completed | A complete set of addition laws for incomplete Edwards curves |
categories | A discretization attack |
zeroseek | A fast journaling filesystem |
nfsi | A general number field sieve implementation |
grovernfs | A low-resource quantum factoring algorithm |
231 | A non-iterative 2-adic statement of the 3N+1 conjecture |
ntrw | A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack |
sigs | A secure public-key signature system with extremely fast verification |
easycbc | A short proof of the unpredictability of cipher block chaining |
unipat | A simple universal pattern-matching automaton |
efd | Analysis and optimization of elliptic-curve single-scalar multiplication |
antiquad | Analysis of QUAD |
pqcomplexity | Analyzing the complexity of reference post-quantum software: the case of lattice-based KEMs |
psi | Arbitrarily tight bounds on the distribution of smooth integers |
groverxl | Asymptotically faster quantum algorithms to solve multivariate quadratic equations |
latticeasymp | Asymptotics for the standard block size in primal lattice attacks: second order, formally verified |
hybrid | Asymptotics of hybrid primal lattice attacks |
mceliece | Attacking and defending the McEliece cryptosystem |
obviouscation | Bad directions in cryptographic hash functions |
basicblocker | BasicBlocker: ISA redesign to make Spectre-immune CPUs faster |
bbe | Batch binary Edwards |
batchnfs | Batch NFS |
genbday | Better price-performance ratios for generalized birthday attacks |
edwards2 | Binary Edwards curves |
psi-abs | Bounding smooth integers |
ecc2k130 | Breaking ECC2K-130 |
cachetiming | Cache-timing attacks on AES |
calculus | Calculus for mathematicians |
curvezero | Can we avoid tests for zero in fast elliptic-curve arithmetic? |
chacha | ChaCha, a variant of Salsa20 |
cipherdag | Cipher DAGs |
nfscircuit | Circuits for integer factorization: a proposal |
rings | Commutative rings |
latticeproofs | Comparing proofs of security for lattice-based encryption |
stream256 | Comparison of 256-bit stream ciphers at the beginning of 2006 |
compose | Composing power series over a finite ring in essentially linear time |
logfloor | Computing logarithm floors in essentially linear time |
logagm | Computing logarithm intervals with the arithmetic-geometric-mean iteration |
cuberoot | Computing small discrete logarithms faster |
binecc | Concrete quantum cryptanalysis of binary elliptic curves |
nfspoly | Controlling three coefficients in number-field-sieve polynomials |
collisioncost | Cost analysis of hash collisions: Will quantum computers make SHARCS obsolete? |
cat | CryptAttackTester: high-assurance attack analysis |
competitions | Cryptographic competitions |
naclcrypto | Cryptography in NaCl |
ctidh | CTIDH: faster constant-time CSIDH |
curve25519 | Curve25519: new Diffie-Hellman speed records |
curve41417 | Curve41417: Karatsuba revisited |
aecycles | Cycle counts for authenticated encryption |
decompress | Data decompression |
dspr | Decisional second-preimage resistance: When does SPR imply PRE? |
powers2 | Detecting perfect powers by factoring into coprimes |
powers | Detecting perfect powers in essentially linear time |
diffchain | Differential addition chains |
prime2004 | Distinguishing prime numbers from composite numbers: the state of the art in 2004 |
divergence | Divergence bounds for random fixed-weight vectors obtained by sorting |
zkcrypt | Does ZK-Crypt version 1 flunk a repetition test? |
dagger | Double-base scalar multiplication revisited |
focus | Doubly focused enumeration of locally square polynomial values |
dual-ec | Dual EC: a standardized back door |
gpuecc2k | ECC2K-130 on NVIDIA GPUs |
gpuecm | ECM on graphics cards |
eecm | ECM using Edwards curves |
eddsa | EdDSA for more curves |
elligator | Elligator: Elliptic-curve points indistinguishable from uniform random strings |
epsi | Enumerating and counting smooth integers |
sortedsums | Enumerating solutions to p(a)+q(b)=r(c)+s(d) |
smoothdep | Estimating the dependence time for smooth integers |
decoco | Explicit bounds for generic decoding algorithms for code-based cryptography |
xsalsa | Extending the Salsa20 nonce |
dcba | Factoring into coprimes in essentially linear time |
smartfacts | Factoring RSA keys from certified smart cards: Coppersmith in the wild |
nistecc | Failures in NIST's ECC standards |
safegcd | Fast constant-time gcd computation and modular inversion |
fiall | Fast ideal arithmetic via lazy localization |
multapps | Fast multiplication and its applications |
abeliannorms | Fast norm computation in smooth-degree Abelian number fields |
nistp224 | Fast point multiplication on the NIST P-224 elliptic curve |
2reg | Faster 2-regular information-set decoding |
newelliptic | Faster addition and doubling on elliptic curves |
nonsquare | Faster algorithms to find non-squares modulo worst-case integers |
badbatch | Faster batch forgery identification |
auth256 | Faster binary-field multiplication and faster binary-field MACs |
velusqrt | Faster computation of isogenies of large prime degree |
sect113r2 | Faster elliptic-curve discrete logarithms on FPGAs |
dcba2 | Faster factorization into coprimes |
zmult | Faster multiplication of integers |
sqroot | Faster square roots in annoying finite fields |
hash127 | Floating-point arithmetic and message authentication |
fsbday | FSBday: implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB |
gigo | Further analysis of the impact of distancing upon the COVID-19 pandemic |
gge | Generalized Gaussian elimination |
gimli | Gimli: a cross-platform permutation |
grovercode | Grover vs. McEliece |
hash127-abs | Guaranteed message authentication faster than MD5 (abstract) |
amac | Hash-function based PRFs: AMAC and its multi-user security |
fastgraeffe | High-precision roots of high-degree polynomials |
ed25519 | High-speed high-security signatures |
hila5 | HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction |
sf | How to find small factors of integers |
smoothparts | How to find smooth parts of integers |
bada55 | How to manipulate curve standards: a white paper for the black hat |
stretch | How to stretch random functions: the security of protected counter sums |
hyperand | Hyper-and-elliptic-curve cryptography |
inverted | Inverted Edwards coordinates |
cpupuf | Investigating SRAM PUFs in large CPUs and GPUs |
holographic | Is the security of quantum cryptography guaranteed by the laws of physics? |
fastgcd | Kronecker matrices and polynomial GCDs |
kummer | Kummer strikes back: new DH speed records |
kyberslash | KyberSlash: Exploiting secret-dependent division timings in Kyber implementations |
goppalist | List decoding for binary Goppa codes |
groverrho | Low-communication parallel quantum multi-target preimage search |
mimd | Matrix inversion made difficult |
mcbits | McBits: fast constant-time code-based cryptography |
mctiny | McTiny: fast high-confidence post-quantum key erasure for tiny network servers |
minimalt | MinimaLT: Minimal-latency networking through better security |
meecrt | Modular exponentiation via the explicit Chinese remainder theorem |
montladder | Montgomery curves and the Montgomery ladder |
lprrr | Multi-ciphertext security degradation for lattices |
multischnorr | Multi-user Schnorr security, revisited |
mmecrt | Multidigit modular multiplication with the Explicit Chinese Remainder Theorem |
m3 | Multidigit multiplication for mathematicians |
neoncrypto | NEON crypto |
bunny | Never trust a bunny |
aesspeed | New AES software speed records |
westinghouse | New fast algorithms for pi and e |
spherical | Non-randomness of S-unit lattices |
nonuniform | Non-uniform cracks in the concrete: the power of free precomputation |
ntruprime | NTRU Prime: reducing attack surface at low cost |
comet | Observations on COMET |
negation | On the correct use of the negation map in the Pollard rho method |
footloose | On the looseness of FO derandomization |
dualectls | On the practical exploitability of Dual EC in TLS implementations |
rc4biases | On the security of RC4 in TLS and WPA |
opensslntru | OpenSSLNTRU: Faster post-quantum TLS key exchange |
sha3opt | Optimization failures in SHA-3 software |
doublebase | Optimizing double-base elliptic-curve single-scalar multiplication |
linearmod2 | Optimizing linear maps modulo 2 |
pwccp | Papers with computer-checked proofs |
pippenger | Pippenger's exponentiation algorithm |
pema | Polynomial evaluation and message authentication |
fallout | Post-quantum cryptography—dealing with the fallout of physics success |
pqrsa | Post-quantum RSA |
hblcs | Predicting a linear congruential sequence from its high bits |
pppqefs | Predicting performance for post-quantum encrypted-file systems |
primesieves | Prime sieves using binary quadratic forms |
forgery | Protecting communications against forgery |
aks | Proving primality after Agrawal-Kayal-Saxena |
quartic | Proving primality in essentially quartic random time |
rwtight | Proving tight security for Rabin-Williams signatures |
qrcsp | Quantifying risks in cryptographic selection processes |
qsubsetsum | Quantum algorithms for the subset-sum problem |
quantumsha3 | Quantum attacks against Blue Midnight Wish, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Shabal, SHAvite-3, SIMD, and Skein |
qisog | Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies |
rfsb | Really fast syndrome-based hashing |
smallheight | Reducing lattice bases to find small-height values of univariate polynomials |
fastnewton | Removing redundancy in high-precision Newton iteration |
rwsota | RSA signatures and Rabin-Williams signatures: the state of the art |
safecurves | Safe curves for elliptic-curve cryptography |
huptrie | Saving space and time in hash tries |
scaledmod | Scaled remainder trees |
dacmitm | Searching for differential addition chains |
interop | SHA-3 interoperability |
abccong | Sharper ABC-based bounds for congruent polynomials |
multiquad | Short generators without quantum computers: the case of multiquadratics |
simplelist | Simplified high-speed high-distance list decoding for alternant codes |
siphash | SipHash: a fast short-input PRF |
slidingright | Sliding right into disaster: Left-to-right sliding windows leak |
ballcoll | Smaller decoding exponents: ball-collision decoding |
qmailsec | Some thoughts on security after ten years of qmail 1.0 |
sphincs | SPHINCS: practical stateless hash-based signatures |
a1ecm | Starfish on strike |
permutations | Stronger security bounds for permutations |
securitywcs | Stronger security bounds for Wegman-Carter-Shoup authenticators |
senfs | Superelliptic integrals and the number-field sieve |
surf | SURF: Simple Unpredictable Random Function |
3x1conjmap | The 3x+1 conjugacy map |
abc | The ABC polygon |
pc109 | The billion-mulmod-per-second PC |
ecc2x | The Certicom challenges ECC2-X |
c3 | The complexity of complex convolution |
mlnfs | The multiple-lattice number field sieve |
shootout | The new SHA-3 software shootout |
poly1305 | The Poly1305-AES message-authentication code |
salsafamily | The Salsa20 family of stream ciphers |
coolnacl | The security impact of a new cryptographic library |
spx | The SPHINCS+ signature framework |
tangentfft | The tangent FFT |
dal | The ubiquitous dal function |
pro | Tighter, faster, simpler side-channel security evaluations beyond computing power |
tightkem | Towards KEM unification |
tweetnacl | TweetNaCl: a crypto library in 100 tweets |
twisted | Twisted Edwards curves |
hessian | Twisted Hessian curves |
grumpy | Two grumpy giants and a baby |
opb | Type-II optimal polynomial bases |
goppadecoding | Understanding binary-Goppa decoding |
bruteforce | Understanding brute force |
gpuasm | Usable assembly language for GPUs: a success story |
kdvseries | Using fast power-series arithmetic in the Kedlaya-Denef-Vercauteren algorithm |
controlbits | Verified fast formulas for control bits for permutation networks |
bestat | Visualizing area-time tradeoffs for SHA-3 |
paretoviz | Visualizing size-security tradeoffs for lattice-based encryption |
expandxor | What output size resists collisions in a xor of independent expansions? |
broken | Which eSTREAM ciphers have been broken? |
phase3speed | Which phase-3 eSTREAM ciphers provide the best software speeds? |
wild | Wild McEliece |
wild2 | Wild McEliece incognito |
Sorted by date of the most recently published version. When another date is listed, it is the date of the first published version.
safecurves
2024.08.09
refereed book
68pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Safe curves for elliptic-curve cryptography."
Information security in a connected world: celebrating the life and work of Ed Dawson, edited by Colin Boyd, Reihaneh Safavi-Naini, Leonie Simpson, Springer, 2024.
To appear.
latticeasymp
2024.07.27
36pp
PDF
old PDF
older PDF
2024.04.13
Daniel J. Bernstein.
"Asymptotics for the standard block size in primal lattice attacks: second order, formally verified."
pwccp
2024.07.27
51pp
PDF
old PDF
older PDF
oldest PDF
2023.09.06
Daniel J. Bernstein.
"Papers with computer-checked proofs."
goppadecoding
2024.07.02
refereed journal
64pp
PDF
old PDF
older PDF
even older PDF
oldest PDF
2022.03.20
Daniel J. Bernstein.
"Understanding binary-Goppa decoding."
IACR Communications in Cryptology 1 (2024), article 1.14.
kyberslash
2024.06.28
17pp
PDF
more
Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada.
"KyberSlash: Exploiting secret-dependent division timings in Kyber implementations."
dacmitm
2024.06.27
refereed
23pp
PDF
Daniel J. Bernstein, Jolijn Cottaar, Tanja Lange.
"Searching for differential addition chains."
ANTS 2024, to appear.
cat
2024.06.12
refereed
90pp
PDF
old PDF
older PDF
more
2023.06.14
Daniel J. Bernstein, Tung Chou.
"CryptAttackTester: high-assurance attack analysis."
Crypto 2024, to appear.
Previous title: "CryptAttackTester: formalizing attack analyses".
pqcomplexity
2024.04.19
31pp
PDF
old PDF
older PDF
2023.12.17
Daniel J. Bernstein.
"Analyzing the complexity of reference post-quantum software: the case of lattice-based KEMs."
pppqefs
2024.03.27
17pp
PDF
old PDF
2023.12.06
Daniel J. Bernstein.
"Predicting performance for post-quantum encrypted-file systems."
competitions
2024.01.13
refereed journal
42pp
PDF
old PDF
older PDF
oldest PDF
2020.12.25
Daniel J. Bernstein.
"Cryptographic competitions."
Journal of Cryptology 37 (2024), article 7.
hybrid
2023.12.08
28pp
PDF
Daniel J. Bernstein.
"Asymptotics of hybrid primal lattice attacks."
qrcsp
2023.12.02
35pp
PDF
older PDF
oldest PDF
2023.11.23
Daniel J. Bernstein.
"Quantifying risks in cryptographic selection processes."
lprrr
2023.03.17
55pp
PDF
old PDF
2022.11.14
Daniel J. Bernstein.
"Multi-ciphertext security degradation for lattices."
ntrw
2022.10.25
refereed book
29pp
PDF
old PDF
2022.08.29
Daniel J. Bernstein.
"A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack."
Pages 617–643 in Progress in cryptology—INDOCRYPT 2022, 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022, proceedings, edited by Takanori Isobe, Santanu Sarkar, Lecture Notes in Computer Science 13774, Springer, 2022, ISBN 978-3-031-22911-4.
Best Paper Award.
abeliannorms
2022.07.31
refereed journal
59pp
PDF
Daniel J. Bernstein.
"Fast norm computation in smooth-degree Abelian number fields."
Research in Number Theory 9 (2023), article 82.
Algorithmic Number Theory Symposium (ANTS) 2022.
spherical
2021.10.23
58pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Non-randomness of S-unit lattices."
opensslntru
2021.10.06
refereed book
18pp
PDF
more
2021.06.15
Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri.
"OpenSSLNTRU: Faster post-quantum TLS key exchange."
Pages 845–862 in Proceedings of the 31st USENIX Security Symposium, edited by Kevin R. B. Butler, Kurt Thomas, USENIX Association, 2022, ISBN 978-1-939133-31-1.
footloose
2021.07.05
20pp
PDF
Daniel J. Bernstein.
"On the looseness of FO derandomization."
ctidh
2021.05.13
refereed journal
36pp
PDF
more
Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková.
"CTIDH: faster constant-time CSIDH."
IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 issue 4 (2021), 351–387.
basicblocker
2021.05.04
refereed book
22pp
PDF
old PDF
2020.07.31
Jan Philipp Thoma, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein.
"BasicBlocker: ISA redesign to make Spectre-immune CPUs faster."
Pages 103–118 in RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6–8, 2021, edited by Leyla Bilge, Tudor Dumitras, ACM, 2021, ISBN 978-1-4503-9058-3.
comet
2020.11.13
5pp
PDF
Daniel J. Bernstein, Henri Gilbert, Meltem Sönmez Turan.
"Observations on COMET."
binecc
2020.10.16
refereed journal
33pp
PDF
more
Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange.
"Concrete quantum cryptanalysis of binary elliptic curves."
IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 issue 1 (2021), 451–472.
controlbits
2020.09.23
67pp
PDF
Daniel J. Bernstein.
"Verified fast formulas for control bits for permutation networks."
categories
2020.09.18
28pp
PDF
Daniel J. Bernstein.
"A discretization attack."
velusqrt
2020.06.16
refereed book
22pp
PDF
more
2020.03.20
Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith.
"Faster computation of isogenies of large prime degree."
Pages 39–55 in ANTS XIV: proceedings of the fourteenth algorithmic number theory symposium, Auckland 2020, edited by Steven Galbraith, Open Book Series 4, Mathematical Sciences Publishers, 2020, ISBN 978-1-935107-07-1.
gigo
2020.03.30
19pp
PDF
old PDF
2020.03.29
Daniel J. Bernstein.
"Further analysis of the impact of distancing upon the COVID-19 pandemic."
mctiny
2019.12.02
refereed book
18pp
PDF
Daniel J. Bernstein, Tanja Lange.
"McTiny: fast high-confidence post-quantum key erasure for tiny network servers."
Pages 1731–1748 in Proceedings of the 29th USENIX Security Symposium, edited by Srdjan Capkun, Franziska Roesner, USENIX Association, 2020, ISBN 978-1-939133-17-5.
spx
2019.09.23
refereed book
24pp
PDF
Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe.
"The SPHINCS+ signature framework."
Pages 2129–2146 in Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, CCS 2019, London, UK, November 11–15, 2019, edited by Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz, ACM, 2019, ISBN 978-1-4503-6747-9.
dspr
2019.09.23
refereed book
36pp
PDF
old PDF
2019.05.13
Daniel J. Bernstein, Andreas Hülsing.
"Decisional second-preimage resistance: When does SPR imply PRE?"
Pages 33–62 in Advances in cryptology—ASIACRYPT 2019—25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019, proceedings, part III, edited by Steven D. Galbraith, Shiho Moriai, Lecture Notes in Computer Science 11923, Springer, 2019, ISBN 978-3-030-34617-1.
latticeproofs
2019.07.19
refereed
52pp
PDF
old PDF
2019.06.08
Daniel J. Bernstein.
"Comparing proofs of security for lattice-based encryption."
Second PQC Standardization Conference.
paretoviz
2019.06.03
refereed
16pp
PDF
Daniel J. Bernstein.
"Visualizing size-security tradeoffs for lattice-based encryption."
Second PQC Standardization Conference.
safegcd
2019.04.13
refereed journal
59pp
PDF
more
2019.03.05
Daniel J. Bernstein, Bo-Yin Yang.
"Fast constant-time gcd computation and modular inversion."
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 issue 3 (2019), 340–398.
qisog
2019.03.05
refereed book
56pp
PDF
more
2018.10.31
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny.
"Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies."
Pages 409–441 in Advances in cryptology—EUROCRYPT 2019—38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019, proceedings, part II, edited by Yuval Ishai, Vincent Rijmen, Lecture Notes in Computer Science 11477, Springer, 2019, ISBN 978-3-030-17655-6.
tightkem
2018.05.28
37pp
PDF
Daniel J. Bernstein, Edoardo Persichetti.
"Towards KEM unification."
divergence
2018.04.30
10pp
PDF
more
2017.12.12
Daniel J. Bernstein.
"Divergence bounds for random fixed-weight vectors obtained by sorting."
holographic
2018.03.12
11pp
PDF
old PDF
2016.03.26
Daniel J. Bernstein.
"Is the security of quantum cryptography guaranteed by the laws of physics?"
hila5
2018.03.08
refereed book
14pp
PDF
old PDF
2017.12.18
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny.
"HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction."
Pages 203–216 in Progress in cryptology, AFRICACRYPT 2018, 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, proceedings, edited by Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi, Lecture Notes in Computer Science 10831, Springer, 2018, ISBN 978-3-319-89338-9.
groverxl
2017.12.15
refereed book
21pp
PDF
Daniel J. Bernstein, Bo-Yin Yang.
"Asymptotically faster quantum algorithms to solve multivariate quadratic equations."
Pages 1–20 in Post-quantum cryptography—9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018, proceedings, edited by Tanja Lange, Rainer Steinwandt, Lecture Notes in Computer Science 10786, Springer, 2018, ISBN 978-3-319-79062-6.
groverrho
2017.08.18
refereed book
11pp
PDF
Gustavo Banegas, Daniel J. Bernstein.
"Low-communication parallel quantum multi-target preimage search."
Pages 325–335 in Selected Areas in Cryptography—SAC 2017, 24th international conference, Ottawa, ON, Canada, August 16–18, 2017, revised selected papers, edited by Carlisle Adams, Jan Camenisch, Lecture Notes in Computer Science 10719, Springer, 2018, ISBN 978-3-319-72564-2.
ntruprime
2017.08.16
refereed book
55pp
PDF
more
2016.05.11
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal.
"NTRU Prime: reducing attack surface at low cost."
Pages 235–260 in Selected Areas in Cryptography—SAC 2017, 24th international conference, Ottawa, ON, Canada, August 16–18, 2017, revised selected papers, edited by Carlisle Adams, Jan Camenisch, Lecture Notes in Computer Science 10719, Springer, 2018, ISBN 978-3-319-72564-2.
slidingright
2017.06.28
refereed book
21pp
PDF
2017.06.27
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom.
"Sliding right into disaster: Left-to-right sliding windows leak."
Pages 555–576 in Cryptographic hardware and embedded systems—CHES 2017—19th international conference, Taipei, Taiwan, September 25–28, 2017, proceedings, edited by Wieland Fischer, Naofumi Homma, Lecture Notes in Computer Science 10529, Springer, 2017, ISBN 978-3-319-66786-7.
gimli
2017.06.27
refereed book
35pp
PDF
more
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier.
"Gimli: a cross-platform permutation."
Pages 299–320 in Cryptographic hardware and embedded systems—CHES 2017—19th international conference, Taipei, Taiwan, September 25–28, 2017, proceedings, edited by Wieland Fischer, Naofumi Homma, Lecture Notes in Computer Science 10529, Springer, 2017, ISBN 978-3-319-66786-7.
multiquad
2017.05.01
refereed book
55pp
PDF
more
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal.
"Short generators without quantum computers: the case of multiquadratics."
Pages 27–59 in Advances in cryptology—EUROCRYPT 2017—36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30–May 4, 2017, proceedings, part I, edited by Jean-Sébastien Coron, Jesper Buus Nielsen, Lecture Notes in Computer Science 10210, Springer, 2017, ISBN 978-3-319-56619-1.
pqrsa
2017.04.19
refereed book
20pp
PDF
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta.
"Post-quantum RSA."
Pages 311–329 in Post-quantum cryptography—8th international workshop, PQCrypto 2017, Utrecht, the Netherlands, June 26–28, 2017, proceedings, edited by Tanja Lange, Tsuyoshi Takagi, Lecture Notes in Computer Science 10346, Springer, 2017, ISBN 978-3-319-59878-9.
grovernfs
2017.04.19
refereed book
17pp
PDF
Daniel J. Bernstein, Jean-François Biasse, Michele Mosca.
"A low-resource quantum factoring algorithm."
Pages 330–346 in Post-quantum cryptography—8th international workshop, PQCrypto 2017, Utrecht, the Netherlands, June 26–28, 2017, proceedings, edited by Tanja Lange, Tsuyoshi Takagi, Lecture Notes in Computer Science 10346, Springer, 2017, ISBN 978-3-319-59878-9.
fallout
2017.04.09
refereed journal
20pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Post-quantum cryptography—dealing with the fallout of physics success."
Nature 549 (2017), 188–194.
Journal version has the title without the subtitle.
montladder
2017.03.30
refereed book
37pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Montgomery curves and the Montgomery ladder."
Pages 82–115 in Topics in computational number theory inspired by Peter L. Montgomery, edited by Joppe W. Bos, Arjen K. Lenstra, Cambridge University Press, 2017, ISBN 978-1107109353.
dagger
2017.01.13
38pp
PDF
more
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange.
"Double-base scalar multiplication revisited."
sect113r2
2016.08.06
29pp
PDF
old PDF
2016.04.14
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann.
"Faster elliptic-curve discrete logarithms on FPGAs."
amac
2016.02.28
refereed book
35pp
PDF
2016.02.15
Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro.
"Hash-function based PRFs: AMAC and its multi-user security."
Pages 566–595 in Advances in cryptology—EUROCRYPT 2016—35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016, proceedings, part I, edited by Marc Fischlin, Jean-Sébastien Coron, Lecture Notes in Computer Science 9665, Springer, 2016, ISBN 978-3-662-49889-7.
nistecc
2016.01.06
27pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Failures in NIST's ECC standards."
multischnorr
2015.10.12
19pp
PDF
more
Daniel J. Bernstein.
"Multi-user Schnorr security, revisited."
bada55
2015.09.27
refereed book
44pp
PDF
more
2014.07.22
Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal.
"How to manipulate curve standards: a white paper for the black hat."
Pages 109–139 in Security standardisation research—second international conference, SSR 2015, Tokyo, Japan, December 15–16, 2015, proceedings, edited by Liqun Chen, Shin'ichiro Matsuo, Lecture Notes in Computer Science 9497, Springer, 2015, ISBN 978-3-319-27151-4.
hessian
2015.08.04
refereed book
28pp
PDF
Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange.
"Twisted Hessian curves."
Pages 1–26 in Progress in cryptology—LATINCRYPT 2015, 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015, proceedings, edited by Kristin Lauter, Francisco Rodríguez-Henríquez, Lecture Notes in Computer Science 9230, Springer, 2015, ISBN 978-3-319-22173-1.
Erratum: At the end of the proof of Theorem 4.4,
$27a^3X_1^9 = dX_1^3Y_1^3Z_1^3 = da^2X_1^3$
should say
$27a^3X_1^9 = d^3X_1^3Y_1^3Z_1^3 = d^3a^2X_1^3$.
dual-ec
2015.07.31
book
25pp
PDF
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen.
"Dual EC: a standardized back door."
Pages 256–281 in The new codebreakers: essays dedicated to David Kahn on the occasion of his 85th birthday, edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater, Lecture Notes in Computer Science 9100, Springer, 2015, ISBN 978-3-662-49300-7.
cpupuf
2015.07.29
refereed book
25pp
PDF
Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen.
"Investigating SRAM PUFs in large CPUs and GPUs."
Pages 228–247 in Security, privacy, and applied cryptography engineering—5th international conference, SPACE 2015, Jaipur, India, October 3–7, 2015, proceedings, edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon A. Solworth, Lecture Notes in Computer Science 9354, Springer, 2015, ISBN 978-3-319-24125-8.
eddsa
2015.07.04
5pp
PDF
more
Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang.
"EdDSA for more curves."
pro
2015.03.08
25pp
PDF
more
Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal.
"Tighter, faster, simpler side-channel security evaluations beyond computing power."
obviouscation
2015.02.23
refereed book
27pp
PDF
more
Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen.
"Bad directions in cryptographic hash functions."
Pages 488–508 in Information security and privacy—20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29–July 1, 2015, proceedings, edited by Ernest Foo, Douglas Stebila, Lecture Notes in Computer Science 9144, Springer, 2015, ISBN 978-3-319-19961-0.
sphincs
2015.02.02
refereed book
30pp
PDF
more
2014.10.01
Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn.
"SPHINCS: practical stateless hash-based signatures."
Pages 368–397 in Advances in cryptology—EUROCRYPT 2015—34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015, proceedings, part I, edited by Elisabeth Oswald, Marc Fischlin, Lecture Notes in Computer Science 9056, Springer, 2015, ISBN 978-3-662-46799-2.
batchnfs
2014.11.09
refereed book
24pp
PDF
more
Daniel J. Bernstein, Tanja Lange.
"Batch NFS."
Pages 38–58 in Selected areas in cryptography—SAC 2014—21st international conference, Montreal, QC, Canada, August 14–15, 2014, revised selected papers, edited by Antoine Joux, Amr M. Youssef, Lecture Notes in Computer Science 8781, Springer, 2014, ISBN 978-3-319-13050-7.
kummer
2014.10.28
refereed book
34pp
PDF
2014.02.18
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe.
"Kummer strikes back: new DH speed records."
Pages 317–337 in Advances in cryptology—ASIACRYPT 2014—20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, December 7–11, 2014, proceedings, part 1, edited by Palash Sarkar, Tetsu Iwata, Lecture Notes in Computer Science 8873, Springer, 2014, ISBN 978-3-662-45610-1.
auth256
2014.09.18
refereed book
20pp
PDF
more
Daniel J. Bernstein, Tung Chou.
"Faster binary-field multiplication and faster binary-field MACs."
Pages 92–111 in Selected areas in cryptography—SAC 2014—21st international conference, Montreal, QC, Canada, August 14–15, 2014, revised selected papers, edited by Antoine Joux, Amr M. Youssef, Lecture Notes in Computer Science 8781, Springer, 2014, ISBN 978-3-319-13050-7.
tweetnacl
2014.09.17
refereed book
18pp
PDF
more
2013.12.29
Daniel J. Bernstein, Bernard van Gastel, Wesley Janssen, Tanja Lange, Peter Schwabe, Sjaak Smetsers.
"TweetNaCl: a crypto library in 100 tweets."
Pages 64–83 in Progress in cryptology—LATINCRYPT 2014—third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014, revised selected papers, edited by Diego F. Aranha, Alfred Menezes, Lecture Notes in Computer Science 8895, Springer, 2015, ISBN 978-3-319-16294-2.
curve41417
2014.07.06
refereed book
19pp
PDF
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange.
"Curve41417: Karatsuba revisited."
Pages 316–334 in Cryptographic hardware and embedded systems—CHES 2014—16th international workshop, Busan, South Korea, September 23–26, 2014, proceedings, edited by Lejla Batina, Matthew Robshaw, Lecture Notes in Computer Science 8731, Springer, 2014, ISBN 978-3-662-44708-6.
Typo: the displayed value of 2^411-ell is missing a final digit 9.
See safecurves.cr.yp.to for computer-verified curve information.
dualectls
2014.06.06
refereed book
17pp
PDF
more
2014.04.07
Stephen Checkoway, Matt Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matt Green, Tanja Lange, Tom Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham.
"On the practical exploitability of Dual EC in TLS implementations."
Pages 319–335 in Proceedings of the 23rd USENIX Security Symposium, edited by Kevin Fu, USENIX Association, 2014.
hyperand
2014.05.27
refereed journal
21pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Hyper-and-elliptic-curve cryptography."
LMS Journal of Computation and Mathematics 17 (2014), 181–202.
Special journal issue for proceedings of Algorithmic number theory symposium.
minimalt
2013.10.31
refereed book
13pp
PDF
more
2013.05.22
W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange.
"MinimaLT: Minimal-latency networking through better security."
Pages 425–438 in 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4–8, 2013, edited by Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung, ACM, 2013, ISBN 978-1-4503-2477-9.
smartfacts
2013.09.16
refereed book
20pp
PDF
more
Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren.
"Factoring RSA keys from certified smart cards: Coppersmith in the wild."
Pages 341–360 in Advances in cryptology—ASIACRYPT 2013—19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013, proceedings, part II, edited by Kazue Sako, Palash Sarkar, Lecture Notes in Computer Science 8270, Springer, 2013, ISBN 978-3-642-42044-3.
nonuniform
2013.09.14
refereed book
53pp
PDF
more
2012.06.04
Daniel J. Bernstein, Tanja Lange.
"Non-uniform cracks in the concrete: the power of free precomputation."
Pages 321–340 in Advances in cryptology—ASIACRYPT 2013—19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013, proceedings, part II, edited by Kazue Sako, Palash Sarkar, Lecture Notes in Computer Science 8270, Springer, 2013, ISBN 978-3-642-42044-3.
elligator
2013.08.28
refereed book
13pp
PDF
more
2013.05.27
Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange.
"Elligator: Elliptic-curve points indistinguishable from uniform random strings."
Pages 967–979 in 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4–8, 2013, edited by Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung, ACM, 2013, ISBN 978-1-4503-2477-9.
rc4biases
2013.07.08
refereed book
31pp
PDF
Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt.
"On the security of RC4 in TLS and WPA."
Pages 305–320 in Proceedings of the 22nd USENIX Security Symposium, Washington, DC, USA, August 14–16, 2013, edited by Samuel T. King, USENIX Association, 2013, ISBN 978-1-931971-03-4.
Conference version is titled ``On the security of RC4 in TLS''
and does not include WPA analysis.
mcbits
2013.06.16
refereed book
26pp
PDF
more
Daniel J. Bernstein, Tung Chou, Peter Schwabe.
"McBits: fast constant-time code-based cryptography."
Pages 250–272 in Cryptographic hardware and embedded systems—CHES 2013—15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013, proceedings, edited by Guido Bertoni, Jean-Sébastien Coron, Lecture Notes in Computer Science 8086, Springer, 2013, ISBN 978-3-642-40348-4.
qsubsetsum
2013.04.07
refereed book
18pp
PDF
more
Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer.
"Quantum algorithms for the subset-sum problem."
Pages 16–33 in Post-quantum cryptography—5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013, proceedings, edited by Philippe Gaborit, Lecture Notes in Computer Science 7932, Springer, 2013, ISBN 978-3-642-38615-2.
badbatch
2012.09.19
refereed book
20pp
PDF
more
Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk.
"Faster batch forgery identification."
Pages 454–473 in Progress in cryptology—INDOCRYPT 2012, 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012, proceedings, edited by Steven D. Galbraith, Mridul Nandi, Lecture Notes in Computer Science 7668, Springer, 2012, ISBN 978-3-642-34930-0.
cuberoot
2012.09.19
refereed book
22pp
PDF
more
2012.08.12
Daniel J. Bernstein, Tanja Lange.
"Computing small discrete logarithms faster."
Pages 317–338 in Progress in cryptology—INDOCRYPT 2012, 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012, proceedings, edited by Steven D. Galbraith, Mridul Nandi, Lecture Notes in Computer Science 7668, Springer, 2012, ISBN 978-3-642-34930-0.
siphash
2012.09.18
refereed book
20pp
PDF
2012.06.20
Jean-Philippe Aumasson, Daniel J. Bernstein.
"SipHash: a fast short-input PRF."
Pages 489–508 in Progress in cryptology—INDOCRYPT 2012, 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012, proceedings, edited by Steven D. Galbraith, Mridul Nandi, Lecture Notes in Computer Science 7668, Springer, 2012, ISBN 978-3-642-34930-0.
2012.06.20 version:
Workshop Record of DIAC 2012: Directions in Authenticated Ciphers.
coolnacl
2012.07.25
refereed book
18pp
PDF
2011.12.01
Daniel J. Bernstein, Tanja Lange, Peter Schwabe.
"The security impact of a new cryptographic library."
Pages 159–176 in Progress in cryptology—LATINCRYPT 2012—2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012, proceedings, edited by Alejandro Hevia, Gregory Neven, Lecture Notes in Computer Science 7533, Springer, 2012, ISBN 978-3-642-33480-1.
grumpy
2012.07.09
refereed book
19pp
PDF
more
2012.06.02
Daniel J. Bernstein, Tanja Lange.
"Two grumpy giants and a baby."
Pages 87–111 in ANTS X: proceedings of the tenth algorithmic number theory symposium, San Diego 2012, edited by Everett W. Howe, Kiran S. Kedlaya, Mathematical Sciences Publishers, 2013, ISBN 978-1-935107-01-9.
bunny
2012.06.21
refereed book
12pp
PDF
Daniel J. Bernstein, Tanja Lange.
"Never trust a bunny."
Pages 137–148 in Radio frequency identification. Security and privacy issues—8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012, revised selected papers, edited by Jaap-Henk Hoepman, Ingrid Verbauwhede, Lecture Notes in Computer Science 7739, Springer, 2013, ISBN 978-3-642-36139-5.
neoncrypto
2012.03.20
refereed book
15pp
PDF
Daniel J. Bernstein, Peter Schwabe.
"NEON crypto."
Pages 320–339 in Cryptographic hardware and embedded systems, CHES 2012, 14th international workshop, Leuven, Belgium, September 9–12, 2012, proceedings, edited by Emmanuel Prouff, Patrick Schaumont, Lecture Notes in Computer Science 7428, Springer, 2012, ISBN 978-3-642-33026-1.
gpuasm
2012.03.13
refereed
10pp
PDF
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang.
"Usable assembly language for GPUs: a success story."
Workshop Record of SHARCS 2012: Special-Purpose Hardware for Attacking Cryptographic Systems.
shootout
2012.02.19
refereed
13pp
PDF
2012.01.03
Daniel J. Bernstein, Tanja Lange.
"The new SHA-3 software shootout."
Third SHA-3 Candidate Conference.
sha3opt
2012.01.04
8pp
PDF
Daniel J. Bernstein.
"Optimization failures in SHA-3 software."
gpuecc2k
2012.01.02
refereed book
19pp
PDF
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang.
"ECC2K-130 on NVIDIA GPUs."
Pages 328–346 in Progress in cryptology—INDOCRYPT 2010—11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010, proceedings, edited by Guang Gong, Kishan Chand Gupta, Lecture Notes in Computer Science 6498, Springer, 2010, ISBN 978-3-642-17400-1.
eecm
2011.10.08
refereed journal
41pp
PDF
more
2008.01.09
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters.
"ECM using Edwards curves."
Mathematics of Computation 82 (2013), 1139–1179.
ed25519
2011.09.26
refereed book journal
23pp
PDF
more
2011.07.05
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang.
"High-speed high-security signatures."
Pages 124–142 in Cryptographic hardware and embedded systems—CHES 2011, 13th international workshop, Nara, Japan, September 28–October 1, 2011, proceedings, edited by Bart Preneel, Tsuyoshi Takagi, Lecture Notes in Computer Science 6917, Springer, 2011, ISBN 978-3-642-23950-2.
Journal version:
Journal of Cryptographic Engineering 2 (2012), 77–89.
wild2
2011.09.15
refereed book
13pp
PDF
more
Daniel J. Bernstein, Tanja Lange, Christiane Peters.
"Wild McEliece incognito."
Pages 244–254 in Post-quantum cryptography—4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011, proceedings, edited by Bo-Yin Yang, Lecture Notes in Computer Science 7071, Springer, 2011, ISBN 978-3-642-25404-8.
simplelist
2011.09.15
refereed book
17pp
PDF
more
2011.03.20
Daniel J. Bernstein.
"Simplified high-speed high-distance list decoding for alternant codes."
Pages 200–216 in Post-quantum cryptography—4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011, proceedings, edited by Bo-Yin Yang, Lecture Notes in Computer Science 7071, Springer, 2011, ISBN 978-3-642-25404-8.
rfsb
2011.05.08
refereed book
19pp
PDF
more
2011.02.14
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe.
"Really fast syndrome-based hashing."
Pages 134–152 in Progress in cryptology—AFRICACRYPT 2011—4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011, proceedings, edited by Abderrahmane Nitaj, David Pointcheval, Lecture Notes in Computer Science 6737, Springer, 2011, ISBN 978-3-642-21968-9.
2reg
2011.03.09
refereed book
18pp
PDF
more
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe.
"Faster 2-regular information-set decoding."
Pages 81–98 in Coding and cryptology—third international workshop, IWCC 2011, Qingdao, China, May 30–June 3, 2011, proceedings, edited by Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing, Lecture Notes in Computer Science 6639, Springer, 2011, ISBN 978-3-642-20900-0.
ballcoll
2011.03.07
refereed book
26pp
PDF
more
2010.11.17
Daniel J. Bernstein, Tanja Lange, Christiane Peters.
"Smaller decoding exponents: ball-collision decoding."
Pages 743–760 in Advances in cryptology—CRYPTO 2011—31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011, proceedings, edited by Phillip Rogaway, Lecture Notes in Computer Science 6841, Springer, 2011, ISBN 978-3-642-22791-2.
goppalist
2011.03.03
refereed book
19pp
PDF
more
2008.07.06
Daniel J. Bernstein.
"List decoding for binary Goppa codes."
Pages 62–80 in Coding and cryptology—third international workshop, IWCC 2011, Qingdao, China, May 30–June 3, 2011, proceedings, edited by Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing, Lecture Notes in Computer Science 6639, Springer, 2011, ISBN 978-3-642-20900-0.
xsalsa
2011.02.04
refereed
14pp
PDF
more
2008.11.28
Daniel J. Bernstein.
"Extending the Salsa20 nonce."
Workshop Record of Symmetric Key Encryption Workshop 2011.
negation
2011.01.02
refereed book
26pp
PDF
more
Daniel J. Bernstein, Tanja Lange, Peter Schwabe.
"On the correct use of the negation map in the Pollard rho method."
Pages 128–146 in Public key cryptography—PKC 2011—14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011, proceedings, edited by Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi, Lecture Notes in Computer Science 6571, Springer, 2011, ISBN 978-3-642-19378-1.
quantumsha3
2010.11.12
7pp
PDF
more
Daniel J. Bernstein.
"Quantum attacks against Blue Midnight Wish, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Shabal, SHAvite-3, SIMD, and Skein."
wild
2010.10.07
refereed book
18pp
PDF
more
2010.07.21
Daniel J. Bernstein, Tanja Lange, Christiane Peters.
"Wild McEliece."
Pages 143–158 in Selected areas in cryptography—17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010, revised selected papers, edited by Alex Biryukov, Guang Gong, Douglas R. Stinson, Lecture Notes in Computer Science 6544, Springer, 2011, ISBN 978-3-642-19573-0.
completed
2010.10.06
refereed journal
15pp
PDF
2009.11.25
Daniel J. Bernstein, Tanja Lange.
"A complete set of addition laws for incomplete Edwards curves."
Journal of Number Theory 131 (2011), 858–872.
interop
2010.09.15
5pp
PDF
more
Daniel J. Bernstein.
"SHA-3 interoperability."
bestat
2010.09.06
5pp
PDF
more
Daniel J. Bernstein.
"Visualizing area-time tradeoffs for SHA-3."
a1ecm
2010.06.14
refereed book
20pp
PDF
more
Daniel J. Bernstein, Peter Birkner, Tanja Lange.
"Starfish on strike."
Pages 61–80 in Progress in cryptology—LATINCRYPT 2010, first international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010, proceedings, edited by Michel Abdalla, Paulo S. L. M. Barreto, Lecture Notes in Computer Science 6212, Springer, 2010, ISBN 978-3-642-14711-1.
Typo in the proof of Theorem 5.1: the displayed ...=d should be -...=d.
opb
2010.04.13
refereed book
17pp
PDF
more
2010.02.09
Daniel J. Bernstein, Tanja Lange.
"Type-II optimal polynomial bases."
Pages 41–61 in Arithmetic of finite fields: third international workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010, proceedings, edited by M. Anwar Hasan, Tor Helleseth, Lecture Notes in Computer Science 6087, Springer, 2010, ISBN 978-3-642-13796-9.
grovercode
2010.03.03
refereed book
8pp
PDF
more
2009.11.23
Daniel J. Bernstein.
"Grover vs. McEliece."
Pages 73–80 in Post-quantum cryptography: third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010, proceedings, edited by Nicolas Sendrier, Lecture Notes in Computer Science 6061, Springer, 2010, ISBN 978-3-642-12928-5.
ecc2k130
2009.11.18
20pp
PDF
more
2009.11.05
Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Gueneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang.
"Breaking ECC2K-130."
linearmod2
2009.10.05
refereed
16pp
PDF
more
2009.08.30
Daniel J. Bernstein.
"Optimizing linear maps modulo 2."
Workshop Record of SPEED-CC: Software Performance Enhancement for Encryption and Decryption
and Cryptographic Compilers.
fsbday
2009.10.03
refereed book
21pp
PDF
more
2009.06.17
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe.
"FSBday: implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB."
Pages 18–38 in Progress in cryptology—INDOCRYPT 2009, 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009, proceedings, edited by Bimal Roy, Nicolas Sendrier, Lecture Notes in Computer Science 5922, Springer, 2009, ISBN 978-3-642-10627-9.
Previous version:
Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems.
pc109
2009.09.01
refereed
14pp
PDF
more
Daniel J. Bernstein, Hsueh-Chung Chen, Ming-Shing Chen, Chen-Mou Cheng, Chun-Hung Hsiao, Tanja Lange, Zong-Cing Lin, Bo-Yin Yang.
"The billion-mulmod-per-second PC."
Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems.
ecc2x
2009.09.01
refereed
32pp
PDF
more
Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Gueneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel.
"The Certicom challenges ECC2-X."
Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems.
collisioncost
2009.08.23
refereed
12pp
PDF
more
2009.05.17
Daniel J. Bernstein.
"Cost analysis of hash collisions: Will quantum computers make SHARCS obsolete?"
Workshop Record of SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems.
bbe
2009.06.04
refereed book
21pp
PDF
more
Daniel J. Bernstein.
"Batch binary Edwards."
Pages 317–336 in Advances in cryptology—Crypto 2009, 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009, proceedings, edited by Shai Halevi, Lecture Notes in Computer Science 5677, Springer, 2009, ISBN 978-3-642-03355-1.
naclcrypto
2009.03.10
45pp
PDF
Daniel J. Bernstein.
"Cryptography in NaCl."
gpuecm
2009.01.27
refereed book
20pp
PDF
more
2008.11.11
Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang.
"ECM on graphics cards."
Pages 483–501 in Advances in cryptology—EUROCRYPT 2009, 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009, proceedings, edited by Antoine Joux, Lecture Notes in Computer Science 5479, Springer, 2009, ISBN 978-3-642-01000-2.
decoco
2009
refereed
13pp
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Henk van Tilborg.
"Explicit bounds for generic decoding algorithms for code-based cryptography."
Proceedings of WCC 2009.
aesspeed
2008.09.26
refereed book
15pp
PDF
more
2008.09.08
Daniel J. Bernstein, Peter Schwabe.
"New AES software speed records."
Pages 322–336 in Progress in cryptology—INDOCRYPT 2008, 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008, proceedings, edited by Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das, Lecture Notes in Computer Science 5365, Springer, 2008, ISBN 978-3-540-89753-8.
mceliece
2008.08.07
refereed book
16pp
PDF
more
2008.07.22
Daniel J. Bernstein, Tanja Lange, Christiane Peters.
"Attacking and defending the McEliece cryptosystem."
Pages 31–46 in Post-quantum cryptography: second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008, proceedings, edited by Johannes Buchmann, Jintai Ding, Springer, 2008, ISBN 978-3-540-88402-6.
edwards2
2008.06.11
refereed book
23pp
PDF
more
2008.04.15
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi.
"Binary Edwards curves."
Pages 244–265 in Cryptographic hardware and embedded systems—CHES 2008, 10th international workshop, Washington, D.C., USA, August 10–13, 2008, proceedings, edited by Elisabeth Oswald, Pankaj Rohatgi, Lecture Notes in Computer Science 5154, Springer, 2008, ISBN 978-3-540-85052-6.
multapps
2008.05.15
refereed book
60pp
PDF
more
2003.01.19
Daniel J. Bernstein.
"Fast multiplication and its applications."
Pages 325–384 in Algorithmic number theory: lattices, number fields, curves and cryptography, edited by Joe Buhler, Peter Stevenhagen, Cambridge University Press, 2008, ISBN 978-0521808545.
smallheight
2008.05.02
refereed book
26pp
PDF
more
2003.09.18
Daniel J. Bernstein.
"Reducing lattice bases to find small-height values of univariate polynomials."
Pages 421–446 in Algorithmic number theory: lattices, number fields, curves and cryptography, edited by Joe Buhler, Peter Stevenhagen, Cambridge University Press, 2008, ISBN 978-0521808545.
forgery
2008.05.01
refereed book
15pp
PDF
more
2001.07.31
Daniel J. Bernstein.
"Protecting communications against forgery."
Pages 535–549 in Algorithmic number theory: lattices, number fields, curves and cryptography, edited by Joe Buhler, Peter Stevenhagen, Cambridge University Press, 2008, ISBN 978-0521808545.
Erratum: The conjecture on page 539 is quantitatively incorrect
(as are many analogous conjectures in the literature)
for the most obvious definition of "steps".
There exists an attack algorithm with a considerably better tradeoff
between success probability and number of steps,
even though no feasible method is known to find that algorithm.
phase3speed
2008.03.31
13pp
PDF
more
2008.02.25
Daniel J. Bernstein.
"Which phase-3 eSTREAM ciphers provide the best software speeds?"
broken
2008.03.30
35pp
PDF
more
2008.02.21
Daniel J. Bernstein.
"Which eSTREAM ciphers have been broken?"
twisted
2008.03.13
refereed book
17pp
PDF
more
2008.01.08
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters.
"Twisted Edwards curves."
Pages 389–405 in Progress in cryptology—AFRICACRYPT 2008, first international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008, proceedings, edited by Serge Vaudenay, Lecture Notes in Computer Science 5023, Springer, 2008, ISBN 978-3-540-68159-5.
rwtight
2008.02.01
refereed book
18pp
PDF
more
2003.09.26
Daniel J. Bernstein.
"Proving tight security for Rabin-Williams signatures."
Pages 70–87 in Advances in cryptology—EUROCRYPT 2008, 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008, proceedings, edited by Nigel Smart, Lecture Notes in Computer Science 4965, Springer, 2008, ISBN 978-3-540-78966-6.
rwsota
2008.01.31
11pp
PDF
more
Daniel J. Bernstein.
"RSA signatures and Rabin-Williams signatures: the state of the art."
chacha
2008.01.28
refereed
6pp
PDF
more
2008.01.20
Daniel J. Bernstein.
"ChaCha, a variant of Salsa20."
Workshop Record of SASC 2008: The State of the Art of Stream Ciphers.
salsafamily
2007.12.25
book
15pp
PDF
more
Daniel J. Bernstein.
"The Salsa20 family of stream ciphers."
Pages 84–97 in New stream cipher designs: the eSTREAM finalists, edited by Matthew Robshaw, Olivier Billet, Lecture Notes in Computer Science 4986, Springer, 2008, ISBN 978-3-540-68350-6.
Paper invited by book editors.
efd
2007.12.04
refereed book
19pp
PDF
more
Daniel J. Bernstein, Tanja Lange.
"Analysis and optimization of elliptic-curve single-scalar multiplication."
Pages 1–19 in Finite fields and applications: Eighth international conference on finite fields and applications, July 9–13, 2007, Melbourne, Australia, edited by Gary L. Mullen, Daniel Panario, Igor E. Shparlinski, Contemporary Mathematics 461, American Mathematical Society, 2008, ISBN 978-0-8218-4309-3.
qmailsec
2007.11.01
book
10pp
PDF
Daniel J. Bernstein.
"Some thoughts on security after ten years of qmail 1.0."
Proceedings of Computer Security Architecture Workshop (CSAW) 2007.
Paper invited by conference organizers.
doublebase
2007.10.28
refereed book
16pp
PDF
more
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters.
"Optimizing double-base elliptic-curve single-scalar multiplication."
Pages 167–182 in Progress in cryptology—INDOCRYPT 2007, 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007, proceedings, edited by Kannan Srinathan, Chandrasekaran Pandu Rangan, Moti Yung, Lecture Notes in Computer Science 4859, Springer, 2007, ISBN 978-3-540-77025-1.
pema
2007.10.22
14pp
PDF
more
Daniel J. Bernstein.
"Polynomial evaluation and message authentication."
inverted
2007.10.09
book
8pp
PDF
more
Daniel J. Bernstein, Tanja Lange.
"Inverted Edwards coordinates."
Pages 20–27 in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16–20, 2007, Proceedings, edited by Serdar Boztas, Hsiao-feng Lu, Lecture Notes in Computer Science 4851, Springer, 2007, ISBN 978-3-540-77223-1.
Paper invited from Lange by conference organizers.
tangentfft
2007.09.19
refereed book
10pp
PDF
more
2007.08.09
Daniel J. Bernstein.
"The tangent FFT."
Pages 291–300 in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16–20, 2007, Proceedings, edited by Serdar Boztas, Hsiao-feng Lu, Lecture Notes in Computer Science 4851, Springer, 2007, ISBN 978-3-540-77223-1.
newelliptic
2007.09.06
refereed book
20pp
PDF
more
2007.04.10
Daniel J. Bernstein, Tanja Lange.
"Faster addition and doubling on elliptic curves."
Pages 29–50 in Advances in cryptology—ASIACRYPT 2007, 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2–6, 2007, proceedings, edited by Kaoru Kurosawa, Lecture Notes in Computer Science 4833, Springer, 2007, ISBN 978-3-540-76899-9.
2022 IACR Test-of-Time Award.
genbday
2007.09.04
refereed
8pp
PDF
more
2007.07.19
Daniel J. Bernstein.
"Better price-performance ratios for generalized birthday attacks."
Workshop Record of SHARCS'07: Special-purpose Hardware for Attacking Cryptographic Systems.
antiquad
2007.08.17
refereed book
19pp
PDF
more
2007.03.03
Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jiun-Ming Chen.
"Analysis of QUAD."
Pages 290–308 in Fast software encryption: 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007, revised selected papers, edited by Alex Biryukov, Lecture Notes in Computer Science 4593, Springer, 2007, ISBN 978-3-540-74617-1.
cipherdag
2007.06.30
refereed
2pp
PDF
more
Daniel J. Bernstein.
"Cipher DAGs."
Workshop Record of ECRYPT Workshop on Tools for Cryptanalysis 2007.
expandxor
2007.05.03
refereed
10pp
PDF
more
2007.04.11
Daniel J. Bernstein.
"What output size resists collisions in a xor of independent expansions?"
Workshop Record of ECRYPT Workshop on Hash Functions 2007.
aecycles
2007.01.18
refereed
13pp
PDF
more
2007.01.11
Daniel J. Bernstein.
"Cycle counts for authenticated encryption."
Workshop Record of SASC 2007: The State of the Art of Stream Ciphers.
kdvseries
2006.10.19
4pp
PDF
more
Daniel J. Bernstein.
"Using fast power-series arithmetic in the Kedlaya-Denef-Vercauteren algorithm."
powers2
2006.09.14
refereed journal
4pp
PDF
more
2004.06.30
Daniel J. Bernstein, Hendrik W. Lenstra, Jr., Jonathan Pila.
"Detecting perfect powers by factoring into coprimes."
Mathematics of Computation 76 (2007), 385–388.
meecrt
2006.09.14
refereed journal
12pp
PDF
more
2003.08.15
Daniel J. Bernstein, Jonathan P. Sorenson.
"Modular exponentiation via the explicit Chinese remainder theorem."
Mathematics of Computation 76 (2007), 443–454.
quartic
2006.09.14
refereed journal
15pp
PDF
more
2003.01.28
Daniel J. Bernstein.
"Proving primality in essentially quartic random time."
Mathematics of Computation 76 (2007), 389–403.
curvezero
2006.07.26
13pp
PDF
more
2006.07.21
Daniel J. Bernstein.
"Can we avoid tests for zero in fast elliptic-curve arithmetic?"
zkcrypt
2006.03.02
4pp
PDF
more
Daniel J. Bernstein.
"Does ZK-Crypt version 1 flunk a repetition test?"
diffchain
2006.02.19
16pp
PDF
more
Daniel J. Bernstein.
"Differential addition chains."
curve25519
2006.02.09
refereed book
22pp
PDF
more
2005.11.15
Daniel J. Bernstein.
"Curve25519: new Diffie-Hellman speed records."
Pages 207–228 in Public key cryptography—PKC 2006, 9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24–26, 2006, proceedings, edited by Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin, Lecture Notes in Computer Science 3958, Springer, 2006, ISBN 3-540-33851-9.
2022 PKC Test-of-Time Award.
stream256
2006.01.23
refereed
14pp
PDF
more
2005.12.23
Daniel J. Bernstein.
"Comparison of 256-bit stream ciphers at the beginning of 2006."
Workshop Record of SASC 2006: Stream Ciphers Revisited.
abccong
2005.12.24
refereed journal
5pp
PDF
more
2003.03.14
Daniel J. Bernstein.
"Sharper ABC-based bounds for congruent polynomials."
Journal de Théorie des Nombres de Bordeaux 17 (2005), 721–725.
bruteforce
2005.04.25
refereed
10pp
PDF
more
Daniel J. Bernstein.
"Understanding brute force."
ECRYPT STVL Workshop on Symmetric Key Encryption.
cachetiming
2005.04.14
37pp
PDF
more
2004.11.11
Daniel J. Bernstein.
"Cache-timing attacks on AES."
poly1305
2005.03.29
refereed book
18pp
PDF
more
2004.11.01
Daniel J. Bernstein.
"The Poly1305-AES message-authentication code."
Pages 32–49 in Fast software encryption: 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005, revised selected papers, edited by Henri Gilbert, Helena Handschuh, Lecture Notes in Computer Science 3557, Springer, 2005, ISBN 3-540-26541-4.
permutations
2005.03.23
10pp
PDF
more
Daniel J. Bernstein.
"Stronger security bounds for permutations."
To be incorporated into author's
High-speed cryptography book.
securitywcs
2005.02.27
refereed book
17pp
PDF
more
2004.10.19
Daniel J. Bernstein.
"Stronger security bounds for Wegman-Carter-Shoup authenticators."
Pages 164–180 in Advances in Cryptology—EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005, proceedings, edited by Ronald Cramer, Lecture Notes in Computer Science 3494, Springer, 2005, ISBN 3-540-25910-4.
easycbc
2005.01.09
6pp
PDF
more
Daniel J. Bernstein.
"A short proof of the unpredictability of cipher block chaining."
dcba
2005.01
refereed journal
30pp
PDF
more
1996.05.12
Daniel J. Bernstein.
"Factoring into coprimes in essentially linear time."
Journal of Algorithms 54 (2005), 1–30.
prime2004
2004.12.23
15pp
PDF
more
2004.02.12
Daniel J. Bernstein.
"Distinguishing prime numbers from composite numbers: the state of the art in 2004."
dcba2
2004.11.03
4pp
PDF
more
2004.10.09
Daniel J. Bernstein.
"Research announcement: Faster factorization into coprimes."
hash127
2004.09.18
21pp
PDF
more
1999.04.04
Daniel J. Bernstein.
"Floating-point arithmetic and message authentication."
To be incorporated into author's
High-speed cryptography book.
scaledmod
2004.08.20
8pp
PDF
more
Daniel J. Bernstein.
"Scaled remainder trees."
focus
2004.06.10
refereed book
8pp
more
2001.12.31
Daniel J. Bernstein.
"Doubly focused enumeration of locally square polynomial values."
Pages 69–76 in High primes and misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams, edited by Alf van der Poorten, Andreas Stein, Fields Institute Communications 41, American Mathematical Society, 2004, ISBN 0-8218-3353-7.
smoothparts
2004.05.10
7pp
PDF
more
Daniel J. Bernstein.
"How to find smooth parts of integers."
primesieves
2004.04
refereed journal
8pp
PDF
more
1999.05.05
A. O. L. Atkin, Daniel J. Bernstein.
"Prime sieves using binary quadratic forms."
Mathematics of Computation 73 (2004), 1023–1030.
fastnewton
2004.03.09
13pp
PDF
more
1998.06.27
Daniel J. Bernstein.
"Removing redundancy in high-precision Newton iteration."
logagm
2003.07.17
8pp
PDF
more
Daniel J. Bernstein.
"Computing logarithm intervals with the arithmetic-geometric-mean iteration."
logfloor
2003.06.30
4pp
PDF
more
2003.06.29
Daniel J. Bernstein.
"Computing logarithm floors in essentially linear time."
aks
2003.01.25
15pp
PDF
more
2002.08.09
Daniel J. Bernstein.
"Proving primality after Agrawal-Kayal-Saxena."
psi
2002.10.01
refereed book
18pp
PDF
more
2000.11.03
Daniel J. Bernstein.
"Arbitrarily tight bounds on the distribution of smooth integers."
Pages 49–66 in Number theory for the Millennium volume 1, edited by Michael A. Bennett, Bruce C. Berndt, Nigel Boston, Harold G. Diamond, Adolf J. Hildebrand, Walter Philipp, A. K. Peters, 2002, ISBN 1-56881-126-8.
sf
2002.09.23
15pp
PDF
more
2000.06.22
Daniel J. Bernstein.
"How to find small factors of integers."
Now being revamped in light of smoothparts results.
pippenger
2002.01.18
21pp
PDF
more
2001.12.18
Daniel J. Bernstein.
"Pippenger's exponentiation algorithm."
To be incorporated into author's
High-speed cryptography book.
Error pointed out by Sam Hocevar: the example in Figure 4 needs 2 and is thus of length 18.
nonsquare
2001.12.20
3pp
PDF
more
Daniel J. Bernstein.
"Faster algorithms to find non-squares modulo worst-case integers."
sqroot
2001.11.23
10pp
PDF
more
Daniel J. Bernstein.
"Faster square roots in annoying finite fields."
To be incorporated into author's
High-speed cryptography book.
nfscircuit
2001.11.09
11pp
PDF
more
Daniel J. Bernstein.
"Circuits for integer factorization: a proposal."
Excerpted from DMS-0140542 grant proposal.
m3
2001.08.11
refereed
19pp
PDF
more
Daniel J. Bernstein.
"Multidigit multiplication for mathematicians."
Accepted to Advances in Applied Mathematics,
but withdrawn by author to prevent irreparable mangling by Academic Press.
sortedsums
2001.01
refereed journal
6pp
PDF
more
1998.06.29
Daniel J. Bernstein.
"Enumerating solutions to p(a)+q(b)=r(c)+s(d)."
Mathematics of Computation 70 (2001), 389–394.
sigs
2000.08.09
refereed
11pp
PDF
more
Daniel J. Bernstein.
"A secure public-key signature system with extremely fast verification."
Accepted to Journal of Cryptology,
but withdrawn to be incorporated into author's
High-speed cryptography book.
unipat
2000.08.06
6pp
PDF
more
Daniel J. Bernstein.
"A simple universal pattern-matching automaton."
hash127-abs
1999.04.04
2pp
PDF
more
Daniel J. Bernstein.
"Guaranteed message authentication faster than MD5 (abstract)."
stretch
1999
refereed journal
8pp
PDF
more
Daniel J. Bernstein.
"How to stretch random functions: the security of protected counter sums."
Journal of Cryptology 12 (1999), 185–192.
compose
1998.09
refereed journal
3pp
PDF
more
Daniel J. Bernstein.
"Composing power series over a finite ring in essentially linear time."
Journal of Symbolic Computation 26 (1998), 339–341.
psi-abs
1998.07.01
refereed book
3pp
PDF
more
Daniel J. Bernstein.
"Bounding smooth integers (extended abstract)."
Pages 128–130 in Algorithmic number theory: third international symposium, ANTS-III, Portland, Oregon, USA, June 21–25, 1998, proceedings, edited by Joe Buhler, Lecture Notes in Computer Science 1423, Springer, 1998, ISBN 3-540-64657-4.
powers
1998.07
refereed journal
31pp
PDF
more
1995.05
Daniel J. Bernstein.
"Detecting perfect powers in essentially linear time."
Mathematics of Computation 67 (1998), 1253–1283.
First version was Chapter 1 of Ph.D. dissertation.
calculus
1997.04.03
12pp
PDF
more
Daniel J. Bernstein.
"Calculus for mathematicians."
fastgcd
1996.06.28
more
Daniel J. Bernstein.
"Kronecker matrices and polynomial GCDs."
Superseded by multapps.
fiall
1996.06.01
refereed book
8pp
PDF
more
Daniel J. Bernstein.
"Fast ideal arithmetic via lazy localization."
Pages 27–34 in Algorithmic number theory: second international symposium, ANTS-II, Talence, France, May 18–23, 1996, proceedings, edited by Henri Cohen, Lecture Notes in Computer Science 1122, Springer, 1996, ISBN 3-540-61581-4.
3x1conjmap
1996.02.15
refereed journal
16pp
PDF
more
Daniel J. Bernstein, Jeffrey C. Lagarias.
"The 3x+1 conjugacy map."
Canadian Journal of Mathematics 48 (1996), 1154–1169.
mmecrt
1995.05
book
7pp
PDF
more
Daniel J. Bernstein.
"Multidigit modular multiplication with the Explicit Chinese Remainder Theorem."
Chapter 4 in Detecting perfect powers in essentially linear time, and other studies in computational number theory, Ph.D. dissertation, University of California at Berkeley, 1995.
mlnfs
1995.05
book
5pp
PDF
more
Daniel J. Bernstein.
"The multiple-lattice number field sieve."
Chapter 3 in Detecting perfect powers in essentially linear time, and other studies in computational number theory, Ph.D. dissertation, University of California at Berkeley, 1995.
epsi
1995.05
book
4pp
PDF
more
Daniel J. Bernstein.
"Enumerating and counting smooth integers."
Chapter 2 in Detecting perfect powers in essentially linear time, and other studies in computational number theory, Ph.D. dissertation, University of California at Berkeley, 1995.
231
1994.02
refereed journal
4pp
more
Daniel J. Bernstein.
"A non-iterative 2-adic statement of the 3N+1 conjecture."
Proceedings of the American Mathematical Society 121 (1994), 405–408.
nfsi
1993.01
book
24pp
more
Daniel J. Bernstein, Arjen K. Lenstra.
"A general number field sieve implementation."
Pages 103–126 in The development of the number field sieve, edited by Arjen K. Lenstra, Hendrik W. Lenstra, Jr, Lecture Notes in Mathematics 1554, Springer, 1993, ISBN 3-540-57013-6.
westinghouse
1987
21pp
scanned
more
Daniel J. Bernstein.
"New fast algorithms for pi and e."
Fifth-place paper for the nationwide 1987 Westinghouse Science Talent Search.
Distributed widely at the Ramanujan Centenary Conference.
dal
more
Daniel J. Bernstein.
"The ubiquitous dal function."
c3
more
Daniel J. Bernstein.
"The complexity of complex convolution."
abc
more
Daniel J. Bernstein, Bruce E. Kaskel.
"The ABC polygon."
surf
more
Daniel J. Bernstein.
"SURF: Simple Unpredictable Random Function."
senfs
more
Daniel J. Bernstein.
"Superelliptic integrals and the number-field sieve."
huptrie
more
Daniel J. Bernstein.
"Saving space and time in hash tries."
hblcs
more
Daniel J. Bernstein.
"Predicting a linear congruential sequence from its high bits."
mimd
more
Daniel J. Bernstein.
"Matrix inversion made difficult."
fastgraeffe
more
Daniel J. Bernstein.
"High-precision roots of high-degree polynomials."
gge
more
Daniel J. Bernstein.
"Generalized Gaussian elimination."
zmult
more
Daniel J. Bernstein.
"Faster multiplication of integers."
nistp224
more
Daniel J. Bernstein.
"Fast point multiplication on the NIST P-224 elliptic curve."
To be incorporated into author's
High-speed cryptography book.
smoothdep
more
Daniel J. Bernstein.
"Estimating the dependence time for smooth integers."
decompress
more
Daniel J. Bernstein.
"Data decompression."
nfspoly
more
Daniel J. Bernstein.
"Controlling three coefficients in number-field-sieve polynomials."
rings
more
Daniel J. Bernstein.
"Commutative rings."
zeroseek
more
Daniel J. Bernstein.
"A fast journaling filesystem."