Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Side-Channeling the Kalyna Key Expansion

    In 2015, the block cipher Kalyna has been approved as the new encryption standard of Ukraine. The cipher is a substitution-permutation network, whose design is based on AES, but includes several different feat...

    Chitchanok Chuengsatiansup, Daniel Genkin in Topics in Cryptology – CT-RSA 2022 (2022)

  2. No Access

    Chapter and Conference Paper

    RSA Key Recovery from Digit Equivalence Information

    The seminal work of Heninger and Shacham (Crypto 2009) demonstrated a method for reconstructing secret RSA keys from partial information of the key components. In this paper we further investigate this approa...

    Chitchanok Chuengsatiansup, Andrew Feutrill in Applied Cryptography and Network Security (2022)

  3. No Access

    Chapter and Conference Paper

    Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding

    We investigate the efficiency of a \(\mathsf {(module}\text {-}\mathsf {)LWR}\)-based PRF built using the GGM design. Our construction enjoys the security proof of the GGM construction and the $$\mathsf {(module}...

    Chitchanok Chuengsatiansup, Damien Stehlé in Selected Areas in Cryptography – SAC 2019 (2020)

  4. Chapter and Conference Paper

    NTRU Prime: Reducing Attack Surface at Low Cost

    Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals...

    Daniel J. Bernstein in Selected Areas in Cryptography – SAC 2017 (2018)

  5. No Access

    Chapter and Conference Paper

    Pairing-Friendly Twisted Hessian Curves

    This paper presents efficient formulas to compute Miller doubling and Miller addition utilizing degree-3 twists on curves with j-invariant 0 written in Hessian form. We give the formulas for both odd and even emb...

    Chitchanok Chuengsatiansup, Chloe Martindale in Progress in Cryptology – INDOCRYPT 2018 (2018)

  6. No Access

    Chapter and Conference Paper

    Twisted Hessian Curves

    This paper presents new speed records for arithmetic on a large family of elliptic curves with cofactor 3: specifically, $$8.77\mathbf...

    Daniel J. Bernstein in Progress in Cryptology -- LATINCRYPT 2015 (2015)

  7. No Access

    Chapter and Conference Paper

    How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to

    This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vulnerabilit...

    Daniel J. Bernstein, Tung Chou in Security Standardisation Research (2015)

  8. Chapter and Conference Paper

    Kummer Strikes Back: New DH Speed Records

    This paper sets new speed records for high-security constant-time variable-base-point Diffie–Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 Sandy Bridge cycles; 88448 Ivy B...

    Daniel J. Bernstein, Chitchanok Chuengsatiansup in Advances in Cryptology – ASIACRYPT 2014 (2014)

  9. No Access

    Chapter and Conference Paper

    PandA: Pairings and Arithmetic

    This paper introduces PandA, a software framework for Pairings and Arithmetic. It is designed to bring together advances in the efficient computation of cryptographic pairings and the development and implementati...

    Chitchanok Chuengsatiansup, Michael Naehrig in Pairing-Based Cryptography – Pairing 2013 (2014)

  10. Chapter and Conference Paper

    Curve41417: Karatsuba Revisited

    This paper introduces constant-time ARM Cortex-A8 ECDH software that (1) is faster than the fastest ECDH option in the latest version of OpenSSL but (2) achieves a security level above 2200 using a prime above 24...

    Daniel J. Bernstein in Cryptographic Hardware and Embedded System… (2014)