| SPHINCS: practical stateless hash-based signatures DJ Bernstein, D Hopwood, A Hülsing, T Lange, R Niederhagen, ... Annual international conference on the theory and applications of …, 2015 | 632 | 2015 |
| The SPHINCS+ Signature Framework DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 591 | 2019 |
| Classic McEliece: conservative code-based cryptography DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... NIST submissions 1 (1), 1-25, 2017 | 510* | 2017 |
| On the practical exploitability of Dual EC in TLS implementations S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ... 23rd USENIX Security Symposium (USENIX Security 14), 319-335, 2014 | 207 | 2014 |
| Dual EC: A standardized back door DJ Bernstein, T Lange, R Niederhagen The new codebreakers: essays dedicated to David Kahn on the occasion of his …, 2016 | 195 | 2016 |
| New software speed records for cryptographic pairings M Naehrig, R Niederhagen, P Schwabe International Conference on Cryptology and Information Security in Latin …, 2010 | 157 | 2010 |
| Fast exhaustive search for polynomial systems in F2 C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ... International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010 | 142 | 2010 |
| SPHINCS+ DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, SL Gazdag, ... NIST submissions, 2017 | 123* | 2017 |
| ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V. E Alkim, H Evkan, N Lahr, R Niederhagen, R Petri IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020 | 120 | 2020 |
| Post-quantum TLS on embedded systems: Integrating and evaluating Kyber and SPHINCS+ with mbed TLS K Bürstinghaus-Steinbach, C Krauß, R Niederhagen, M Schneider Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 106 | 2020 |
| FPGA-based Niederreiter cryptosystem using binary Goppa codes W Wang, J Szefer, R Niederhagen International Conference on Post-Quantum Cryptography, 77-98, 2018 | 102 | 2018 |
| XMSS and embedded systems: XMSS hardware accelerators for RISC-V W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen International Conference on Selected Areas in Cryptography, 523-550, 2019 | 91 | 2019 |
| How to Manipulate Curve Standards: A White Paper for the Black Hat DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ... International Conference on Research in Security Standardisation, 109-139, 2015 | 89 | 2015 |
| Breaking ECC2K-130 DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... IACR Cryptol. ePrint Arch. 2009, 541, 2009 | 80 | 2009 |
| Take your MEDS: Digital signatures from matrix code equivalence T Chou, R Niederhagen, E Persichetti, TH Randrianarisoa, K Reijnders, ... Cryptology ePrint Archive, 2022 | 75 | 2022 |
| Solving quadratic equations with XL on parallel architectures CM Cheng, T Chou, R Niederhagen, BY Yang International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012 | 65 | 2012 |
| Polynomial multiplication in NTRU Prime: Comparison of optimization strategies on Cortex-M4 E Alkim, DYL Cheng, CMM Chung, H Evkan, LWL Huang, V Hwang, ... Cryptology ePrint Archive, 2020 | 61 | 2020 |
| FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes W Wang, J Szefer, R Niederhagen International Conference on Cryptographic Hardware and Embedded Systems, 253-274, 2017 | 59 | 2017 |
| Complete and improved FPGA implementation of classic McEliece PJ Chen, T Chou, S Deshpande, N Lahr, R Niederhagen, J Szefer, ... Cryptology ePrint Archive, 2022 | 48 | 2022 |
| Post-quantum secure boot VBY Kumar, N Gupta, A Chattopadhyay, M Kasper, C Krauß, ... 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020 | 45 | 2020 |