Knowledge

Daniel J. Bernstein

Source πŸ“

38: 547:, and wrote djbdns as a DNS package with security as a primary goal. Bernstein offers "security guarantees" for qmail and djbdns in the form of monetary rewards for the identification of flaws. A purported exploit targeting qmail running on 643:: a proposal," which suggested that, if physical hardware implementations could be brought close to their theoretical efficiency, the then-popular estimates of adequate security parameters might be off by a factor of three. Since 512-bit 551:
was published in 2005, but Bernstein believes that the exploit does not fall within the parameters of his qmail security guarantee. In March 2009, Bernstein awarded $ 1000 to Matthew Dempsky for finding a security flaw in
1887: 1975: 659:, Jim Tomlinson, and Eran Tromer) disagreed strongly with Bernstein's conclusions. Bernstein has received funding to investigate whether this potential can be realized. 1955: 1920: 647:
was breakable at the time, so might be 1536-bit RSA. Bernstein was careful not to make any actual predictions, and emphasized the importance of correctly interpreting
733:
In April 2017, Bernstein and others published a paper on Post-Quantum RSA that includes an integer factorization algorithm claimed to be "often much faster than
726:
called SPHINCS. In July 2022, SPHINCS+, a signature scheme adapted from SPHINCS by Bernstein and others, was one of four algorithms selected as winners of the
1884: 398: 1103: 1940: 1764: 322: 330: 1965: 727: 414: 268: 1325: 1985: 1950: 1945: 1300: 300: 1970: 1602: 1935: 1512: 1485: 1450: 1078: 1960: 1399: 890: 1576: 325:, which contributed to regulatory changes reducing controls on encryption. Bernstein was originally represented by the 280: 264: 244: 160: 86: 311:
until recategorization in 1996, with further relaxation in the late 1990s. In 1995, Bernstein brought the court case
240: 156: 20: 1783: 599: 1980: 996: 1879: 864: 1930: 1193: 770: 413:
algorithm. These events raised suspicions of the elliptic curve parameters proposed by NSA and standardized by
326: 1398:; Carlos Cid; Henri Gilbert; Thomas Johansson; Matthew Parker; Bart Preneel; Vincent Rijmen; Matthew Robshaw. 1900: 1149: 971: 791: 591: 436:, which is widely used for Internet security. Many protocols based on his works have been adopted by various 1839: 579:. It uses the existing DNS hierarchy to propagate trust by embedding public keys into specially formatted, 468: 1650: 785: 709: 568: 429: 357: 243:. Before this, he was a visiting professor in the department of mathematics and computer science at the 1687: 313: 292: 1554: 754: 750: 720: 606: 1735: 494: 433: 402: 61: 1218: 723: 457: 364: 1925: 944: 917: 670: 580: 437: 232: 164: 1502: 1475: 1275: 753:
in published software. The 25 students discovered 44 vulnerabilities, and the class published
1237: 701: 690: 640: 1628: 1915: 746: 667: 595: 464: 406: 272: 256: 512:
Starting in the mid-1990s, Bernstein wrote a number of security-aware programs, including
463:
In spring 2005, Bernstein taught a course on "high speed cryptography." He introduced new
8: 1053: 734: 663: 648: 276: 90: 1373: 1217:
A. Langley; W. Chang; N. Mavrogiannopoulos; J. Strombergson; S. Josefsson (2015-12-16).
1456: 952: 925: 587: 564: 540: 236: 228: 224: 1606: 1393: 1508: 1481: 1446: 1216: 1029: 388: 375:. The algorithms made their way into popular software. For example, since 2014, when 146: 1460: 441: 1438: 682: 548: 318: 171: 1733: 1891: 1529: 1432: 947:; L. C. Larson (Oct 1989). "The William Lowell Putnam Mathematical Competition". 920:; L. C. Larson (Oct 1988). "The William Lowell Putnam Mathematical Competition". 780: 644: 572: 284: 176: 1406: 1223: 686: 613: 487: 395: 1442: 590:, an alternative system for electronic mail, which he intended to replace the 1909: 1807: 1395: 1033: 1021: 942: 915: 652: 475: 418: 345: 263:, graduating in 1987 at the age of 15. The same year, he ranked fifth in the 216: 1896: 1782:
Computer Security Division, Information Technology Laboratory (2017-01-03).
1580: 1194:"The NSA Is Breaking Most Encryption on the Internet - Schneier on Security" 694: 678: 410: 220: 141: 1716: 1104:"OpenBSD Moving Towards Signed Packages β€” Based On D. J. Bernstein Crypto" 417:. Many researchers feared that the NSA had chosen curves that gave them a 1169: 629: 625: 529: 260: 137: 1673: 719:
In February 2015, Bernstein and others published a paper on a stateless
956: 929: 730:
competition. It was the only hash-based algorithm of the four winners.
705: 656: 360: 120: 16:
American mathematician, cryptologist and computer scientist (born 1971)
1765:"NIST Announces First Four Quantum-Resistant Cryptographic Algorithms" 815: 1431:
Bernstein, Daniel J.; Buchmann, Johannes; Dahmen, Erik, eds. (2009).
633: 525: 445: 72: 37: 1784:"Selected Algorithms 2022 - Post-Quantum Cryptography | CSRC | CSRC" 1301:"OpenSSH Has a New Cipher β€” Chacha20-poly1305 β€” from D.J. Bernstein" 1219:"ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)" 843: 1304: 1250: 1107: 1082: 766: 571:
with the goal of providing a vast increase in performance over the
560: 426: 353: 308: 304: 116: 112: 1129:"SafeCurves: choosing safe curves for elliptic-curve cryptography" 267:. In 1987 (at the age of 16), he achieved a Top 10 ranking in the 1734:
Arjen K. Lenstra; Adi Shamir; Jim Tomlinson; Eran Tromer (2002).
1347: 1323: 997:"EFF at 25: Remembering the Case that Established Code as Speech" 775: 483: 479: 453: 384: 380: 376: 368: 349: 342: 108: 76: 352:
for review and possible standardization. He later published the
275:
the following year. Bernstein earned a B.A. in mathematics from
1874: 1642: 1128: 576: 553: 521: 422: 104: 713: 517: 513: 449: 372: 100: 1867: 1752: 1701: 191: 1299:
Murenin, Constantine A. (2013-12-11). Unknown Lamer (ed.).
1280:
Super User's BSD Cross Reference: PROTOCOL.chacha20poly1305
693:). Both have been used effectively in the search for large 544: 1781: 1603:"djbdns<=1.05 lets AXFRed subdomains overwrite domains" 482:" was selected as a member of the final portfolio of the 1976:
Academic staff of the Eindhoven University of Technology
1577:"My Take on Georgi Guninski's qmail Security Advisories" 1430: 1102:
Murenin, Constantine A. (2014-01-19). Soulskill (ed.).
1077:
Murenin, Constantine A. (2014-04-30). Soulskill (ed.).
651:
expressions. Several prominent researchers (among them
781:
NaCl (Software), a Networking and Cryptography library
493:
In 2011, Bernstein published RFSB, a variant of the
317:. The ruling in the case declared that software was 1714: 1600: 1371: 356:variant of Salsa in 2008. In 2005, he proposed the 1885:Faculty page at Eindhoven University of Technology 1574: 367:schemes. He worked as the lead researcher on the 1956:UC Berkeley College of Letters and Science alumni 1921:Courant Institute of Mathematical Sciences alumni 1150:"[tor-talk] NIST approved crypto in Tor?" 1127:Bernstein, Daniel J.; Lange, Tanja (2017-01-22). 662:Bernstein is also the author of the mathematical 271:, and was a member of the second-place team from 1907: 1840:"Students uncover dozens of Unix software flaws" 1717:"Circuits for integer factorization: a proposal" 1210: 1736:"Analysis of Bernstein's Factorization Circuit" 1626: 1552: 1348:"MCS 590, High-Speed Cryptography, Spring 2005" 1345: 1054:"Plaintiff's Notice Of Substitution of Counsel" 19:For the American businessman and activist, see 1688:"Hash function constants selection discussion" 1126: 951:. Vol. 96, no. 8. pp. 688–695. 924:. Vol. 95, no. 8. pp. 717–727. 728:NIST Post-Quantum Cryptography Standardization 712:; it is employed in Ed25519 implementation of 624:Bernstein has published a number of papers on 269:William Lowell Putnam Mathematical Competition 1555:"Georgi Guninski security advisory #74, 2005" 301:export of cryptography from the United States 290: 1480:. "O'Reilly Media, Inc.". pp. 172–173. 1248: 1079:"OpenSSH No Longer Has To Depend On OpenSSL" 639:In 2001, Bernstein circulated "Circuits for 1880:Daniel Bernstein on the Faculty Page at UIC 749:where he assigned each student to find ten 279:(1991) and a Ph.D. in mathematics from the 994: 972:"Crypto Law Survey - Overview per country" 500:He is one of the editors of the 2009 book 36: 700:In 2007, Bernstein proposed the use of a 425:selected ChaCha20 along with Bernstein's 1941:American people of German-Jewish descent 891:"TWO GIRLS WIN WESTINGHOUSE COMPETITION" 215:; born October 29, 1971) is an American 1394:Steve Babbage; Christophe De Canniere; 1324:Roger Dingledine & Nick Mathewson. 1298: 1147: 1101: 1076: 1019: 383:they power most of its operations, and 1966:University of Illinois Chicago faculty 1908: 1507:. John Wiley & Sons. p. 769. 1437:. Berlin Heidelberg: Springer-Verlag. 1326:"Tor's Protocol Specifications - Blog" 1273: 1148:Maxwell, Gregory (September 8, 2013). 745:In 2004, Bernstein taught a course on 1837: 1833: 1831: 1500: 1473: 969: 813: 677:, an asymptotically fast small prime 1986:People from East Patchogue, New York 1951:21st-century American mathematicians 1946:20th-century American mathematicians 1653:from the original on 25 January 2023 1530:"Lighten Your DNS Load with TinyDNS" 809: 807: 559:In August 2008, Bernstein announced 1971:American computer science educators 567:. DNSCurve applies techniques from 13: 1828: 1715:Daniel J. Bernstein (2001-11-09). 1601:Daniel J. Bernstein (2009-03-04). 1527: 1372:Daniel J. Bernstein (2004-04-17). 281:University of California, Berkeley 265:Westinghouse Science Talent Search 245:Eindhoven University of Technology 161:Eindhoven University of Technology 87:University of California, Berkeley 14: 1997: 1859: 1671: 1575:James Craig Burley (2005-05-31). 1501:Hagen, William von (2007-03-26). 995:Dame-Boyle, Alison (2015-04-16). 949:The American Mathematical Monthly 922:The American Mathematical Monthly 804: 539:Bernstein criticized the leading 442:used in a variety of applications 241:University of Illinois at Chicago 157:University of Illinois at Chicago 21:Daniel J. Bernstein (businessman) 970:Koops, Bert-Jaap (August 2004). 769:, Bernstein's submission to the 605:Bernstein is also known for his 600:Internet Message Access Protocol 1800: 1775: 1757: 1746: 1727: 1708: 1694: 1680: 1665: 1635: 1620: 1594: 1568: 1546: 1521: 1494: 1467: 1424: 1387: 1365: 1339: 1317: 1292: 1276:"ssh/PROTOCOL.chacha20poly1305" 1267: 1242: 1231: 1186: 1162: 1141: 1120: 1095: 1070: 1046: 632:. Many of his papers deal with 405:, and researchers discovered a 336: 283:(1995), where he studied under 1553:Georgi Guninski (2005-05-31). 1013: 1001:Electronic Frontier Foundation 988: 963: 936: 909: 883: 865:"New Yorkers Excel In Contest" 857: 836: 771:NIST hash function competition 619: 327:Electronic Frontier Foundation 1: 1936:American computer programmers 1901:Mathematics Genealogy Project 1374:"Cache timing attacks on AES" 1352:Authenticators and signatures 1274:Miller, Damien (2016-05-03). 1020:Cassidy, Peter (1996-06-01). 798: 792:Quick Mail Transport Protocol 592:Simple Mail Transfer Protocol 575:public-key algorithm used by 250: 1838:Lemos, Robert (2004-12-16). 689:(rather than the more usual 348:in 2005 and submitted it to 7: 1961:Computer security academics 786:Quick Mail Queuing Protocol 760: 740: 724:hash-based signature scheme 710:elliptic curve cryptography 569:elliptic curve cryptography 563:, a proposal to secure the 507: 474:In April 2008, Bernstein's 467:against implementations of 430:message authentication code 399:disclosed mass surveillance 239:of Computer Science at the 10: 2002: 1474:Bauer, Michael D. (2005). 747:computer software security 314:Bernstein v. United States 293:Bernstein v. United States 259:, a public high school on 18: 1753:https://sphincs.cr.yp.to/ 1629:"High-speed cryptography" 1443:10.1007/978-3-540-88702-7 1434:Post-Quantum Cryptography 502:Post-Quantum Cryptography 471:in the same time period. 186: 182: 170: 152: 133: 126: 96: 82: 68: 44: 35: 28: 1251:"Replacing /dev/urandom" 976:Bert-Jaap Koops homepage 495:Fast Syndrome Based Hash 403:National Security Agency 62:East Patchogue, New York 1674:"String hash functions" 1400:"The eSTREAM Portfolio" 702:(twisted) Edwards curve 607:string hashing function 438:standards organizations 394:Nearly a decade later, 341:Bernstein designed the 209:Daniel Julius Bernstein 1981:Open content activists 1170:"SafeCurves: Rigidity" 233:Ruhr University Bochum 165:Ruhr University Bochum 1931:Modern cryptographers 1627:Daniel J. Bernstein. 1477:Linux Server Security 1346:Daniel J. Bernstein. 814:Bernstein, Daniel J. 691:sieve of Eratosthenes 641:integer factorization 543:package at the time, 391:is based on Ed25519. 1643:"Internet Mail 2000" 636:or implementations. 596:Post Office Protocol 490:research directive. 379:is compiled without 303:was controlled as a 273:Princeton University 257:Bellport High School 211:(sometimes known as 1897:Daniel J. Bernstein 1174:safecurves.cr.yp.to 755:security advisories 586:Bernstein proposed 581:backward-compatible 486:project, part of a 331:represented himself 277:New York University 255:Bernstein attended 91:New York University 30:Daniel J. Bernstein 1890:2016-11-23 at the 1808:"Post-quantam RSA" 1742:. LNCS 2501: 1–26. 1504:Ubuntu Linux Bible 1412:on August 13, 2012 1249:Corbet, Jonathan. 1238:iOS Security Guide 945:G. L. Alexanderson 918:G. L. Alexanderson 816:"Curriculum vitae" 757:about the issues. 616:database library. 588:Internet Mail 2000 565:Domain Name System 307:starting from the 237:research professor 229:visiting professor 225:computer scientist 1514:978-0-470-12454-3 1487:978-0-596-00670-9 1452:978-3-540-88701-0 1255:Linux Weekly News 943:L. F. Klosinski; 916:L. F. Klosinski; 708:, as a basis for 206: 205: 147:Computer Security 128:Scientific career 1993: 1871: 1870: 1868:Official website 1854: 1853: 1851: 1850: 1835: 1826: 1825: 1823: 1821: 1812: 1804: 1798: 1797: 1795: 1794: 1779: 1773: 1772: 1761: 1755: 1750: 1744: 1743: 1731: 1725: 1724: 1712: 1706: 1705: 1698: 1692: 1691: 1684: 1678: 1677: 1669: 1663: 1662: 1660: 1658: 1639: 1633: 1632: 1624: 1618: 1617: 1615: 1614: 1605:. Archived from 1598: 1592: 1591: 1589: 1588: 1579:. Archived from 1572: 1566: 1565: 1563: 1561: 1550: 1544: 1543: 1541: 1540: 1525: 1519: 1518: 1498: 1492: 1491: 1471: 1465: 1464: 1428: 1422: 1421: 1419: 1417: 1411: 1405:. Archived from 1404: 1391: 1385: 1384: 1378: 1369: 1363: 1362: 1360: 1358: 1343: 1337: 1336: 1334: 1332: 1321: 1315: 1314: 1312: 1311: 1296: 1290: 1289: 1287: 1286: 1271: 1265: 1264: 1262: 1261: 1246: 1240: 1235: 1229: 1228: 1214: 1208: 1207: 1205: 1204: 1198:www.schneier.com 1190: 1184: 1183: 1181: 1180: 1166: 1160: 1159: 1157: 1156: 1145: 1139: 1138: 1136: 1135: 1124: 1118: 1117: 1115: 1114: 1099: 1093: 1092: 1090: 1089: 1074: 1068: 1067: 1065: 1064: 1058: 1050: 1044: 1043: 1041: 1040: 1022:"Reluctant Hero" 1017: 1011: 1010: 1008: 1007: 992: 986: 985: 983: 982: 967: 961: 960: 940: 934: 933: 913: 907: 906: 904: 902: 887: 881: 880: 878: 876: 861: 855: 854: 852: 850: 840: 834: 833: 831: 829: 820: 811: 683:memory footprint 676: 549:64-bit platforms 535: 409:in the Agency's 319:protected speech 202: 199: 197: 195: 193: 172:Doctoral advisor 58: 55:October 29, 1971 54: 52: 40: 26: 25: 2001: 2000: 1996: 1995: 1994: 1992: 1991: 1990: 1906: 1905: 1892:Wayback Machine 1866: 1865: 1862: 1857: 1848: 1846: 1836: 1829: 1819: 1817: 1810: 1806: 1805: 1801: 1792: 1790: 1780: 1776: 1763: 1762: 1758: 1751: 1747: 1740:Proc. Asiacrypt 1732: 1728: 1713: 1709: 1700: 1699: 1695: 1686: 1685: 1681: 1670: 1666: 1656: 1654: 1641: 1640: 1636: 1625: 1621: 1612: 1610: 1599: 1595: 1586: 1584: 1573: 1569: 1559: 1557: 1551: 1547: 1538: 1536: 1528:Binnie, Chris. 1526: 1522: 1515: 1499: 1495: 1488: 1472: 1468: 1453: 1429: 1425: 1415: 1413: 1409: 1402: 1392: 1388: 1376: 1370: 1366: 1356: 1354: 1344: 1340: 1330: 1328: 1322: 1318: 1309: 1307: 1297: 1293: 1284: 1282: 1272: 1268: 1259: 1257: 1247: 1243: 1236: 1232: 1215: 1211: 1202: 1200: 1192: 1191: 1187: 1178: 1176: 1168: 1167: 1163: 1154: 1152: 1146: 1142: 1133: 1131: 1125: 1121: 1112: 1110: 1100: 1096: 1087: 1085: 1075: 1071: 1062: 1060: 1056: 1052: 1051: 1047: 1038: 1036: 1018: 1014: 1005: 1003: 993: 989: 980: 978: 968: 964: 941: 937: 914: 910: 900: 898: 889: 888: 884: 874: 872: 863: 862: 858: 848: 846: 842: 841: 837: 827: 825: 818: 812: 805: 801: 763: 751:vulnerabilities 743: 674: 666:DJBFFT, a fast 622: 598:(POP3) and the 533: 510: 363:as a basis for 339: 323:First Amendment 297: 285:Hendrik Lenstra 253: 235:, as well as a 190: 177:Hendrik Lenstra 145: 89: 83:Alma mater 64: 59: 56: 50: 48: 31: 24: 17: 12: 11: 5: 1999: 1989: 1988: 1983: 1978: 1973: 1968: 1963: 1958: 1953: 1948: 1943: 1938: 1933: 1928: 1923: 1918: 1904: 1903: 1894: 1882: 1877: 1872: 1861: 1860:External links 1858: 1856: 1855: 1827: 1799: 1774: 1756: 1745: 1726: 1707: 1693: 1679: 1664: 1634: 1619: 1593: 1567: 1545: 1534:ADMIN Magazine 1520: 1513: 1493: 1486: 1466: 1451: 1423: 1386: 1364: 1338: 1316: 1291: 1266: 1241: 1230: 1224:Internet Draft 1209: 1185: 1161: 1140: 1119: 1094: 1069: 1045: 1012: 987: 962: 935: 908: 895:New York Times 882: 869:New York Times 856: 835: 802: 800: 797: 796: 795: 789: 783: 778: 773: 762: 759: 742: 739: 687:sieve of Atkin 621: 618: 509: 506: 488:European Union 396:Edward Snowden 358:elliptic curve 338: 335: 296: 289: 252: 249: 204: 203: 188: 184: 183: 180: 179: 174: 168: 167: 154: 150: 149: 135: 131: 130: 124: 123: 98: 97:Known for 94: 93: 84: 80: 79: 70: 66: 65: 60: 46: 42: 41: 33: 32: 29: 15: 9: 6: 4: 3: 2: 1998: 1987: 1984: 1982: 1979: 1977: 1974: 1972: 1969: 1967: 1964: 1962: 1959: 1957: 1954: 1952: 1949: 1947: 1944: 1942: 1939: 1937: 1934: 1932: 1929: 1927: 1926:Living people 1924: 1922: 1919: 1917: 1914: 1913: 1911: 1902: 1898: 1895: 1893: 1889: 1886: 1883: 1881: 1878: 1876: 1873: 1869: 1864: 1863: 1845: 1841: 1834: 1832: 1816: 1809: 1803: 1789: 1785: 1778: 1771:. 2022-07-05. 1770: 1766: 1760: 1754: 1749: 1741: 1737: 1730: 1722: 1718: 1711: 1703: 1697: 1689: 1683: 1675: 1672:Yigit, Ozan. 1668: 1652: 1648: 1644: 1638: 1630: 1623: 1609:on 2009-03-05 1608: 1604: 1597: 1583:on 2007-08-25 1582: 1578: 1571: 1560:September 23, 1556: 1549: 1535: 1531: 1524: 1516: 1510: 1506: 1505: 1497: 1489: 1483: 1479: 1478: 1470: 1462: 1458: 1454: 1448: 1444: 1440: 1436: 1435: 1427: 1408: 1401: 1397: 1396:Anne Canteaut 1390: 1382: 1375: 1368: 1357:September 23, 1353: 1349: 1342: 1327: 1320: 1306: 1302: 1295: 1281: 1277: 1270: 1256: 1252: 1245: 1239: 1234: 1226: 1225: 1220: 1213: 1199: 1195: 1189: 1175: 1171: 1165: 1151: 1144: 1130: 1123: 1109: 1105: 1098: 1084: 1080: 1073: 1055: 1049: 1035: 1031: 1027: 1023: 1016: 1002: 998: 991: 977: 973: 966: 958: 954: 950: 946: 939: 931: 927: 923: 919: 912: 896: 892: 886: 870: 866: 860: 845: 839: 824: 817: 810: 808: 803: 793: 790: 787: 784: 782: 779: 777: 774: 772: 768: 765: 764: 758: 756: 752: 748: 738: 736: 731: 729: 725: 722: 717: 715: 711: 707: 703: 698: 696: 695:prime numbers 692: 688: 685:based on the 684: 680: 673:library, and 672: 669: 665: 660: 658: 654: 653:Arjen Lenstra 650: 646: 642: 637: 635: 631: 627: 617: 615: 611: 608: 603: 601: 597: 593: 589: 584: 583:DNS records. 582: 578: 574: 570: 566: 562: 557: 555: 550: 546: 542: 537: 531: 527: 523: 519: 515: 505: 503: 498: 496: 491: 489: 485: 481: 477: 476:stream cipher 472: 470: 466: 465:cache attacks 461: 459: 455: 451: 447: 443: 439: 435: 431: 428: 424: 420: 419:cryptanalytic 416: 412: 408: 404: 400: 397: 392: 390: 386: 382: 378: 374: 370: 366: 362: 359: 355: 351: 347: 346:stream cipher 344: 334: 332: 328: 324: 320: 316: 315: 310: 306: 302: 295: 294: 288: 286: 282: 278: 274: 270: 266: 262: 258: 248: 246: 242: 238: 234: 230: 226: 222: 218: 217:mathematician 214: 210: 201: 189: 185: 181: 178: 175: 173: 169: 166: 162: 158: 155: 151: 148: 143: 139: 136: 132: 129: 125: 122: 118: 114: 110: 106: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: 67: 63: 57:(age 52) 47: 43: 39: 34: 27: 22: 1847:. Retrieved 1843: 1818:. Retrieved 1814: 1802: 1791:. Retrieved 1787: 1777: 1768: 1759: 1748: 1739: 1729: 1720: 1710: 1696: 1682: 1667: 1655:. Retrieved 1646: 1637: 1622: 1611:. Retrieved 1607:the original 1596: 1585:. Retrieved 1581:the original 1570: 1558:. Retrieved 1548: 1537:. Retrieved 1533: 1523: 1503: 1496: 1476: 1469: 1433: 1426: 1414:. Retrieved 1407:the original 1389: 1380: 1367: 1355:. Retrieved 1351: 1341: 1329:. Retrieved 1319: 1308:. Retrieved 1294: 1283:. Retrieved 1279: 1269: 1258:. Retrieved 1254: 1244: 1233: 1222: 1212: 1201:. Retrieved 1197: 1188: 1177:. Retrieved 1173: 1164: 1153:. Retrieved 1143: 1132:. Retrieved 1122: 1111:. Retrieved 1097: 1086:. Retrieved 1072: 1061:. Retrieved 1059:. 2002-10-07 1048: 1037:. Retrieved 1025: 1015: 1004:. Retrieved 1000: 990: 979:. Retrieved 975: 965: 948: 938: 921: 911: 899:. Retrieved 897:. 1987-01-21 894: 885: 873:. Retrieved 871:. 1987-01-21 868: 859: 847:. Retrieved 838: 826:. Retrieved 822: 744: 732: 721:post-quantum 718: 699: 661: 638: 623: 609: 604: 594:(SMTP), the 585: 558: 538: 511: 501: 499: 492: 473: 462: 411:Dual EC DRBG 393: 340: 337:Cryptography 312: 298: 291: 254: 221:cryptologist 212: 208: 207: 153:Institutions 142:Cryptography 127: 1916:1971 births 1788:CSRC | NIST 1331:20 December 875:November 9, 849:22 February 844:"Team CASA" 630:computation 626:mathematics 620:Mathematics 530:daemontools 432:for use in 421:advantage. 371:version of 329:. He later 261:Long Island 231:at CASA at 138:Mathematics 69:Citizenship 1910:Categories 1849:2019-03-21 1793:2024-03-27 1613:2009-03-04 1587:2007-08-24 1539:2019-03-21 1310:2016-09-07 1285:2016-09-07 1260:2016-09-20 1203:2015-05-20 1179:2015-05-20 1155:2015-05-20 1134:2019-03-20 1113:2014-12-27 1088:2014-12-26 1063:2019-03-20 1039:2019-03-21 1006:2019-03-21 981:2019-03-21 799:References 706:Curve25519 657:Adi Shamir 649:asymptotic 634:algorithms 534:publicfile 497:function. 444:, such as 365:public-key 361:Curve25519 321:under the 251:Early life 227:. He is a 121:Curve25519 51:1971-10-29 1416:April 28, 1034:1059-1028 901:March 14, 681:with low 664:libraries 526:ucspi-tcp 446:Apple iOS 1888:Archived 1820:June 11, 1815:cr.yp.to 1721:cr.yp.to 1657:13 March 1651:Archived 1647:cr.yp.to 1461:24166515 1381:cr.yp.to 1305:Slashdot 1108:Slashdot 1083:Slashdot 828:20 March 823:cr.yp.to 767:CubeHash 761:See also 741:Teaching 675:primegen 668:portable 612:and the 602:(IMAP). 561:DNSCurve 508:Software 452:kernel, 440:and are 427:Poly1305 407:backdoor 387:package 354:ChaCha20 309:Cold War 305:munition 117:Poly1305 113:ChaCha20 73:American 1899:at the 957:2324716 930:2322251 776:SipHash 484:eSTREAM 480:Salsa20 454:OpenSSH 401:by the 389:signing 385:OpenBSD 381:OpenSSL 377:OpenSSH 369:Ed25519 350:eSTREAM 343:Salsa20 187:Website 109:Salsa20 1875:DJBFFT 1511:  1484:  1459:  1449:  1032:  955:  928:  794:(QMTP) 788:(QMQP) 735:Shor's 577:DNSSEC 554:djbdns 532:, and 522:djbdns 456:, and 448:, the 423:Google 223:, and 134:Fields 105:djbdns 77:German 1811:(PDF) 1702:"cdb" 1457:S2CID 1410:(PDF) 1403:(PDF) 1377:(PDF) 1057:(PDF) 1026:Wired 953:JSTOR 926:JSTOR 819:(PDF) 714:EdDSA 679:sieve 518:ezmlm 514:qmail 450:Linux 373:EdDSA 200:.html 101:qmail 1844:CNET 1822:2024 1769:NIST 1659:2023 1562:2005 1509:ISBN 1482:ISBN 1447:ISBN 1418:2010 1359:2005 1333:2014 1030:ISSN 903:2011 877:2008 851:2021 830:2019 628:and 610:djb2 545:BIND 415:NIST 299:The 198:/djb 45:Born 1439:doi 737:". 671:FFT 645:RSA 614:cdb 573:RSA 541:DNS 469:AES 458:Tor 434:TLS 213:djb 196:.to 194:.yp 1912:: 1842:. 1830:^ 1813:. 1786:. 1767:. 1738:. 1719:. 1649:. 1645:. 1532:. 1455:. 1445:. 1379:. 1350:. 1303:. 1278:. 1253:. 1221:. 1196:. 1172:. 1106:. 1081:. 1028:. 1024:. 999:. 974:. 893:. 867:. 821:. 806:^ 716:. 704:, 697:. 655:, 556:. 536:. 528:, 524:, 520:, 516:, 504:. 460:. 333:. 287:. 247:. 219:, 192:cr 163:, 159:, 140:, 119:, 115:, 111:, 107:, 103:, 75:, 53:) 1852:. 1824:. 1796:. 1723:. 1704:. 1690:. 1676:. 1661:. 1631:. 1616:. 1590:. 1564:. 1542:. 1517:. 1490:. 1463:. 1441:: 1420:. 1383:. 1361:. 1335:. 1313:. 1288:. 1263:. 1227:. 1206:. 1182:. 1158:. 1137:. 1116:. 1091:. 1066:. 1042:. 1009:. 984:. 959:. 932:. 905:. 879:. 853:. 832:. 478:" 144:, 49:( 23:.

Index

Daniel J. Bernstein (businessman)

East Patchogue, New York
American
German
University of California, Berkeley
New York University
qmail
djbdns
Salsa20
ChaCha20
Poly1305
Curve25519
Mathematics
Cryptography
Computer Security
University of Illinois at Chicago
Eindhoven University of Technology
Ruhr University Bochum
Doctoral advisor
Hendrik Lenstra
cr.yp.to/djb.html
mathematician
cryptologist
computer scientist
visiting professor
Ruhr University Bochum
research professor
University of Illinois at Chicago
Eindhoven University of Technology

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑