Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at moscito.org
Title
Cited by
Cited by
Year
Introduction to post-quantum cryptography
DJ Bernstein
Post-quantum cryptography, 1-14, 2009
9552009
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
3542012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2005
196*2005
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 124-142, 2011
1312011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1102010
Building secure tame-like multivariate public-key cryptosystems: The new TTS
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 518-531, 2005
1102005
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2009
1032009
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Annual International Conference on the Theory and Applications of …, 2009
972009
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
International Conference on Applied Cryptography and Network Security, 242-257, 2008
942008
All in the XL family: Theory and practice
BY Yang, JM Chen
International Conference on Information Security and Cryptology, 67-86, 2004
912004
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
902009
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
902004
GAnGS: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
882008
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
International Conference on the Theory and Application of Cryptology and …, 2015
842015
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 277-288, 2004
792004
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied mathematics letters 20 (3), 290-295, 2007
742007
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Cryptographers’ Track at the RSA Conference, 132-149, 2006
712006
ℓ-Invertible Cycles for ultivariate uadratic () Public Key Cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
692007
Breaking ECC2K-130.
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptology ePrint Archive 2009, 541, 2009
622009
Fast Exhaustive Search for Polynomial Systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
612010
The system can't perform the operation now. Try again later.
Articles 1–20