| NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 449 | 2018 |
| Kummer strikes back: new DH speed records DJ Bernstein, C Chuengsatiansup, T Lange, P Schwabe Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 121 | 2014 |
| Twisted hessian curves DJ Bernstein, C Chuengsatiansup, D Kohel, T Lange International Conference on Cryptology and Information Security in Latin …, 2015 | 92 | 2015 |
| How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55. cr. yp. to DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ... International Conference on Research in Security Standardisation, 109-139, 2015 | 88 | 2015 |
| ModFalcon: Compact Signatures Based On Module-NTRU Lattices C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 80 | 2020 |
| Curve41417: Karatsuba revisited DJ Bernstein, C Chuengsatiansup, T Lange Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 72 | 2014 |
| Ultimate {SLH}: Taking Speculative Load Hardening to the Next Level Z Zhang, G Barthe, C Chuengsatiansup, P Schwabe, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 7125-7142, 2023 | 55 | 2023 |
| Spectre declassified: Reading from the right place at the wrong time BA Shivakumar, J Barnes, G Barthe, S Cauligi, C Chuengsatiansup, ... 2023 IEEE Symposium on Security and Privacy (SP), 1753-1770, 2023 | 45 | 2023 |
| {BunnyHop}: Exploiting the Instruction Prefetcher Z Zhang, M Tao, S O'Connell, C Chuengsatiansup, D Genkin, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 7321-7337, 2023 | 42 | 2023 |
| NTRU Prime: round 2 DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Submission to the NIST PQC standardization process, URl: https://ntruprime …, 2019 | 37 | 2019 |
| Double-base scalar multiplication revisited DJ Bernstein, C Chuengsatiansup, T Lange Cryptology ePrint Archive, 2017 | 29 | 2017 |
| The gates of time: Improving cache attacks with transient execution D Katzman, W Kosasih, C Chuengsatiansup, E Ronen, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 1955-1972, 2023 | 28 | 2023 |
| PandA: Pairings and arithmetic C Chuengsatiansup, M Naehrig, P Ribarski, P Schwabe Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014 | 24 | 2014 |
| CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives J Kuepper, A Erbsen, J Gross, O Conoly, C Sun, S Tian, D Wu, A Chlipala, ... Proceedings of the ACM on Programming Languages 7 (PLDI), 1268-1292, 2023 | 23 | 2023 |
| Cache-timing attack against HQC S Huang, RQ Sim, C Chuengsatiansup, Q Guo, T Johansson Cryptology ePrint Archive, 2023 | 23 | 2023 |
| Sok: Can we really detect cache side-channel attacks by monitoring performance counters? W Kosasih, Y Feng, C Chuengsatiansup, Y Yarom, Z Zhu Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 21 | 2024 |
| Testing side-channel security of cryptographic implementations against future microarchitectures G Barthe, M Böhme, S Cauligi, C Chuengsatiansup, D Genkin, ... Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 18 | 2024 |
| Side-channeling the Kalyna key expansion C Chuengsatiansup, D Genkin, Y Yarom, Z Zhang Cryptographers’ Track at the RSA Conference, 272-296, 2022 | 17 | 2022 |
| NTRU prime (2016) DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal URL https://eprint. iacr. org/2016/461, 2020 | 16 | 2020 |
| NTRU Prime: round 3 (2020) DJ Bernstein, BB Brumley, MS Chen, C Chuengsatiansup, T Lange, ... | 13 | 2021 |