关注
Chitchanok Chuengsatiansup
Chitchanok Chuengsatiansup
在 unimelb.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
NTRU prime: reducing attack surface at low cost
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018
2122018
NTRU Prime.
DJ Bernstein, C Chuengsatiansup, T Lange, C Van Vredendaal
IACR Cryptol. ePrint Arch. 2016, 461, 2016
1682016
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55. cr. yp. to
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
862015
Kummer strikes back: new DH speed records
DJ Bernstein, C Chuengsatiansup, T Lange, P Schwabe
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
862014
Twisted hessian curves
DJ Bernstein, C Chuengsatiansup, D Kohel, T Lange
International Conference on Cryptology and Information Security in Latin …, 2015
842015
Curve41417: Karatsuba revisited
DJ Bernstein, C Chuengsatiansup, T Lange
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
702014
ModFalcon: Compact Signatures Based On Module-NTRU Lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
512020
NTRU Prime: round 2
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
Submission to the NIST PQC standardization process, URl: https://ntruprime …, 2019
302019
Double-base scalar multiplication revisited
DJ Bernstein, C Chuengsatiansup, T Lange
Cryptology ePrint Archive, 2017
272017
PandA: Pairings and arithmetic
C Chuengsatiansup, M Naehrig, P Ribarski, P Schwabe
Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014
262014
Spectre declassified: Reading from the right place at the wrong time
BA Shivakumar, J Barnes, G Barthe, S Cauligi, C Chuengsatiansup, ...
2023 IEEE Symposium on Security and Privacy (SP), 1753-1770, 2023
232023
Ultimate {SLH}: Taking Speculative Load Hardening to the Next Level
Z Zhang, G Barthe, C Chuengsatiansup, P Schwabe, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 7125-7142, 2023
202023
NTRU prime (2016)
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal
URL https://eprint. iacr. org/2016/461, 2020
152020
The gates of time: Improving cache attacks with transient execution
D Katzman, W Kosasih, C Chuengsatiansup, E Ronen, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 1955-1972, 2023
142023
Side-channeling the Kalyna key expansion
C Chuengsatiansup, D Genkin, Y Yarom, Z Zhang
Cryptographers’ Track at the RSA Conference, 272-296, 2022
132022
{BunnyHop}: Exploiting the Instruction Prefetcher
Z Zhang, M Tao, S O'Connell, C Chuengsatiansup, D Genkin, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 7321-7337, 2023
122023
NTRU Prime: round 3 (2020)
DJ Bernstein, BB Brumley, MS Chen, C Chuengsatiansup, T Lange, ...
112021
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
J Kuepper, A Erbsen, J Gross, O Conoly, C Sun, S Tian, D Wu, A Chlipala, ...
Proceedings of the ACM on Programming Languages 7 (PLDI), 1268-1292, 2023
82023
NTRU Prime: Round 3 (October 7, 2020)
DJ Bernstein, BB Brumley, MS Chen, C Chuengsatiansup, T Lange, ...
Submission to the NIST post-quantum project, 2020
82020
round 2 (2019)
DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal, N Prime
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 0
6
系统目前无法执行此操作,请稍后再试。
文章 1–20