Follow
Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at moscito.org
Title
Cited by
Cited by
Year
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
5812012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2.2, 2005
252*2005
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
2182011
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
Applied Cryptography and Network Security: 6th International Conference …, 2008
1432008
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
1362015
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
1362009
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.
BY Yang, JM Chen
ACISP 5, 518-531, 2005
1272005
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
1262009
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1222009
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
1172007
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
1082009
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
1072004
All in the XL Family: Theory and Practice.
BY Yang, JM Chen
ICISC 4, 67-86, 2004
1062004
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
992008
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
992004
Fast exhaustive search for polynomial systems in F2.
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
CHES 6225, 203-218, 2010
962010
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
812006
l-Invertible Cycles for Multivariate Quadratic
J Ding, C Wolf, BY Yang
Public Key Cryptography–PKC 2007, 266, 2007
762007
High Performance Post-Quantum Key Exchange on FPGAs.
PC Kuo, YW Chen, YC Hsu, CM Cheng, WD Li, BY Yang
J. Inf. Sci. Eng. 37 (5), 1211-1229, 2021
75*2021
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
722009
The system can't perform the operation now. Try again later.
Articles 1–20