| Post-quantum cryptography DJ Bernstein, T Lange Nature 549 (7671), 188-194, 2017 | 3294* | 2017 |
| Curve25519: new Diffie-Hellman speed records DJ Bernstein International workshop on public key cryptography, 207-228, 2006 | 1584 | 2006 |
| Cache-timing attacks on AES DJ Bernstein | 1217 | 2005 |
| High-speed high-security signatures DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang Journal of cryptographic engineering 2 (2), 77-89, 2012 | 1176 | 2012 |
| ChaCha, a variant of Salsa20 DJ Bernstein Workshop record of SASC 8 (1), 3-5, 2008 | 832 | 2008 |
| Faster addition and doubling on elliptic curves DJ Bernstein, T Lange international conference on the theory and application of cryptology and …, 2007 | 746 | 2007 |
| The Salsa20 family of stream ciphers DJ Bernstein New stream cipher designs: the eSTREAM finalists, 84-97, 2008 | 740 | 2008 |
| Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters International conference on cryptology in Africa, 389-405, 2008 | 719 | 2008 |
| SPHINCS: practical stateless hash-based signatures DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ... Annual international conference on the theory and applications of …, 2015 | 631 | 2015 |
| Attacking and defending the McEliece cryptosystem DJ Bernstein, T Lange, C Peters International Workshop on Post-Quantum Cryptography, 31-46, 2008 | 602 | 2008 |
| The Poly1305-AES message-authentication code DJ Bernstein International workshop on fast software encryption, 32-49, 2005 | 594 | 2005 |
| The SPHINCS+ Signature Framework DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 591 | 2019 |
| SipHash: a fast short-input PRF JP Aumasson, DJ Bernstein International Conference on Cryptology in India, 489-508, 2012 | 522 | 2012 |
| NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C Van Vredendaal International Conference on Selected Areas in Cryptography, 235-260, 2017 | 463 | 2017 |
| eBACS: ECRYPT benchmarking of cryptographic systems DJ Bernstein, T Lange | 405 | 2011 |
| The security impact of a new cryptographic library DJ Bernstein, T Lange, P Schwabe International Conference on Cryptology and Information Security in Latin …, 2012 | 378 | 2012 |
| On the security of {RC4} in {TLS} N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt 22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013 | 357 | 2013 |
| Grover vs. mceliece DJ Bernstein International Workshop on Post-Quantum Cryptography, 73-80, 2010 | 324 | 2010 |
| Cache-timing attacks on AES, 2005 DJ Bernstein | 318 | 2005 |
| Elligator: elliptic-curve points indistinguishable from uniform random strings DJ Bernstein, M Hamburg, A Krasnova, T Lange Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 294 | 2013 |