Use of spectral analysis in defense against DoS attacks CM Cheng, HT Kung, KS Tan Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 3, 2143-2148, 2002 | 312 | 2002 |
Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm CM Cheng, PH Hsiao, HT Kung, D Vlah 2007 IEEE Wireless Communications and Networking Conference, 4417-4424, 2007 | 199 | 2007 |
New differential-algebraic attacks and reparametrization of rainbow J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng Applied Cryptography and Network Security: 6th International Conference …, 2008 | 169 | 2008 |
Factoring RSA keys from certified smart cards: Coppersmith in the wild DJ Bernstein, YA Chang, CM Cheng, LP Chou, N Heninger, T Lange, ... Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 155 | 2013 |
Performance measurement of 802.11 a wireless links from UAV to ground nodes with various antenna orientations CM Cheng, PH Hsiao, HT Kung, D Vlah Proceedings of 15th International Conference on Computer Communications and …, 2006 | 136 | 2006 |
SSE implementation of multivariate PKCs on modern x86 CPUs AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ... International workshop on cryptographic hardware and embedded systems, 33-48, 2009 | 132 | 2009 |
Fast exhaustive search for polynomial systems in F2 C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ... CHES 6225, 203-218, 2010 | 122 | 2010 |
ECM on graphics cards DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 112 | 2009 |
Wsn07-1: Adjacent channel interference in dual-radio 802.11 a nodes and its impact on multi-hop networking CM Cheng, PH Hsiao, HT Kung, D Vlah IEEE Globecom 2006, 1-6, 2006 | 112 | 2006 |
Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices CY Wu, PC Lan, PC Yeh, CH Lee, CM Cheng IEEE journal on selected areas in communications 31 (9), 1687-1700, 2013 | 96 | 2013 |
High performance post-quantum key exchange on FPGAs PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang Cryptology ePrint Archive, 2017 | 93 | 2017 |
Breaking ecc2k-130 DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... Cryptology ePrint Archive, Report 2009/541, 2009. http://eprint. iacr. org, 2009 | 78 | 2009 |
Securing M2M with post-quantum public-key cryptography JR Shih, Y Hu, MC Hsiao, MS Chen, WC Shen, BY Yang, AY Wu, ... IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3 (1 …, 2013 | 69 | 2013 |
Extreme Enumeration on GPU and in Clouds: -How Many Dollars You Need to Break SVP Challenges PC Kuo, M Schneider, Ö Dagdelen, J Reichelt, J Buchmann, CM Cheng, ... Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 64 | 2011 |
Implementing minimized multivariate PKC on low-resource embedded systems BY Yang, CM Cheng, BR Chen, JM Chen International Conference on Security in Pervasive Computing, 73-88, 2006 | 63 | 2006 |
The billion-mulmod-per-second PC DJ Bernstein, HC Chen, MS Chen, CM Cheng, CH Hsiao, T Lange, ... Workshop record of SHARCS 9, 131-144, 2009 | 61 | 2009 |
Coca: Computation offload to clouds using aop HY Chen, YH Lin, CM Cheng 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012 | 53 | 2012 |
Solving quadratic equations with XL on parallel architectures CM Cheng, T Chou, R Niederhagen, BY Yang International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012 | 52 | 2012 |
Could SFLASH be repaired? J Ding, V Dubois, BY Yang, OCH Chen, CM Cheng Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008 | 49 | 2008 |
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks JW Chou, SD Lin, CM Cheng Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence …, 2012 | 33 | 2012 |