Zobrazeno 1 - 10
of 135
pro vyhledávání: '"Bernstein, Daniel J."'
Google's CECPQ1 experiment in 2016 integrated a post-quantum key-exchange algorithm, newhope1024, into TLS 1.2. The Google-Cloudflare CECPQ2 experiment in 2019 integrated a more efficient key-exchange algorithm, ntruhrss701, into TLS 1.3. This paper
Externí odkaz:
http://arxiv.org/abs/2106.08759
Recent research has revealed an ever-growing class of microarchitectural attacks that exploit speculative execution, a standard feature in modern processors. Proposed and deployed countermeasures involve a variety of compiler updates, firmware update
Externí odkaz:
http://arxiv.org/abs/2007.15919
Autor:
Bernstein, Daniel J.
It is often claimed that the security of quantum key distribution (QKD) is guaranteed by the laws of physics. However, this claim is content-free if the underlying theoretical definition of QKD is not actually compatible with the laws of physics. Thi
Externí odkaz:
http://arxiv.org/abs/1803.04520
Autor:
Bernstein, Daniel J.1,2,3 (AUTHOR) djb@cr.yp.to
Publikováno v:
Research in Number Theory. 11/10/2023, Vol. 9 Issue 4, p1-57. 57p.
Physically unclonable functions (PUFs) provide data that can be used for cryptographic purposes: on the one hand randomness for the initialization of random-number generators; on the other hand individual fingerprints for unique identification of spe
Externí odkaz:
http://arxiv.org/abs/1507.08514
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bernstein, Daniel J.
Publikováno v:
Mathematics of Computation, 2001 Jan 01. 70(233), 389-394.
Externí odkaz:
https://www.jstor.org/stable/2698942
Autor:
Bernstein, Daniel J.
Publikováno v:
Mathematics of Computation, 1998 Jul 01. 67(223), 1253-1283.
Externí odkaz:
https://www.jstor.org/stable/2585183
Publikováno v:
Mathematics of Computation, 2013 Apr 01. 82(282), 1139-1179.
Externí odkaz:
https://www.jstor.org/stable/42002690