Post-quantum cryptography DJ Bernstein Encyclopedia of Cryptography and Security, 949-950, 2011 | 2491* | 2011 |
Curve25519: new Diffie-Hellman speed records DJ Bernstein Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006 | 1420 | 2006 |
Cache-timing attacks on AES DJ Bernstein | 1134 | 2005 |
High-speed high-security signatures DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang Journal of cryptographic engineering 2 (2), 77-89, 2012 | 1028 | 2012 |
Faster addition and doubling on elliptic curves DJ Bernstein, T Lange Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 727 | 2007 |
ChaCha, a variant of Salsa20 DJ Bernstein Workshop record of SASC 8 (1), 3-5, 2008 | 717 | 2008 |
Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 669 | 2008 |
The Salsa20 family of stream ciphers DJ Bernstein New stream cipher designs: the eSTREAM finalists, 84-97, 2008 | 661 | 2008 |
Attacking and defending the McEliece cryptosystem DJ Bernstein, T Lange, C Peters Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 545 | 2008 |
The Poly1305-AES message-authentication code DJ Bernstein International workshop on fast software encryption, 32-49, 2005 | 533 | 2005 |
SPHINCS: practical stateless hash-based signatures DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ... Annual international conference on the theory and applications of …, 2015 | 520 | 2015 |
SipHash: a fast short-input PRF JP Aumasson, DJ Bernstein International Conference on Cryptology in India, 489-508, 2012 | 474 | 2012 |
NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 392* | 2018 |
The SPHINCS+ Signature Framework DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 357 | 2019 |
The security impact of a new cryptographic library DJ Bernstein, T Lange, P Schwabe Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012 | 343 | 2012 |
eBACS: ECRYPT benchmarking of cryptographic systems DJ Bernstein, T Lange | 330 | 2009 |
Cache-timing attacks on AES (2005) DJ Bernstein | 289 | 2005 |
Grover vs. mceliece DJ Bernstein Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010 …, 2010 | 278 | 2010 |
On the security of {RC4} in {TLS} N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt 22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013 | 272 | 2013 |
Smaller decoding exponents: ball-collision decoding DJ Bernstein, T Lange, C Peters Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 272 | 2011 |