[go: up one dir, main page]

Follow
Chitchanok Chuengsatiansup
Chitchanok Chuengsatiansup
Hasso-Plattner-Institute & University of Potsdam
Verified email at hpi.de
Title
Cited by
Cited by
Year
NTRU prime: reducing attack surface at low cost
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018
4492018
Kummer strikes back: new DH speed records
DJ Bernstein, C Chuengsatiansup, T Lange, P Schwabe
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1212014
Twisted hessian curves
DJ Bernstein, C Chuengsatiansup, D Kohel, T Lange
International Conference on Cryptology and Information Security in Latin …, 2015
922015
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55. cr. yp. to
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
882015
ModFalcon: Compact Signatures Based On Module-NTRU Lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
802020
Curve41417: Karatsuba revisited
DJ Bernstein, C Chuengsatiansup, T Lange
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
722014
Ultimate {SLH}: Taking Speculative Load Hardening to the Next Level
Z Zhang, G Barthe, C Chuengsatiansup, P Schwabe, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 7125-7142, 2023
552023
Spectre declassified: Reading from the right place at the wrong time
BA Shivakumar, J Barnes, G Barthe, S Cauligi, C Chuengsatiansup, ...
2023 IEEE Symposium on Security and Privacy (SP), 1753-1770, 2023
452023
{BunnyHop}: Exploiting the Instruction Prefetcher
Z Zhang, M Tao, S O'Connell, C Chuengsatiansup, D Genkin, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 7321-7337, 2023
422023
NTRU Prime: round 2
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Submission to the NIST PQC standardization process, URl: https://ntruprime …, 2019
372019
Double-base scalar multiplication revisited
DJ Bernstein, C Chuengsatiansup, T Lange
Cryptology ePrint Archive, 2017
292017
The gates of time: Improving cache attacks with transient execution
D Katzman, W Kosasih, C Chuengsatiansup, E Ronen, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 1955-1972, 2023
282023
PandA: Pairings and arithmetic
C Chuengsatiansup, M Naehrig, P Ribarski, P Schwabe
Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014
242014
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
J Kuepper, A Erbsen, J Gross, O Conoly, C Sun, S Tian, D Wu, A Chlipala, ...
Proceedings of the ACM on Programming Languages 7 (PLDI), 1268-1292, 2023
232023
Cache-timing attack against HQC
S Huang, RQ Sim, C Chuengsatiansup, Q Guo, T Johansson
Cryptology ePrint Archive, 2023
232023
Sok: Can we really detect cache side-channel attacks by monitoring performance counters?
W Kosasih, Y Feng, C Chuengsatiansup, Y Yarom, Z Zhu
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
212024
Testing side-channel security of cryptographic implementations against future microarchitectures
G Barthe, M Böhme, S Cauligi, C Chuengsatiansup, D Genkin, ...
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
182024
Side-channeling the Kalyna key expansion
C Chuengsatiansup, D Genkin, Y Yarom, Z Zhang
Cryptographers’ Track at the RSA Conference, 272-296, 2022
172022
NTRU prime (2016)
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
URL https://eprint. iacr. org/2016/461, 2020
162020
NTRU Prime: round 3 (2020)
DJ Bernstein, BB Brumley, MS Chen, C Chuengsatiansup, T Lange, ...
132021
The system can't perform the operation now. Try again later.
Articles 1–20