Chitchanok Chuengsatiansup

Orcid: 0000-0002-0329-2681

Affiliations:
  • Hasso Plattner Institute, Potsdam, Germany
  • University of Klagenfurt, Austria (former)
  • University of Melbourne, Melbourne, Australia (former)
  • Eindhoven University of Technology, Eindhoven, The Netherlands (former, PhD 2017)


According to our database1, Chitchanok Chuengsatiansup authored at least 37 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025


Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Protecting Cryptographic Code Against Spectre-RSB: (and, in Fact, All Known Spectre Variants).
Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025

2024
TeeJam: Sub-Cache-Line Leakages Strike Back.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Protecting cryptographic code against Spectre-RSB.
IACR Cryptol. ePrint Arch., 2024

Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks.
IACR Cryptol. ePrint Arch., 2024

Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives.
Proc. ACM Program. Lang., 2023

Cache-timing attack against HQC.
IACR Cryptol. ePrint Arch., 2023

Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information.
IACR Cryptol. ePrint Arch., 2023

BunnyHop: Exploiting the Instruction Prefetcher.
Proceedings of the 32nd USENIX Security Symposium, 2023

Ultimate SLH: Taking Speculative Load Hardening to the Next Level.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Gates of Time: Improving Cache Attacks with Transient Execution.
Proceedings of the 32nd USENIX Security Symposium, 2023

Spectre Declassified: Reading from the Right Place at the Wrong Time.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

CryptOpt: Automatic Optimization of Straightline Code.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

2022
Breaking and Fixing Speculative Load Hardening.
IACR Cryptol. ePrint Arch., 2022

CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives.
CoRR, 2022

Opportunities for genetic improvement of cryptographic code.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

Side-Channeling the Kalyna Key Expansion.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

RSA Key Recovery from Digit Equivalence Information.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.
IACR Cryptol. ePrint Arch., 2021

2020
ModFalcon: Compact Signatures Based On Module-NTRU Lattices.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Pairing-Friendly Twisted Hessian Curves.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Double-base scalar multiplication revisited.
IACR Cryptol. ePrint Arch., 2017

NTRU Prime: Reducing Attack Surface at Low Cost.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

2016
NTRU Prime.
IACR Cryptol. ePrint Arch., 2016

2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Twisted Hessian Curves.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
How to manipulate curve standards: a white paper for the black hat.
IACR Cryptol. ePrint Arch., 2014

Curve41417: Karatsuba Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Kummer Strikes Back: New DH Speed Records.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
PandA: Pairings and Arithmetic.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

2012
Faster elliptic curve arithmetic for double-base chain by reordering sequences of field operations.
Proceedings of the International Symposium on Information Theory and its Applications, 2012


  Loading...