Measuring "efficiency" in document prepration: Microsoft Word vs. LaTex

A discretization attack – Daniel J. Bernstein

An introduction to vectorization (2019)

BADA55 Crypto

PowerPC Compiler Writer's Guide (1996)

Why EdDSA held up better than ECDSA against Minerva

MinimaLT: Minimal-Latency Networking Through Better Security (2013)

Fast constant-time GCD algorithm and modular inversion

Does open-source cryptographic software work correctly?

An Introduction to Vectorization

Rebuilding target files when source files have changed

A plea for lean software

djbsort

A Plea For Lean Software

Gimli: a cross-platform permutation

Reconstructing ROCA

Boring crypto

The qmail security guarantee

NTRU Prime post-quantum cryptography and some amazing C code from DJB et al

Fast-key-erasure random-number generators

Does a free swap turn a stack into a traditional register set? (2005)

Qhasm: tools to help write high-speed software

DJB: Break a dozen secret keys, get a million more for free [2015]

Daniel J. Bernstein's Some thoughts on security after ten years of qmail 1.0 [pdf, from 2007]

Cryptography worst practices - Daniel J. Bernstein (2012)

D. J. Bernstein – False Statements by Henry de Valence

Security fraud in Europe's "Quantum Manifesto"

Failures in NIST's ECC Standards (Bernstein and Lange)

A plea for leaner software, written in 1995 and still relevant today.

Salsa20 design

More →