Cryptographic Implementations

Papers online, in reverse order by date.

2016.02.28, 35pp: Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro. "Hash-function based PRFs: AMAC and its multi-user security." Eurocrypt 2016, to appear.

2016.02.21, 14pp: Christine van Vredendaal. "Reduced memory meet-in-the-middle attack against the NTRU private key."

2016.01.06, 27pp: Daniel J. Bernstein, Tanja Lange. "Failures in NIST's ECC standards."

2015.10.12, 19pp: Daniel J. Bernstein. "Multi-user Schnorr security, revisited."

2015.09.27, 44pp: Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal. "How to manipulate curve standards: a white paper for the black hat." Pages 109–139 in Security standardisation research—second international conference, SSR 2015, Tokyo, Japan, December 15–16, 2015, proceedings, edited by Liqun Chen and Shin'ichiro Matsuo, Lecture Notes in Computer Science 9497, Springer, 2015. ISBN 978-3-319-27151-4.

2015.08.04, 28pp: Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange. "Twisted Hessian curves." Pages 1–26 in Progress in cryptology—LATINCRYPT 2015, 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015, proceedings, edited by Kristin Lauter, Francisco Rodríguez-Henríquez. Lecture Notes in Computer Science 9230, Springer, 2015. ISBN 978-3-319-22173-1.

2015.07.31, 25pp: Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen. "Dual EC: a standardized back door." To appear in The new codebreakers: essays dedicated to David Kahn on the occasion of his 85th birthday, edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater, Springer, 2016. ISBN 978-3-662-49301-4.

2015.07.29, 25pp: Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen. "Investigating SRAM PUFs in large CPUs and GPUs." Pages 228–247 in Security, privacy, and applied cryptography engineering—5th international conference, SPACE 2015, Jaipur, India, October 3–7, 2015, proceedings, edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon A. Solworth, Lecture Notes in Computer Science 9354, Springer, 2015. ISBN 978-3-319-24125-8.

2015.07.21, 32pp: Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner. "Semantic security and indistinguishability in the quantum world."

2015.07.04, 5pp: Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang. "EdDSA for more curves."

2015.07.03, 54pp: Andreas Hülsing, Denis Butin, Stefan-Lukas Gazdag, Aziz Mohaisen. "XMSS: Extended Hash-Based Signatures."

2015.06.15, 11pp: Moritz Horsch, Andreas Hülsing, Johannes Buchmann. "PALPAS: PAsswordLess PAssword Synchronization." Pages 30–39 in 10th international conference on availability, reliability and security, ARES 2015, Toulouse, France, August 24–27, 2015, IEEE, 2015. ISBN 978-1-4673-6590-1.

2015.06.03, 14pp: Tung Chou, Claudio Orlandi. "The simplest protocol for oblivious transfer." Progress in cryptology—LATINCRYPT 2015, 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015, proceedings, edited by Kristin Lauter, Francisco Rodríguez-Henríquez. Lecture Notes in Computer Science 9230, Springer, 2015. ISBN 978-3-319-22173-1.

2015.04.09, 12pp: Andreas Hülsing, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann. "Hash-based signatures: an outline for a new standard." NIST Workshop on Cybersecurity in a Post-Quantum World, 2015.

2015.03.08, 25pp: Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal. "Tighter, faster, simpler side-channel security evaluations beyond computing power."

2015.02.23, 27pp: Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen. "Bad directions in cryptographic hash functions." Pages 488–508 in Information security and privacy—20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29–July 1, 2015, proceedings, edited by Ernest Foo and Douglas Stebila, Lecture Notes in Computer Science 9144, Springer, 2015. ISBN 978-3-319-19961-0.

2015.02.02, 30pp: Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn. "SPHINCS: practical stateless hash-based signatures." Pages 368–397 in Advances in cryptology—EUROCRYPT 2015—34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015, proceedings, part I, edited by Elisabeth Oswald and Marc Fischlin, Lecture Notes in Computer Science 9056, Springer, 2015. ISBN 978-3-662-46799-2.

2014.11.09, 24pp: Daniel J. Bernstein, Tanja Lange. "Batch NFS." Pages 38–58 in Selected areas in cryptography—SAC 2014—21st international conference, Montreal, QC, Canada, August 14–15, 2014, revised selected papers, edited by Antoine Joux, Amr M. Youssef. Lecture Notes in Computer Science 8781, Springer, 2014. ISBN 978-3-319-13050-7.

2014.10.28, 34pp: Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe. "Kummer strikes back: new DH speed records." Pages 317–337 in Advances in cryptology—ASIACRYPT 2014—20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, December 7–11, 2014, proceedings, part 1, edited by Palash Sarkar, Tetsu Iwata. Lecture Notes in Computer Science 8873, Springer, 2014. ISBN 978-3-662-45610-1.

2014.09.18, 20pp: Daniel J. Bernstein, Tung Chou. "Faster binary-field multiplication and faster binary-field MACs." Pages 92–111 in Selected areas in cryptography—SAC 2014—21st international conference, Montreal, QC, Canada, August 14–15, 2014, revised selected papers, edited by Antoine Joux, Amr M. Youssef. Lecture Notes in Computer Science 8781, Springer, 2014. ISBN 978-3-319-13050-7.

2014.09.17, 16pp: Daniel J. Bernstein, Bernard van Gastel, Wesley Janssen, Tanja Lange, Peter Schwabe, Sjaak Smetsers. "TweetNaCl: a crypto library in 100 tweets." Pages 64–83 in Progress in cryptology—LATINCRYPT 2014—third international conference on cryptology and information security in Latin America, Florianopolis, Brazil, September 17–19, 2014, revised selected papers, edited by Diego F. Aranha and Alfred Menezes, Lecture Notes in Computer Science 8895, Springer, 2015. ISBN 978-3-319-16294-2.

2014.07.21, 15pp: Tanja Lange, Christine van Vredendaal, Marnix Wakker. "Kangaroos in side-channel attacks." Pages 104–121 in Smart card research and advanced applications—13th international conference, CARDIS 2014, Paris, France, November 5–7, 2014, revised selected papers, edited by Marc Joye and Amir Moradi, Lecture Notes in Computer Science 8968, Springer, 2015. ISBN 978-3-319-16762-6.

2014.07.06, 19pp: Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange. "Curve41417: Karatsuba revisited." Pages 316–334 in Cryptographic hardware and embedded systems—CHES 2014—16th international workshop, Busan, South Korea, September 23–26, 2014, proceedings, edited by Lejla Batina, Matthew Robshaw. Lecture Notes in Computer Science 8731, Springer, 2014. ISBN 978-3-662-44708-6.

2014.06.06, 17pp: Stephen Checkoway, Matt Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matt Green, Tanja Lange, Tom Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham. "On the practical exploitability of Dual EC in TLS implementations." Pages 319–335 in Proceedings of the 23rd USENIX Security Symposium, edited by Kevin Fu. USENIX Association, 2014.

2014.05.27, 21pp: Daniel J. Bernstein, Tanja Lange. "Hyper-and-elliptic-curve cryptography." LMS Journal of Computation and Mathematics 17 (2014), 181–202. Special journal issue for proceedings of Algorithmic number theory symposium.

2013.12.04, 18pp: Chitchanok Chuengsatiansup, Michael Naehrig, Pance Ribarski, Peter Schwabe. "PandA: Pairings and Arithmetic." Pages 229–250 in Pairing-based cryptography—Pairing 2013—6th international conference, Beijing, China, November 22–24, 2013, revised selected papers, edited by Zhenfu Cao and Fangguo Zhang, Lecture Notes in Computer Science 8365, Springer, 2014. ISBN 978-3-319-04872-7.

2013.10.31, 13pp: W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange. "MinimaLT: Minimal-latency networking through better security." Pages 425–438 in 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4–8, 2013, edited by Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, ACM, 2013. ISBN 978-1-4503-2477-9.

2013.09.16, 20pp: Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren. "Factoring RSA keys from certified smart cards: Coppersmith in the wild." Pages 341–360 in Advances in cryptology—ASIACRYPT 2013—19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013, proceedings, part II, edited by Kazue Sako and Palash Sarkar, Lecture Notes in Computer Science 8270, Springer, 2013. ISBN 978-3-642-42044-3.

2013.09.14, 53pp: Daniel J. Bernstein, Tanja Lange. "Non-uniform cracks in the concrete: the power of free precomputation." Short version: Pages 321–340 in Advances in cryptology—ASIACRYPT 2013—19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013, proceedings, part II, edited by Kazue Sako and Palash Sarkar, Lecture Notes in Computer Science 8270, Springer, 2013. ISBN 978-3-642-42044-3.

2013.08.28, 13pp: Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange. "Elligator: Elliptic-curve points indistinguishable from uniform random strings." Pages 967–980 in 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4–8, 2013, edited by Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, ACM, 2013. ISBN 978-1-4503-2477-9.

2013.07.08, 31pp: Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt. "On the security of RC4 in TLS and WPA." Short version: "On the security of RC4 in TLS"; pages 305–320 in Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14–16, 2013, edited by Samuel T. King, USENIX Association, 2013. ISBN 978-1-931971-03-4.

2013.06.16, 26pp: Daniel J. Bernstein, Tung Chou, Peter Schwabe. "McBits: fast constant-time code-based cryptography." Short version: Pages 250–272 in Cryptographic hardware and embedded systems—CHES 2013—15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013, proceedings, edited by Guido Bertoni and Jean-S\'ebastien Coron, Lecture Notes in Computer Science 8086, Springer, 2013. ISBN 978-3-642-40348-4.

2013.04.07, 18pp: Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer. "Quantum algorithms for the subset-sum problem." Pages 16–33 in Post-quantum cryptography—5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013, proceedings, edited by Philippe Gaborit, Lecture Notes in Computer Science 7932, Springer, 2013. ISBN 978-3-642-38615-2.

2012.09.19, 20pp: Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk. "Faster batch forgery identification." Pages 454–473 in Progress in cryptology—INDOCRYPT 2012, 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012, proceedings, edited by Steven D. Galbraith and Mridul Nandi, Lecture Notes in Computer Science 7668, Springer, 2012. ISBN 978-3-642-34930-0.

2012.09.19, 22pp: Daniel J. Bernstein, Tanja Lange. "Computing small discrete logarithms faster." Pages 317–338 in Progress in cryptology—INDOCRYPT 2012, 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012, proceedings, edited by Steven D. Galbraith and Mridul Nandi, Lecture Notes in Computer Science 7668, Springer, 2012. ISBN 978-3-642-34930-0.


Version: This is version 2016.03.15 of the Publications web page.