Daniel J. Bernstein
Affiliations:- University of Illinois at Chicago, Department of Computer Science
- TU Eindhoven, Department of Mathematics and Computer Science
According to our database1,
Daniel J. Bernstein
authored at least 144 papers
between 1990 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on viaf.org
-
on twitter.com
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on cr.yp.to
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the Information Security in a Connected World, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Asymptotics for the standard block size in primal lattice attacks: second order, formally verified.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
A One-Time Single-bit Fault Leaks All Previous NTRU-HRSS Session Keys to a Chosen-Ciphertext Attack.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
CoRR, 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Addition formulas for elliptic curves.
Proceedings of the Handbook of Finite Fields., 2013
2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Breaking DNSSEC.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the ISSE 2009, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Math. Comput., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Public Key Cryptography, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Advances in Cryptology, 2005
2004
2001
1999
J. Cryptol., 1999
1998
J. Symb. Comput., 1998
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
1996
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996
1990