The blog

I'm D. J. Bernstein, and this is my personal weblog. Keyboard shortcuts:

Feed: RSS. I'm also moderately active as @hashbreaker on Twitter, and in particular will systematically tweet new blog entries.

2014.04.11: NIST's cryptographic standardization process The first step towards improvement is to admit previous failures. #standardization #nist #des #dsa #dualec #nsa
2014.03.23: How to design an elliptic-curve signature system There are many choices of elliptic-curve signature systems. The standard choice, ECDSA, is reasonable if you don't care about simplicity, speed, and security. #signatures #ecc #elgamal #schnorr #ecdsa #eddsa #ed25519
2014.02.13: A subfield-logarithm attack against ideal lattices Computational algebraic number theory tackles lattice-based cryptography.
2014.02.05: Entropy Attacks! The conventional wisdom says that hash outputs can't be controlled; the conventional wisdom is simply wrong.

Version: This is version 2014.04.11 of the index.html web page.