#3893 Overall Influence

American mathematician, cryptologist and programmer

Daniel Julius Bernstein is an American German mathematician, cryptologist, and computer scientist. He is visiting professor at CASA at Ruhr University Bochum, as well as a Research Professor of Computer Science at the University of Illinois at Chicago. Before this, he was a professor in the department of mathematics and computer science at the Eindhoven University of Technology

Source: Wikipedia- Curve25519: New Diffie-Hellman Speed Records
- Abnormal Regulation of the Sympathetic Nervous System in α2A-Adrenergic Receptor Knockout Mice
- High-speed high-security signatures
- Faster Addition and Doubling on Elliptic Curves
- Twisted Edwards Curves
- The Salsa20 Family of Stream Ciphers
- The Poly1305-AES Message-Authentication Code
- Attacking and Defending the McEliece Cryptosystem
- SPHINCS: Practical Stateless Hash-Based Signatures
- The Security Impact of a New Cryptographic Library
- Introduction to post-quantum cryptography
- Post-quantum cryptography
- Smaller Decoding Exponents: Ball-Collision Decoding
- High-Speed High-Security Signatures
- Elligator
- SipHash: A Fast Short-Input PRF
- NEON Crypto
- Grover vs. McEliece
- Binary Edwards Curves
- Batch Binary Edwards
- REINFORCEMENT AND SUBSTITUTION IN HUMANS: A MULTIPLE RESPONSE ANALYSIS1
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
- McBits: Fast Constant-Time Code-Based Cryptography
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- New AES Software Speed Records
- An Examination of the Equivalence between Non-Adaptive Computer-Based and Traditional Testing
- ECM on Graphics Cards
- Inverted Edwards Coordinates
- Kummer Strikes Back: New DH Speed Records
- Proving Tight Security for Rabin-Williams Signatures
- How to Stretch Random Functions: The Security of Protected Counter Sums
- NTRU Prime: Reducing Attack Surface at Low Cost
- Wild McEliece
- The Scholarship of Teaching and Learning
- Peer Review and Evaluation of the Intellectual Work of Teaching
- Non-uniform Cracks in the Concrete: The Power of Free Precomputation
- Gimli : A Cross-Platform Permutation
- Analysis and optimization of elliptic-curve single-scalar multiplication
- MOTIVATIONAL EFFECTS OF SMOKED MARIJUANA: BEHAVIORAL CONTINGENCIES AND LOW-PROBABILITY ACTIVITIES
- Factoring into coprimes in essentially linear time
- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
- Analysis of QUAD
- THE UTILITY OF VERBAL AND BEHAVIORAL ASSESSMENTS OF VALUE
- TRANSIENT EFFECTS OF ACQUISITION HISTORY ON GENERALIZATION IN A MATCHING-TO-SAMPLE TASK
- Motivational effects of smoked marijuana: Behavioral contingencies and high-probability recreational activities
- On the Correct Use of the Negation Map in the Pollard rho Method
- Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Quantum Algorithms for the Subset-Sum Problem
- A complete set of addition laws for incomplete Edwards curves
- Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies
- Never Trust a Bunny
- The 3x+ 1 Conjugacy Map
- Detecting perfect powers in essentially linear time
- Curve41417: Karatsuba Revisited
- Computing Small Discrete Logarithms Faster
- ECM using Edwards curves
- Some thoughts on security after ten years of qmail 1.0
- OF CARROTS AND STICKS: A REVIEW OF DECI AND RYAN'S INTRINSIC MOTIVATION AND SELF-DETERMINATION IN HUMAN BEHAVIOR1
- MinimaLT
- A general number field sieve implementation
- Twisted Hessian Curves
- An Examination of the Implementation of Peer Review of Teaching
- The SPHINCS + Signature Framework
- HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction
- Laboratory Lore and Research Practices in the Experimental Analysis of Human Behavior: Designing Session Logistics—How Long, How Often, How Many?
- Dual EC: A Standardized Back Door
- Wild McEliece Incognito
- Really Fast Syndrome-Based Hashing
- ECC2K-130 on NVIDIA GPUs
- Toward a scientist-educator model of teaching psychology.
- Application of the Premack Principle of Reinforcement to the Quality Performance of Service Employees
- Post-quantum RSA
- Type-II Optimal Polynomial Bases
- Modular exponentiation via the explicit Chinese remainder theorem
- Fast constant-time gcd computation and modular inversion
- Low-Communication Parallel Quantum Multi-Target Preimage Search
- TweetNaCl: A Crypto Library in 100 Tweets
- Proving primality in essentially quartic random time
- Post-Quantum Cryptography
- Principles for quality undergraduate education in psychology.
- A departmental system for balancing the development and evaluation of college teaching: A commentary on Cavanagh
- Montgomery Curves and the Montgomery Ladder
- List Decoding for Binary Goppa Codes
- FSBday
- Faster Batch Forgery Identification
- Faster 2-Regular Information-Set Decoding
- The Tangent FFT
- Detecting perfect powers by factoring into coprimes
- EXPRESSIONS OF MODERN RACISM IN JUDGMENTS OF OTHERS: THE ROLE OF TASK AND TARGET SPECIFICITY ON ATTRIBUTIONS OF GUILT
- THE EXPERIMENTAL ANALYSIS OF HUMAN BEHAVIOR
- Composing Power Series Over a Finite Ring in Essentially Linear Time
- Hyper-and-elliptic-curve cryptography
- Simplified High-Speed High-Distance List Decoding for Alternant Codes
- Starfish on Strike
- The computational complexity of rules for the character table of Sn
- Short Generators Without Quantum Computers: The Case of Multiquadratics
- Faster computation of isogenies of large prime degree
- Decisional Second-Preimage Resistance: When Does SPR Imply PRE?
- A Low-Resource Quantum Factoring Algorithm
- Promoting Teaching Excellence in Professional Education of Behavior Analysts
- Bad Directions in Cryptographic Hash Functions
- Faster Binary-Field Multiplication and Faster Binary-Field MACs
- Bounding smooth integers (extended abstract)
- How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to
- Batch NFS
- Contributions of behavior analysis to higher education.
- A Non-Iterative 2-Adic Statement of the 3N + 1 Conjecture
- Evaluating Scholarly Teaching
- Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations
- Sharper ABC-based bounds for congruent polynomials
- A noniterative $2$-adic statement of the $3N+1$ conjecture
- Reliability and Fairness of Grading in a Mastery Program
- Marijuana and behavioral contingencies
- MacMahon-type Identities for Signed Even Permutations
- 5: A MODEL FOR PUTTING A TEACHING CENTER IN CONTEXT
- A Volume in Honor of Kenneth MacCorquodale: A Review of Analysis and Integration of Behavioral Units
- Editorial
- Investigating SRAM PUFs in large CPUs and GPUs
- Establishment of a Laboratory for Continuous Observation of Human Behavior
- Euler–Mahonian polynomials for <mml:math altimg="si1.gif" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:msub><mml:mi>C</mml:mi><mml:mi>a</mml:mi></mml:msub><mml:mo>≀</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:math>
- CTIDH: faster constant-time CSIDH
- The Carbon Footprint of Residency Interviews
- Concrete quantum cryptanalysis of binary elliptic curves
- 5: A Model for Putting a Teaching Center in Context
- Now is a Good Time to Recognize Teaching as Serious Intellectual Work
- Further analysis of the impact of distancing upon the COVID-19 pandemic
- Justice in Plain Sight
- Excellent and Fair
- Editorial
- Out-of-hours special patient notes
- Creating an Optimal Portfolio to Fund Pension Liabilities
- Experimental Cyanotic Heart Disease in the Newborn Lamb
- Marijuana effects and behavioral contingencies.
- Faculty Resistance to Change
- Fast ideal arithmetic via lazy localization
- Factorization Circuits
- Internal events as behavior, not causes
- Overrepresentation of Neuronal Development Pathways in Heart Failure Patients Who Dramatically Responded to Pharmaceutical Therapy
- 319 CHRONIC HYPOXEMIA IN THE NEWBORN LAMB
- The Scholarship of Teaching and Learning in Higher Education: Contributions of Research Universities (review)
- A combinatorial proof of a bibasic trigonometric identity

Eindhoven University of Technology

University

University of California, Berkeley

Public research university in Berkeley, California, United States

University of Kansas

Public research university in Kansas, United States

University of Nebraska–Lincoln

Public university in Lincoln, Nebraska, United States

University of Illinois Chicago

Public University

#226 World Rank

Computer Science

#2259 World Rank

Mathematics

Want to be an Academic Influence Insider?

Sign up to get the latest news, information, and rankings in our upcoming newsletter.