Introduction to post-quantum cryptography DJ Bernstein Post-quantum cryptography, 1-14, 2009 | 1082 | 2009 |
Cache-timing attacks on AES DJ Bernstein | 844 | 2005 |
Curve25519: new Diffie-Hellman speed records DJ Bernstein International Workshop on Public Key Cryptography, 207-228, 2006 | 843 | 2006 |
Faster addition and doubling on elliptic curves DJ Bernstein, T Lange international conference on the theory and application of cryptology and …, 2007 | 539 | 2007 |
High-speed high-security signatures DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang Journal of cryptographic engineering 2 (2), 77-89, 2012 | 527 | 2012 |
Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters International Conference on Cryptology in Africa, 389-405, 2008 | 442 | 2008 |
The Salsa20 family of stream ciphers DJ Bernstein New stream cipher designs, 84-97, 2008 | 420 | 2008 |
Attacking and defending the McEliece cryptosystem DJ Bernstein, T Lange, C Peters International Workshop on Post-Quantum Cryptography, 31-46, 2008 | 387 | 2008 |
ChaCha, a variant of Salsa20 DJ Bernstein Workshop record of SASC 8, 3-5, 2008 | 343 | 2008 |
The Poly1305-AES message-authentication code DJ Bernstein International Workshop on Fast Software Encryption, 32-49, 2005 | 319 | 2005 |
SipHash: a fast short-input PRF JP Aumasson, DJ Bernstein International Conference on Cryptology in India, 489-508, 2012 | 312 | 2012 |
On the Security of RC4 in {TLS} N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt 22nd {USENIX} Security Symposium ({USENIX} Security 13), 305-320, 2013 | 272 | 2013 |
SPHINCS: practical stateless hash-based signatures DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ... Annual international conference on the theory and applications of …, 2015 | 264 | 2015 |
eBACS: ECRYPT benchmarking of cryptographic systems DJ Bernstein, T Lange | 249 | 2013 |
The security impact of a new cryptographic library DJ Bernstein, T Lange, P Schwabe International Conference on Cryptology and Information Security in Latin …, 2012 | 241 | 2012 |
Cache-timing attacks on AES, 2005 DJ Bernstein | 229 | 2005 |
Explicit-formulas database DJ Bernstein http://www. hyperelliptic. org/EFD, 2007 | 212 | 2007 |
Post-quantum cryptography DJ Bernstein Encyclopedia of Cryptography and Security, 949-950, 2011 | 190* | 2011 |
Smaller decoding exponents: ball-collision decoding DJ Bernstein, T Lange, C Peters Annual Cryptology Conference, 743-760, 2011 | 177 | 2011 |
NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal International Conference on Selected Areas in Cryptography, 235-260, 2017 | 172* | 2017 |