SPHINCS: practical stateless hash-based signatures DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ... Annual international conference on the theory and applications of …, 2015 | 493 | 2015 |
Classic McEliece: conservative code-based cryptography DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... Project documentation:[Электронный ресурс]. Режим доступа: https://classic …, 2017 | 339* | 2017 |
The SPHINCS+ Signature Framework DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 287 | 2019 |
On the practical exploitability of Dual EC in TLS implementations S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ... 23rd USENIX Security Symposium (USENIX Security 14), 319-335, 2014 | 194 | 2014 |
Dual EC: A standardized back door DJ Bernstein, T Lange, R Niederhagen The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His …, 2016 | 165 | 2016 |
New software speed records for cryptographic pairings M Naehrig, R Niederhagen, P Schwabe International Conference on Cryptology and Information Security in Latin …, 2010 | 147 | 2010 |
Fast exhaustive search for polynomial systems in F2 C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ... International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010 | 122 | 2010 |
How to Manipulate Curve Standards: A White Paper for the Black Hat DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ... International Conference on Research in Security Standardisation, 109-139, 2015 | 85 | 2015 |
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V. E Alkim, H Evkan, N Lahr, R Niederhagen, R Petri IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020 | 81 | 2020 |
FPGA-based Niederreiter cryptosystem using binary Goppa codes W Wang, J Szefer, R Niederhagen Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018 | 79 | 2018 |
Breaking ECC2K-130 DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... IACR Cryptol. ePrint Arch. 2009, 541, 2009 | 79 | 2009 |
SPHINCS+ DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, SL Gazdag, ... NIST submissions, 2017 | 70* | 2017 |
Xmss and embedded systems: Xmss hardware accelerators for risc-v W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen International Conference on Selected Areas in Cryptography, 523-550, 2019 | 64 | 2019 |
Post-quantum TLS on embedded systems: Integrating and evaluating Kyber and SPHINCS+ with mbed TLS K Bürstinghaus-Steinbach, C Krauß, R Niederhagen, M Schneider Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 57 | 2020 |
Solving quadratic equations with XL on parallel architectures CM Cheng, T Chou, R Niederhagen, BY Yang International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012 | 56* | 2012 |
FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes W Wang, J Szefer, R Niederhagen International Conference on Cryptographic Hardware and Embedded Systems, 253-274, 2017 | 47 | 2017 |
Polynomial multiplication in NTRU Prime: Comparison of optimization strategies on Cortex-M4 E Alkim, DYL Cheng, CMM Chung, H Evkan, LWL Huang, V Hwang, ... Cryptology ePrint Archive, 2020 | 44 | 2020 |
FSBday DJ Bernstein, T Lange, R Niederhagen, C Peters, P Schwabe International Conference on Cryptology in India, 18-38, 2009 | 43* | 2009 |
ECC2K-130 on Cell CPUs JW Bos, T Kleinjung, R Niederhagen, P Schwabe International Conference on Cryptology in Africa, 225-242, 2010 | 36 | 2010 |
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation N Lahr, R Niederhagen, R Petri, S Samardjiska International Conference on the Theory and Application of Cryptology and …, 2020 | 34 | 2020 |