Does a free swap turn a stack into a traditional register set? (2005)

Qhasm: tools to help write high-speed software

DJB: Break a dozen secret keys, get a million more for free [2015]

Daniel J. Bernstein's Some thoughts on security after ten years of qmail 1.0 [pdf, from 2007]

Cryptography worst practices - Daniel J. Bernstein (2012)

D. J. Bernstein – False Statements by Henry de Valence

Security fraud in Europe's "Quantum Manifesto"

Failures in NIST's ECC Standards (Bernstein and Lange)

A plea for leaner software, written in 1995 and still relevant today.

Salsa20 design

cr.yp.to: The death of due process

Security Fraud in Europe's “Quantum Manifesto”

Some thoughts on security after ten years of qmail 1.0 (2007)

Thomas Jefferson and Apple versus the FBI

DJB: Is the security of quantum cryptography guaranteed by the laws of physics?

The first 10 years of Curve25519

Placing documents into the public domain

Failures in NIST’s ECC standards

Break a dozen secret keys, get a million more for free

Entropy Attacks (2014)

How to manipulate curve standards: a white paper for the black hat

DJB: Boring Crypto

Brainpool curves

Understanding Brute Force (2005)

Snake Oil Crypto Competition

The IPv6 mess (2003)

Unix Client-Server Program Interface (1996)

Calculus for mathematicians (1997)

The death of optimizing compilers [pdf]

Some thoughts on security after ten years of qmail 1.0 (2007) [pdf]

More →