NTRU prime: reducing attack surface at low cost DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 215 | 2018 |
NTRU Prime. DJ Bernstein, C Chuengsatiansup, T Lange, C Van Vredendaal IACR Cryptol. ePrint Arch. 2016, 461, 2016 | 169 | 2016 |
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55. cr. yp. to DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ... International Conference on Research in Security Standardisation, 109-139, 2015 | 86 | 2015 |
Kummer strikes back: new DH speed records DJ Bernstein, C Chuengsatiansup, T Lange, P Schwabe Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 86 | 2014 |
Twisted hessian curves DJ Bernstein, C Chuengsatiansup, D Kohel, T Lange International Conference on Cryptology and Information Security in Latin …, 2015 | 84 | 2015 |
Curve41417: Karatsuba revisited DJ Bernstein, C Chuengsatiansup, T Lange Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 70 | 2014 |
ModFalcon: Compact Signatures Based On Module-NTRU Lattices C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 54 | 2020 |
NTRU Prime: round 2 DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal Submission to the NIST PQC standardization process, URl: https://ntruprime …, 2019 | 30 | 2019 |
Double-base scalar multiplication revisited DJ Bernstein, C Chuengsatiansup, T Lange Cryptology ePrint Archive, 2017 | 27 | 2017 |
PandA: Pairings and arithmetic C Chuengsatiansup, M Naehrig, P Ribarski, P Schwabe Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014 | 26 | 2014 |
Spectre declassified: Reading from the right place at the wrong time BA Shivakumar, J Barnes, G Barthe, S Cauligi, C Chuengsatiansup, ... 2023 IEEE Symposium on Security and Privacy (SP), 1753-1770, 2023 | 25 | 2023 |
Ultimate {SLH}: Taking Speculative Load Hardening to the Next Level Z Zhang, G Barthe, C Chuengsatiansup, P Schwabe, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 7125-7142, 2023 | 23 | 2023 |
The gates of time: Improving cache attacks with transient execution D Katzman, W Kosasih, C Chuengsatiansup, E Ronen, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 1955-1972, 2023 | 15 | 2023 |
NTRU prime (2016) DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal URL https://eprint. iacr. org/2016/461, 2020 | 15 | 2020 |
{BunnyHop}: Exploiting the Instruction Prefetcher Z Zhang, M Tao, S O'Connell, C Chuengsatiansup, D Genkin, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 7321-7337, 2023 | 14 | 2023 |
Side-channeling the Kalyna key expansion C Chuengsatiansup, D Genkin, Y Yarom, Z Zhang Cryptographers’ Track at the RSA Conference, 272-296, 2022 | 13 | 2022 |
NTRU Prime: round 3 (2020) DJ Bernstein, BB Brumley, MS Chen, C Chuengsatiansup, T Lange, ... | 11 | 2021 |
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives J Kuepper, A Erbsen, J Gross, O Conoly, C Sun, S Tian, D Wu, A Chlipala, ... Proceedings of the ACM on Programming Languages 7 (PLDI), 1268-1292, 2023 | 10 | 2023 |
NTRU Prime: Round 3 (October 7, 2020) DJ Bernstein, BB Brumley, MS Chen, C Chuengsatiansup, T Lange, ... Submission to the NIST post-quantum project, 2020 | 8 | 2020 |
round 2 (2019) DJ Bernstein, C Chuengsatiansup, T Lange, C van Vredendaal, N Prime URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 0 | 6 | |