}, title = {Is the security of quantum cryptography guaranteed by the laws of physics?}, journal = {CoRR}, volume = {abs/1803.04520}, year = {2018}, url = {http://arxiv.org/abs/1803.04520}, eprinttype = {arXiv}, eprint = {1803.04520}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-04520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinP18, author = {Daniel J. Bernstein and Edoardo Persichetti}, title = {Towards {KEM} Unification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2018}, url = {https://eprint.iacr.org/2018/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLMP18, author = {Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny}, title = {Quantum circuits for the {CSIDH:} optimizing quantum evaluation of isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1059}, year = {2018}, url = {https://eprint.iacr.org/2018/1059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nature/Bernstein017, author = {Daniel J. Bernstein and Tanja Lange}, title = {Post-quantum cryptography}, journal = {Nat.}, volume = {549}, number = {7671}, pages = {188--194}, year = {2017}, url = {https://doi.org/10.1038/nature23461}, doi = {10.1038/NATURE23461}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nature/Bernstein017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, editor = {Wieland Fischer and Naofumi Homma}, title = {Gimli : {A} Cross-Platform Permutation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {299--320}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_15}, doi = {10.1007/978-3-319-66787-4\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, editor = {Wieland Fischer and Naofumi Homma}, title = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {555--576}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_27}, doi = {10.1007/978-3-319-66787-4\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BauchBVLV17, author = {Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Short Generators Without Quantum Computers: The Case of Multiquadratics}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {27--59}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_2}, doi = {10.1007/978-3-319-56620-7\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BauchBVLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinHLV17, author = {Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {Post-quantum {RSA}}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {311--329}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_18}, doi = {10.1007/978-3-319-59879-6\_18}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinBM17, author = {Daniel J. Bernstein and Jean{-}Fran{\c{c}}ois Biasse and Michele Mosca}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {A Low-Resource Quantum Factoring Algorithm}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {330--346}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_19}, doi = {10.1007/978-3-319-59879-6\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BernsteinC0V17, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Christine van Vredendaal}, editor = {Carlisle Adams and Jan Camenisch}, title = {{NTRU} Prime: Reducing Attack Surface at Low Cost}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {235--260}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_12}, doi = {10.1007/978-3-319-72565-9\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BernsteinC0V17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BanegasB17, author = {Gustavo Banegas and Daniel J. Bernstein}, editor = {Carlisle Adams and Jan Camenisch}, title = {Low-Communication Parallel Quantum Multi-Target Preimage Search}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {325--335}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_16}, doi = {10.1007/978-3-319-72565-9\_16}, timestamp = {Fri, 12 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BanegasB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCL17, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, title = {Double-base scalar multiplication revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2017}, url = {http://eprint.iacr.org/2017/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL17, author = {Daniel J. Bernstein and Tanja Lange}, title = {Montgomery curves and the Montgomery ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2017}, url = {http://eprint.iacr.org/2017/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL17a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Post-quantum cryptography - dealing with the fallout of physics success}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2017}, url = {http://eprint.iacr.org/2017/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHLV17, author = {Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta}, title = {Post-quantum {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2017}, url = {http://eprint.iacr.org/2017/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBM17, author = {Daniel J. Bernstein and Jean{-}Fran{\c{c}}ois Biasse and Michele Mosca}, title = {A low-resource quantum factoring algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2017}, url = {http://eprint.iacr.org/2017/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauchBVLV17, author = {Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal}, title = {Short generators without quantum computers: the case of multiquadratics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2017}, url = {http://eprint.iacr.org/2017/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauchBVLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, title = {Sliding right into disaster: Left-to-right sliding windows leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2017}, url = {http://eprint.iacr.org/2017/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinKLMMNS17, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, title = {Gimli: a cross-platform permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2017}, url = {http://eprint.iacr.org/2017/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasB17, author = {Gustavo Banegas and Daniel J. Bernstein}, title = {Low-communication parallel quantum multi-target preimage search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2017}, url = {http://eprint.iacr.org/2017/789}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanegasB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinY17, author = {Daniel J. Bernstein and Bo{-}Yin Yang}, title = {Asymptotically faster quantum algorithms to solve multivariate quadratic equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1206}, year = {2017}, url = {http://eprint.iacr.org/2017/1206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinB0P17, author = {Daniel J. Bernstein and Leon Groot Bruinderink and Tanja Lange and Lorenz Panny}, title = {{HILA5} Pindakaas: On the {CCA} security of lattice-based encryption with error correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1214}, year = {2017}, url = {http://eprint.iacr.org/2017/1214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinB0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BernsteinLN16, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Dual {EC:} {A} Standardized Back Door}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {256--281}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_17}, doi = {10.1007/978-3-662-49301-4\_17}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BernsteinLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareBT16, author = {Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Hash-Function Based PRFs: {AMAC} and Its Multi-User Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {566--595}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_22}, doi = {10.1007/978-3-662-49890-3\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBT16, author = {Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro}, title = {Hash-Function based PRFs: {AMAC} and its Multi-User Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2016}, url = {http://eprint.iacr.org/2016/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinELNPS016, author = {Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann}, title = {Faster discrete logarithms on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2016}, url = {http://eprint.iacr.org/2016/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinELNPS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCLV16, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Christine van Vredendaal}, title = {{NTRU} Prime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2016}, url = {http://eprint.iacr.org/2016/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BernsteinHLN15, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen}, editor = {Ernest Foo and Douglas Stebila}, title = {Bad Directions in Cryptographic Hash Functions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {488--508}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_28}, doi = {10.1007/978-3-319-19962-7\_28}, timestamp = {Tue, 07 May 2024 20:09:57 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BernsteinHLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BernsteinHHLNPS15, author = {Daniel J. Bernstein and Daira Hopwood and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox{-}O'Hearn}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {{SPHINCS:} Practical Stateless Hash-Based Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {368--397}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_15}, doi = {10.1007/978-3-662-46800-5\_15}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BernsteinHHLNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BernsteinCKL15, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Twisted Hessian Curves}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {269--294}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_15}, doi = {10.1007/978-3-319-22174-8\_15}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/BernsteinCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/BernsteinCCHLLN15, author = {Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H{\"{u}}lsing and Eran Lambooij and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal}, editor = {Liqun Chen and Shin'ichiro Matsuo}, title = {How to Manipulate Curve Standards: {A} White Paper for the Black Hat http: //bada55.cr.yp.to}, booktitle = {Security Standardisation Research - Second International Conference, {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9497}, pages = {109--139}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27152-1\_6}, doi = {10.1007/978-3-319-27152-1\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/BernsteinCCHLLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/AubelBN15, author = {Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Investigating {SRAM} PUFs in large CPUs and GPUs}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {228--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_14}, doi = {10.1007/978-3-319-24126-5\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/AubelBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AubelBN15, author = {Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen}, title = {Investigating {SRAM} PUFs in large CPUs and GPUs}, journal = {CoRR}, volume = {abs/1507.08514}, year = {2015}, url = {http://arxiv.org/abs/1507.08514}, eprinttype = {arXiv}, eprint = {1507.08514}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AubelBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHLN15, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen}, title = {Bad directions in cryptographic hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2015}, url = {http://eprint.iacr.org/2015/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLV15, author = {Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal}, title = {Tighter, faster, simpler side-channel security evaluations beyond computing power}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2015}, url = {http://eprint.iacr.org/2015/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCS15, author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe}, title = {McBits: fast constant-time code-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2015}, url = {http://eprint.iacr.org/2015/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinJLSY15, author = {Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, title = {EdDSA for more curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2015}, url = {http://eprint.iacr.org/2015/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinJLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AubelBN15, author = {Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen}, title = {Investigating {SRAM} PUFs in large CPUs and GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {760}, year = {2015}, url = {http://eprint.iacr.org/2015/760}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AubelBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLN15, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen}, title = {Dual {EC:} {A} Standardized Back Door}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2015}, url = {http://eprint.iacr.org/2015/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCKL15, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange}, title = {Twisted Hessian curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2015}, url = {http://eprint.iacr.org/2015/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein15, author = {Daniel J. Bernstein}, title = {Multi-user Schnorr security, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2015}, url = {http://eprint.iacr.org/2015/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/Bernstein014, author = {Daniel J. Bernstein and Tanja Lange}, title = {Hyper-and-elliptic-curve cryptography}, journal = {{LMS} J. Comput. Math.}, volume = {17}, number = {Theory}, pages = {181--202}, year = {2014}, url = {https://doi.org/10.1112/s1461157014000394}, doi = {10.1112/S1461157014000394}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmsjcm/Bernstein014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernsteinCLS14, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Kummer Strikes Back: New {DH} Speed Records}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {317--337}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_17}, doi = {10.1007/978-3-662-45611-8\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernsteinCLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinCL14, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, editor = {Lejla Batina and Matthew Robshaw}, title = {Curve41417: Karatsuba Revisited}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {316--334}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_18}, doi = {10.1007/978-3-662-44709-3\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BernsteinGJLSS14, author = {Daniel J. Bernstein and Bernard van Gastel and Wesley Janssen and Tanja Lange and Peter Schwabe and Sjaak Smetsers}, editor = {Diego F. Aranha and Alfred Menezes}, title = {TweetNaCl: {A} Crypto Library in 100 Tweets}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {64--83}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_4}, doi = {10.1007/978-3-319-16295-9\_4}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/BernsteinGJLSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BernsteinL14, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Antoine Joux and Amr M. Youssef}, title = {Batch {NFS}}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {38--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_3}, doi = {10.1007/978-3-319-13051-4\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BernsteinL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BernsteinC14, author = {Daniel J. Bernstein and Tung Chou}, editor = {Antoine Joux and Amr M. Youssef}, title = {Faster Binary-Field Multiplication and Faster Binary-Field MACs}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {92--111}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_6}, doi = {10.1007/978-3-319-13051-4\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BernsteinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CheckowayNE0LRBMSF14, author = {Stephen Checkoway and Ruben Niederhagen and Adam Everspaugh and Matthew Green and Tanja Lange and Thomas Ristenpart and Daniel J. Bernstein and Jake Maskiewicz and Hovav Shacham and Matthew Fredrikson}, editor = {Kevin Fu and Jaeyeon Jung}, title = {On the Practical Exploitability of Dual {EC} in {TLS} Implementations}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {319--335}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/checkoway}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/CheckowayNE0LRBMSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCLS14, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe}, title = {Kummer strikes back: new {DH} speed records}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2014}, url = {http://eprint.iacr.org/2014/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL14, author = {Daniel J. Bernstein and Tanja Lange}, title = {Hyper-and-elliptic-curve cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2014}, url = {http://eprint.iacr.org/2014/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCL14, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, title = {Curve41417: Karatsuba revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2014}, url = {http://eprint.iacr.org/2014/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCHLNV14, author = {Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal}, title = {How to manipulate curve standards: a white paper for the black hat}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2014}, url = {http://eprint.iacr.org/2014/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCHLNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinC14, author = {Daniel J. Bernstein and Tung Chou}, title = {Faster Binary-Field Multiplication and Faster Binary-Field MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2014}, url = {http://eprint.iacr.org/2014/729}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHHLNPSO14, author = {Daniel J. Bernstein and Daira Hopwood and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Peter Schwabe and Zooko Wilcox{-}O'Hearn}, title = {{SPHINCS:} practical stateless hash-based signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {795}, year = {2014}, url = {http://eprint.iacr.org/2014/795}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHHLNPSO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL14a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Batch {NFS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2014}, url = {http://eprint.iacr.org/2014/921}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/BernsteinBLP13, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {{ECM} using Edwards curves}, journal = {Math. Comput.}, volume = {82}, number = {282}, pages = {1139--1179}, year = {2013}, url = {https://doi.org/10.1090/S0025-5718-2012-02633-0}, doi = {10.1090/S0025-5718-2012-02633-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/BernsteinBLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernsteinL13, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Kazue Sako and Palash Sarkar}, title = {Non-uniform Cracks in the Concrete: The Power of Free Precomputation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {321--340}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_17}, doi = {10.1007/978-3-642-42045-0\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernsteinL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernsteinCCCHLS13, author = {Daniel J. Bernstein and Yun{-}An Chang and Chen{-}Mou Cheng and Li{-}Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren}, editor = {Kazue Sako and Palash Sarkar}, title = {Factoring {RSA} Keys from Certified Smart Cards: Coppersmith in the Wild}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {341--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_18}, doi = {10.1007/978-3-642-42045-0\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernsteinCCCHLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetulloZSBL13, author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {MinimaLT: minimal-latency networking through better security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {425--438}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516737}, doi = {10.1145/2508859.2516737}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetulloZSBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BernsteinHKL13, author = {Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Elligator: elliptic-curve points indistinguishable from uniform random strings}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {967--980}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516734}, doi = {10.1145/2508859.2516734}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BernsteinHKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinCS13, author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {McBits: Fast Constant-Time Code-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {250--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_15}, doi = {10.1007/978-3-642-40349-1\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinJLM13, author = {Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer}, editor = {Philippe Gaborit}, title = {Quantum Algorithms for the Subset-Sum Problem}, booktitle = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7932}, pages = {16--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38616-9\_2}, doi = {10.1007/978-3-642-38616-9\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinJLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlFardanBPPS13, author = {Nadhem J. AlFardan and Daniel J. Bernstein and Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Samuel T. King}, title = {On the Security of {RC4} in {TLS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {305--320}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/13/Bernstein013, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Gary L. Mullen and Daniel Panario}, title = {Addition formulas for elliptic curves}, booktitle = {Handbook of Finite Fields}, series = {Discrete mathematics and its applications}, pages = {440--446}, publisher = {{CRC} Press}, year = {2013}, timestamp = {Mon, 08 Jun 2020 15:38:06 +0200}, biburl = {https://dblp.org/rec/books/crc/13/Bernstein013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinJLM13, author = {Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer}, title = {Quantum algorithms for the subset-sum problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2013}, url = {http://eprint.iacr.org/2013/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinJLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetulloZSBL13, author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange}, title = {MinimaLT: Minimal-latency Networking Through Better Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2013}, url = {http://eprint.iacr.org/2013/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PetulloZSBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinKL13, author = {Daniel J. Bernstein and Anna Krasnova and Tanja Lange}, title = {Elligator: Elliptic-curve points indistinguishable from uniform random strings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2013}, url = {http://eprint.iacr.org/2013/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCCHLS13, author = {Daniel J. Bernstein and Yun{-}An Chang and Chen{-}Mou Cheng and Li{-}Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren}, title = {Factoring {RSA} keys from certified smart cards: Coppersmith in the wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2013}, url = {http://eprint.iacr.org/2013/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCCHLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BernsteinDLSY12, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, title = {High-speed high-security signatures}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {77--89}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0027-1}, doi = {10.1007/S13389-012-0027-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BernsteinDLSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinS12, author = {Daniel J. Bernstein and Peter Schwabe}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {{NEON} Crypto}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {320--339}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_19}, doi = {10.1007/978-3-642-33027-8\_19}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinL12, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Computing Small Discrete Logarithms Faster}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {317--338}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_19}, doi = {10.1007/978-3-642-34931-7\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinDLO12, author = {Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan{-}Jaap Oosterwijk}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Faster Batch Forgery Identification}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {454--473}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_26}, doi = {10.1007/978-3-642-34931-7\_26}, timestamp = {Mon, 25 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinDLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AumassonB12, author = {Jean{-}Philippe Aumasson and Daniel J. Bernstein}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {SipHash: {A} Fast Short-Input {PRF}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {489--508}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_28}, doi = {10.1007/978-3-642-34931-7\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AumassonB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BernsteinLS12, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, editor = {Alejandro Hevia and Gregory Neven}, title = {The Security Impact of a New Cryptographic Library}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {159--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_9}, doi = {10.1007/978-3-642-33481-8\_9}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/BernsteinLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BernsteinL12, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Jaap{-}Henk Hoepman and Ingrid Verbauwhede}, title = {Never Trust a Bunny}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {137--148}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36140-1\_10}, doi = {10.1007/978-3-642-36140-1\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/BernsteinL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCLNSY12, author = {Daniel J. Bernstein and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo{-}Yin Yang}, title = {{ECC2K-130} on {NVIDIA} GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2012}, url = {http://eprint.iacr.org/2012/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12, author = {Daniel J. Bernstein and Tanja Lange}, title = {The new {SHA-3} software shootout}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2012}, url = {http://eprint.iacr.org/2012/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCLNSY12a, author = {Daniel J. Bernstein and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo{-}Yin Yang}, title = {Usable assembly language for GPUs: a success story}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2012}, url = {http://eprint.iacr.org/2012/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Two grumpy giants and a baby}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2012}, url = {http://eprint.iacr.org/2012/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12b, author = {Daniel J. Bernstein and Tanja Lange}, title = {Non-uniform cracks in the concrete: the power of free precomputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2012}, url = {http://eprint.iacr.org/2012/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonB12, author = {Jean{-}Philippe Aumasson and Daniel J. Bernstein}, title = {SipHash: a fast short-input {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2012}, url = {http://eprint.iacr.org/2012/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12c, author = {Daniel J. Bernstein and Tanja Lange}, title = {Never trust a bunny}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2012}, url = {http://eprint.iacr.org/2012/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12d, author = {Daniel J. Bernstein and Tanja Lange}, title = {Computing small discrete logarithms faster}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2012}, url = {http://eprint.iacr.org/2012/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinDLO12, author = {Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan{-}Jaap Oosterwijk}, title = {Faster batch forgery identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2012}, url = {http://eprint.iacr.org/2012/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinDLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BernsteinLPS11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Really Fast Syndrome-Based Hashing}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {134--152}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_9}, doi = {10.1007/978-3-642-21969-6\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BernsteinLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinDLSY11, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {High-Speed High-Security Signatures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {124--142}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_9}, doi = {10.1007/978-3-642-23951-9\_9}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinDLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/Bernstein11, author = {Daniel J. Bernstein}, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {List Decoding for Binary Goppa Codes}, booktitle = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, pages = {62--80}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7\_4}, doi = {10.1007/978-3-642-20901-7\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/codcry/Bernstein11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/BernsteinLPS11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {Faster 2-Regular Information-Set Decoding}, booktitle = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, pages = {81--98}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7\_5}, doi = {10.1007/978-3-642-20901-7\_5}, timestamp = {Mon, 25 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codcry/BernsteinLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BernsteinLP11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, editor = {Phillip Rogaway}, title = {Smaller Decoding Exponents: Ball-Collision Decoding}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {743--760}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_42}, doi = {10.1007/978-3-642-22792-9\_42}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BernsteinLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernsteinLS11, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On the Correct Use of the Negation Map in the Pollard rho Method}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {128--146}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_8}, doi = {10.1007/978-3-642-19379-8\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernsteinLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/Bernstein11, author = {Daniel J. Bernstein}, editor = {Bo{-}Yin Yang}, title = {Simplified High-Speed High-Distance List Decoding for Alternant Codes}, booktitle = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7071}, pages = {200--216}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25405-5\_13}, doi = {10.1007/978-3-642-25405-5\_13}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/Bernstein11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinLP11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, editor = {Bo{-}Yin Yang}, title = {Wild McEliece Incognito}, booktitle = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7071}, pages = {244--254}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25405-5\_16}, doi = {10.1007/978-3-642-25405-5\_16}, timestamp = {Mon, 25 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2011, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6}, doi = {10.1007/978-3-642-25578-6}, isbn = {978-3-642-25577-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bernstein11, author = {Daniel J. Bernstein}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Factorization Circuits}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {444--445}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_447}, doi = {10.1007/978-1-4419-5906-5\_447}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bernstein11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bernstein11a, author = {Daniel J. Bernstein}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Post-Quantum Cryptography}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {949--950}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_386}, doi = {10.1007/978-1-4419-5906-5\_386}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bernstein11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLS11, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {On the correct use of the negation map in the Pollard rho method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2011}, url = {http://eprint.iacr.org/2011/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLPS11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Really fast syndrome-based hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2011}, url = {http://eprint.iacr.org/2011/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLPS11a, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Faster 2-regular information-set decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2011}, url = {http://eprint.iacr.org/2011/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLPS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinDLSY11, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, title = {High-speed high-security signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2011}, url = {http://eprint.iacr.org/2011/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinDLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Wild McEliece Incognito}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2011}, url = {http://eprint.iacr.org/2011/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLS11a, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {The security impact of a new cryptographic library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2011}, url = {http://eprint.iacr.org/2011/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinCCLNSY10, author = {Daniel J. Bernstein and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo{-}Yin Yang}, editor = {Guang Gong and Kishan Chand Gupta}, title = {{ECC2K-130} on {NVIDIA} GPUs}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {328--346}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_23}, doi = {10.1007/978-3-642-17401-8\_23}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinCCLNSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BernsteinBL10, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Starfish on Strike}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {61--80}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_4}, doi = {10.1007/978-3-642-14712-8\_4}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/BernsteinBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/Bernstein10, author = {Daniel J. Bernstein}, editor = {Nicolas Sendrier}, title = {Grover vs. McEliece}, booktitle = {Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6061}, pages = {73--80}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12929-2\_6}, doi = {10.1007/978-3-642-12929-2\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/Bernstein10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BernsteinLP10, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Wild McEliece}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {143--158}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_10}, doi = {10.1007/978-3-642-19574-7\_10}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BernsteinLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/BernsteinL10, author = {Daniel J. Bernstein and Tanja Lange}, editor = {M. Anwar Hasan and Tor Helleseth}, title = {Type-II Optimal Polynomial Bases}, booktitle = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI} 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6087}, pages = {41--61}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13797-6\_4}, doi = {10.1007/978-3-642-13797-6\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/BernsteinL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2010, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9}, doi = {10.1007/978-3-642-12678-9}, isbn = {978-3-642-12677-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL10, author = {Daniel J. Bernstein and Tanja Lange}, title = {Type-II Optimal Polynomial Bases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2010}, url = {http://eprint.iacr.org/2010/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBL10, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange}, title = {Starfish on Strike}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2010}, url = {http://eprint.iacr.org/2010/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP10, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Wild McEliece}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2010}, url = {http://eprint.iacr.org/2010/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP10a, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Smaller decoding exponents: ball-collision decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2010}, url = {http://eprint.iacr.org/2010/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL10a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2010}, url = {http://eprint.iacr.org/2010/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bernstein09, author = {Daniel J. Bernstein}, editor = {Shai Halevi}, title = {Batch Binary Edwards}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {317--336}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_19}, doi = {10.1007/978-3-642-03356-8\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bernstein09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BernsteinCCLY09, author = {Daniel J. Bernstein and Tien{-}Ren Chen and Chen{-}Mou Cheng and Tanja Lange and Bo{-}Yin Yang}, editor = {Antoine Joux}, title = {{ECM} on Graphics Cards}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {483--501}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_28}, doi = {10.1007/978-3-642-01001-9\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BernsteinCCLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinLNPS09, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {FSBday}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {18--38}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_2}, doi = {10.1007/978-3-642-10628-6\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinLNPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BangerterBBDPPS09, author = {Endre Bangerter and Manuel Barbosa and Daniel J. Bernstein and Ivan Damg{\aa}rd and Daniel Page and Jakob Illeborg Pagter and Ahmad{-}Reza Sadeghi and Sampo Sovio}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Using Compilers to Enhance Cryptographic Product Development}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {291--301}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_29}, doi = {10.1007/978-3-8348-9363-5\_29}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/BangerterBBDPPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/Bernstein09, author = {Daniel J. Bernstein}, editor = {Dan Boneh and Alexander Sotirov}, title = {Breaking {DNSSEC}}, booktitle = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal, Canada, August 10, 2009}, publisher = {{USENIX} Association}, year = {2009}, timestamp = {Wed, 24 May 2023 10:25:04 +0200}, biburl = {https://dblp.org/rec/conf/woot/Bernstein09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLNPS09, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe}, title = {Implementing Wagner's generalized birthday attack against the {SHA-3} round-1 candidate {FSB}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2009}, url = {http://eprint.iacr.org/2009/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLNPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09, author = {Daniel V. Bailey and Brian Baldwin and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Gauthier Van Damme and Giacomo de Meulenaer and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel}, title = {The Certicom Challenges {ECC2-X}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2009}, url = {http://eprint.iacr.org/2009/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09, author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis J. Dominguez Perez and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo{-}Yin Yang}, title = {Breaking {ECC2K-130}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2009}, url = {http://eprint.iacr.org/2009/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL09, author = {Daniel J. Bernstein and Tanja Lange}, title = {A complete set of addition laws for incomplete Edwards curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2009}, url = {http://eprint.iacr.org/2009/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BernsteinBJLP08, author = {Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters}, editor = {Serge Vaudenay}, title = {Twisted Edwards Curves}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {389--405}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_26}, doi = {10.1007/978-3-540-68164-9\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BernsteinBJLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinLF08, author = {Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Binary Edwards Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {244--265}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_16}, doi = {10.1007/978-3-540-85053-3\_16}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bernstein08, author = {Daniel J. Bernstein}, editor = {Nigel P. Smart}, title = {Proving Tight Security for Rabin-Williams Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {70--87}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_5}, doi = {10.1007/978-3-540-78967-3\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bernstein08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinS08, author = {Daniel J. Bernstein and Peter Schwabe}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {New {AES} Software Speed Records}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {322--336}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_25}, doi = {10.1007/978-3-540-89754-5\_25}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinLP08, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, editor = {Johannes Buchmann and Jintai Ding}, title = {Attacking and Defending the McEliece Cryptosystem}, booktitle = {Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5299}, pages = {31--46}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88403-3\_3}, doi = {10.1007/978-3-540-88403-3\_3}, timestamp = {Mon, 16 Nov 2020 15:55:50 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Bernstein08, author = {Daniel J. Bernstein}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {The Salsa20 Family of Stream Ciphers}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {84--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_8}, doi = {10.1007/978-3-540-68351-3\_8}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/series/lncs/Bernstein08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBJLP08, author = {Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters}, title = {Twisted Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2008}, url = {http://eprint.iacr.org/2008/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBJLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBLP08, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {{ECM} using Edwards curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2008}, url = {http://eprint.iacr.org/2008/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLF08, author = {Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi}, title = {Binary Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2008}, url = {http://eprint.iacr.org/2008/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP08, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Attacking and defending the McEliece cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2008}, url = {http://eprint.iacr.org/2008/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinS08, author = {Daniel J. Bernstein and Peter Schwabe}, title = {New {AES} software speed records}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2008}, url = {http://eprint.iacr.org/2008/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCLY08, author = {Daniel J. Bernstein and Tien{-}Ren Chen and Chen{-}Mou Cheng and Tanja Lange and Bo{-}Yin Yang}, title = {{ECM} on Graphics Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2008}, url = {http://eprint.iacr.org/2008/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/BernsteinLP07, author = {Daniel J. Bernstein and Hendrik W. Lenstra Jr. and Jonathan Pila}, title = {Detecting perfect powers by factoring into coprimes}, journal = {Math. Comput.}, volume = {76}, number = {257}, pages = {385--388}, year = {2007}, url = {https://doi.org/10.1090/S0025-5718-06-01837-0}, doi = {10.1090/S0025-5718-06-01837-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/BernsteinLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/Bernstein07, author = {Daniel J. Bernstein}, title = {Proving primality in essentially quartic random time}, journal = {Math. Comput.}, volume = {76}, number = {257}, pages = {389--403}, year = {2007}, url = {https://doi.org/10.1090/S0025-5718-06-01786-8}, doi = {10.1090/S0025-5718-06-01786-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/Bernstein07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/BernsteinS07, author = {Daniel J. Bernstein and Jonathan P. Sorenson}, title = {Modular exponentiation via the explicit Chinese remainder theorem}, journal = {Math. Comput.}, volume = {76}, number = {257}, pages = {443--454}, year = {2007}, url = {https://doi.org/10.1090/S0025-5718-06-01849-7}, doi = {10.1090/S0025-5718-06-01849-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/moc/BernsteinS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/BernsteinL07, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Serdar Boztas and Hsiao{-}feng Lu}, title = {Inverted Edwards Coordinates}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4851}, pages = {20--27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77224-8\_4}, doi = {10.1007/978-3-540-77224-8\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/BernsteinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/Bernstein07, author = {Daniel J. Bernstein}, editor = {Serdar Boztas and Hsiao{-}feng Lu}, title = {The Tangent {FFT}}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4851}, pages = {291--300}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77224-8\_34}, doi = {10.1007/978-3-540-77224-8\_34}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/Bernstein07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernsteinL07, author = {Daniel J. Bernstein and Tanja Lange}, editor = {Kaoru Kurosawa}, title = {Faster Addition and Doubling on Elliptic Curves}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {29--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_3}, doi = {10.1007/978-3-540-76900-2\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernsteinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bernstein07, author = {Daniel J. Bernstein}, editor = {Peng Ning and Vijay Atluri}, title = {Some thoughts on security after ten years of qmail 1.0}, booktitle = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture, {CSAW} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {1--10}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314466.1314467}, doi = {10.1145/1314466.1314467}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bernstein07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YangCBC07, author = {Bo{-}Yin Yang and Chia{-}Hsin Owen Chen and Daniel J. Bernstein and Jiun{-}Ming Chen}, editor = {Alex Biryukov}, title = {Analysis of {QUAD}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {290--308}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_19}, doi = {10.1007/978-3-540-74619-5\_19}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/YangCBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinBLP07, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {167--182}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_13}, doi = {10.1007/978-3-540-77026-8\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinBLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL07, author = {Daniel J. Bernstein and Tanja Lange}, title = {Faster addition and doubling on elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2007}, url = {http://eprint.iacr.org/2007/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL07a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Inverted Edwards coordinates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2007}, url = {http://eprint.iacr.org/2007/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBLP07, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {Optimizing double-base elliptic-curve single-scalar multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2007}, url = {http://eprint.iacr.org/2007/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL07b, author = {Daniel J. Bernstein and Tanja Lange}, title = {Analysis and optimization of elliptic-curve single-scalar multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2007}, url = {http://eprint.iacr.org/2007/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Bernstein06, author = {Daniel J. Bernstein}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Curve25519: New Diffie-Hellman Speed Records}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {207--228}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_14}, doi = {10.1007/11745853\_14}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Bernstein06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/Bernstein05, author = {Daniel J. Bernstein}, title = {Factoring into coprimes in essentially linear time}, journal = {J. Algorithms}, volume = {54}, number = {1}, pages = {1--30}, year = {2005}, url = {https://doi.org/10.1016/j.jalgor.2004.04.009}, doi = {10.1016/J.JALGOR.2004.04.009}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/Bernstein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bernstein05, author = {Daniel J. Bernstein}, editor = {Ronald Cramer}, title = {Stronger Security Bounds for Wegman-Carter-Shoup Authenticators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {164--180}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_10}, doi = {10.1007/11426639\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bernstein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Bernstein05, author = {Daniel J. Bernstein}, editor = {Henri Gilbert and Helena Handschuh}, title = {The Poly1305-AES Message-Authentication Code}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {32--49}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_3}, doi = {10.1007/11502760\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Bernstein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/AtkinB04, author = {A. O. L. Atkin and Daniel J. Bernstein}, title = {Prime sieves using binary quadratic forms}, journal = {Math. Comput.}, volume = {73}, number = {246}, pages = {1023--1030}, year = {2004}, url = {https://doi.org/10.1090/S0025-5718-03-01501-1}, doi = {10.1090/S0025-5718-03-01501-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/AtkinB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/Bernstein01, author = {Daniel J. Bernstein}, title = {Enumerating solutions to p(a) + q(b) = r(c) + s(d)}, journal = {Math. Comput.}, volume = {70}, number = {233}, pages = {389--394}, year = {2001}, url = {https://doi.org/10.1090/S0025-5718-00-01219-9}, doi = {10.1090/S0025-5718-00-01219-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/Bernstein01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bernstein99, author = {Daniel J. Bernstein}, title = {How to Stretch Random Functions: The Security of Protected Counter Sums}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {185--192}, year = {1999}, url = {https://doi.org/10.1007/s001459900051}, doi = {10.1007/S001459900051}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Bernstein99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Bernstein98, author = {Daniel J. Bernstein}, title = {Composing Power Series Over a Finite Ring in Essentially Linear Time}, journal = {J. Symb. Comput.}, volume = {26}, number = {3}, pages = {339--341}, year = {1998}, url = {https://doi.org/10.1006/jsco.1998.0216}, doi = {10.1006/JSCO.1998.0216}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Bernstein98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/Bernstein98, author = {Daniel J. Bernstein}, title = {Detecting perfect powers in essentially linear time}, journal = {Math. Comput.}, volume = {67}, number = {223}, pages = {1253--1283}, year = {1998}, url = {https://doi.org/10.1090/S0025-5718-98-00952-1}, doi = {10.1090/S0025-5718-98-00952-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/Bernstein98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/Bernstein98, author = {Daniel J. Bernstein}, editor = {Joe Buhler}, title = {Bounding Smooth Integers}, booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {128--130}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054856}, doi = {10.1007/BFB0054856}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/Bernstein98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/Bernstein96, author = {Daniel J. Bernstein}, editor = {Henri Cohen}, title = {Fast Ideal Artithmetic via Lazy Localization}, booktitle = {Algorithmic Number Theory, Second International Symposium, ANTS-II, Talence, France, May 18-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1122}, pages = {27--34}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61581-4\_38}, doi = {10.1007/3-540-61581-4\_38}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/Bernstein96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1143, author = {Daniel J. Bernstein}, title = {The {Q} Method of Implementing {TELNET} Option Negotiation}, journal = {{RFC}}, volume = {1143}, pages = {1--10}, year = {1990}, url = {https://doi.org/10.17487/RFC1143}, doi = {10.17487/RFC1143}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1143.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.