Daniel J. Bernstein

Results: 48



#Item
1The Certicom Challenges ECC2-X  Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thors

The Certicom Challenges ECC2-X Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thors

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
2Cryptanalysis of  Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds

Cryptanalysis of Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds

Add to Reading List

Source URL: fse2011.mat.dtu.dk

- Date: 2011-02-14 02:32:24
    3NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven  25 August 2016

    NTRU Prime Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal Technische Universiteit Eindhoven 25 August 2016

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2016-08-28 15:42:38
      4Ball-collision decoding - joint work with Daniel J. Bernstein and Tanja Lange

      Ball-collision decoding - joint work with Daniel J. Bernstein and Tanja Lange

      Add to Reading List

      Source URL: pqc2010.cased.de

      Language: English - Date: 2010-05-31 05:56:32
        5How to manipulate standards Daniel J. Bernstein Verizon Communications Inc. LICENSE: You understand and hereby agree that the audio, video, and text of this presentation are provided “as is”, without

        How to manipulate standards Daniel J. Bernstein Verizon Communications Inc. LICENSE: You understand and hereby agree that the audio, video, and text of this presentation are provided “as is”, without

        Add to Reading List

        Source URL: projectbullrun.org

        Language: English - Date: 2015-05-15 17:09:25
          6Hash-flooding DoS reloaded: attacks and defenses Jean-Philippe Aumasson, Kudelski Group Daniel J. Bernstein, University of Illinois at Chicago Martin Boßlet, freelancer

          Hash-flooding DoS reloaded: attacks and defenses Jean-Philippe Aumasson, Kudelski Group Daniel J. Bernstein, University of Illinois at Chicago Martin Boßlet, freelancer

          Add to Reading List

          Source URL: 131002.net

          Language: English - Date: 2012-11-08 11:18:52
            7Elliptic curves for applications Tanja Lange Technische Universiteit Eindhoven part of this material is joint work with Daniel J. Bernstein University of Illinois at Chicago

            Elliptic curves for applications Tanja Lange Technische Universiteit Eindhoven part of this material is joint work with Daniel J. Bernstein University of Illinois at Chicago

            Add to Reading List

            Source URL: hyperelliptic.org

            Language: English - Date: 2011-12-26 07:37:42
              8Faster elliptic-curve discrete logarithms on FPGAs Daniel J. Bernstein · Susanne Engels · Tanja Lange · Ruben Niederhagen · Christof Paar · Peter Schwabe · Ralf Zimmermann December 12, 2016

              Faster elliptic-curve discrete logarithms on FPGAs Daniel J. Bernstein · Susanne Engels · Tanja Lange · Ruben Niederhagen · Christof Paar · Peter Schwabe · Ralf Zimmermann December 12, 2016

              Add to Reading List

              Source URL: cryptojedi.org

              Language: English - Date: 2016-12-28 12:52:47
              9Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven  17 September 2017

              Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven 17 September 2017

              Add to Reading List

              Source URL: hyperelliptic.org

              Language: English - Date: 2017-10-22 12:24:16