Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 643 | 2008 |
Attacking and defending the McEliece cryptosystem DJ Bernstein, T Lange, C Peters Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 528 | 2008 |
Classic McEliece: conservative code-based cryptography MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ... | 293* | 2022 |
Smaller decoding exponents: ball-collision decoding DJ Bernstein, T Lange, C Peters Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 268 | 2011 |
Information-Set Decoding for Linear Codes over F q C Peters Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010 …, 2010 | 216 | 2010 |
Wild mceliece DJ Bernstein, T Lange, C Peters International Workshop on Selected Areas in Cryptography, 143-158, 2010 | 112 | 2010 |
ECM using Edwards curves D Bernstein, P Birkner, T Lange, C Peters Mathematics of Computation 82 (282), 1139-1179, 2013 | 97 | 2013 |
Optimizing double-base elliptic-curve single-scalar multiplication DJ Bernstein, P Birkner, T Lange, C Peters Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007 | 67 | 2007 |
Wild mceliece incognito DJ Bernstein, T Lange, C Peters Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei …, 2011 | 48 | 2011 |
FSBday DJ Bernstein, T Lange, R Niederhagen, C Peters | 43* | |
Explicit bounds for generic decoding algorithms for code-based cryptography C Peters, DJ Bernstein, T Lange, H van Tilborg Proc. of the International Workshop on Coding and Cryptography, WCC, 68-180, 2009 | 38 | 2009 |
Classic mceliece DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... | 37 | 2017 |
Really fast syndrome-based hashing DJ Bernstein, T Lange, C Peters, P Schwabe Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on …, 2011 | 35 | 2011 |
Structural weaknesses in the open smart grid protocol K Kursawe, C Peters 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 34 | 2015 |
Curves, codes, and cryptography CP Peters | 22 | 2011 |
Faster 2-regular information-set decoding DJ Bernstein, T Lange, C Peters, P Schwabe Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao …, 2011 | 20 | 2011 |
Information-set decoding for linear codes over Fq C Peters Cryptology ePrint Archive, 2009 | 7 | 2009 |
ECM using Edwards curves (2008) DJ Bernstein, P Birkner, T Lange, C Peters URL: http://eprint. iacr. org/2008/016. Cited in 2 (2.2), 2.2, 0 | 5 | |
Classic McEliece: conservative code-based cryptography—Round 2 DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... Tech. rep. Mar. 2019. url: https://classic. mceliece. org/nist/mceliece …, 2019 | 2 | 2019 |
Decoding algorithms C Peters Encyclopedia of Cryptography and Security, 2011 | 1 | 2011 |