[go: up one dir, main page]

Follow
Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at moscito.org
Title
Cited by
Cited by
Year
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
11762012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2-2, 2005
306*2005
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
2742009
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
International Conference on Applied Cryptography and Network Security, 242-257, 2008
2582008
NTT multiplication for NTT-unfriendly rings: New speed records for Saber and NTRU on Cortex-M4 and AVX2
CMM Chung, V Hwang, MJ Kannwischer, G Seiler, CJ Shih, BY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 159-188, 2021
1872021
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
International conference on the theory and application of cryptology and …, 2015
1672015
Fast constant-time gcd computation and modular inversion
DJ Bernstein, BY Yang
IACR transactions on cryptographic hardware and embedded systems, 340-398, 2019
1582019
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
1502007
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International workshop on cryptographic hardware and embedded systems, 33-48, 2009
1442009
ℓ-Invertible Cycles for ultivariate uadratic () public key cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
1422007
Fast exhaustive search for polynomial systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
1382010
Building secure tame-like multivariate public-key cryptosystems: The new TTS
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 518-531, 2005
1362005
All in the XL family: Theory and practice
BY Yang, JM Chen
International Conference on Information Security and Cryptology, 67-86, 2004
1302004
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1282009
Could SFLASH be repaired?
J Ding, V Dubois, BY Yang, OCH Chen, CM Cheng
International Colloquium on Automata, Languages, and Programming, 691-701, 2008
126*2008
TTS: High-speed signatures on a low-cost smart card
BY Yang, JM Chen, YH Chen
International Workshop on Cryptographic Hardware and Embedded Systems, 371-385, 2004
1232004
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
1162004
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
H Becker, V Hwang, MJ Kannwischer, BY Yang, SY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1 …, 2021
1132021
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 277-288, 2004
1122004
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Annual International Conference on the Theory and Applications of …, 2009
1102009
The system can't perform the operation now. Try again later.
Articles 1–20