Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters International Conference on Cryptology in Africa, 389-405, 2008 | 442 | 2008 |
Attacking and defending the McEliece cryptosystem DJ Bernstein, T Lange, C Peters International Workshop on Post-Quantum Cryptography, 31-46, 2008 | 387 | 2008 |
Smaller decoding exponents: ball-collision decoding DJ Bernstein, T Lange, C Peters Annual Cryptology Conference, 743-760, 2011 | 174 | 2011 |
Information-Set Decoding for Linear Codes over Fq C Peters International Workshop on Post-Quantum Cryptography, 81-94, 2010 | 149 | 2010 |
Wild mceliece DJ Bernstein, T Lange, C Peters International Workshop on Selected Areas in Cryptography, 143-158, 2010 | 85 | 2010 |
ECM using Edwards curves D Bernstein, P Birkner, T Lange, C Peters Mathematics of Computation 82 (282), 1139-1179, 2013 | 78 | 2013 |
Optimizing double-base elliptic-curve single-scalar multiplication DJ Bernstein, P Birkner, T Lange, C Peters International Conference on Cryptology in India, 167-182, 2007 | 59 | 2007 |
Classic McEliece: conservative code-based cryptography DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... NIST submissions, 2017 | 57 | 2017 |
Wild McEliece incognito DJ Bernstein, T Lange, C Peters International Workshop on Post-Quantum Cryptography, 244-254, 2011 | 44 | 2011 |
Structural weaknesses in the open smart grid protocol K Kursawe, C Peters 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 32 | 2015 |
FSBday DJ Bernstein, T Lange, R Niederhagen, C Peters | 31* | |
Really fast syndrome-based hashing DJ Bernstein, T Lange, C Peters, P Schwabe International Conference on Cryptology in Africa, 134-152, 2011 | 27 | 2011 |
Explicit bounds for generic decoding algorithms for code-based cryptography C Peters, DJ Bernstein, T Lange, H van Tilborg Proc. of the International Workshop on Coding and Cryptography, WCC, 68-180, 2009 | 27 | 2009 |
Curves, codes, and cryptography CP Peters | 17 | 2011 |
Faster 2-regular information-set decoding DJ Bernstein, T Lange, C Peters, P Schwabe International Conference on Coding and Cryptology, 81-98, 2011 | 15 | 2011 |
Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings K Srinathan, CP Rangan, M Yung Springer, 2007 | 7 | 2007 |
ECM using Edwards curves (2008) DJ Bernstein, P Birkner, T Lange, C Peters URL: http://eprint. iacr. org/2008/016. Cited in 2 (2.2), 2.2, 0 | 5 | |
Ball-collision decoding DJ Bernstein, T Lange, C Peters Cryptology ePrint Archive 2010, 2010 | 4 | 2010 |
Decoding algorithms C Peters Encyclopedia of Cryptography and Security, 2011 | 1 | 2011 |
SHA-2 will soon retire: The SHA-3 song M Naehrig, CP Peters, P Schwabe Journal of Craptology 7, 1-7, 2010 | 1 | 2010 |