Chen-Mou Cheng
Chen-Mou Cheng
Verified email at - Homepage
Cited by
Cited by
Use of spectral analysis in defense against DoS attacks
CM Cheng, HT Kung, KS Tan
Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 3, 2143-2148, 2002
Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm
CM Cheng, PH Hsiao, HT Kung, D Vlah
2007 IEEE Wireless Communications and Networking Conference, 4417-4424, 2007
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
International Conference on Applied Cryptography and Network Security, 242-257, 2008
Factoring RSA keys from certified smart cards: Coppersmith in the wild
DJ Bernstein, YA Chang, CM Cheng, LP Chou, N Heninger, T Lange, ...
International Conference on the Theory and Application of Cryptology and†…, 2013
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International workshop on cryptographic hardware and embedded systems, 33-48, 2009
Performance measurement of 802.11 a wireless links from UAV to ground nodes with various antenna orientations
CM Cheng, PH Hsiao, HT Kung, D Vlah
Proceedings of 15th International Conference on Computer Communications and†…, 2006
Wsn07-1: Adjacent channel interference in dual-radio 802.11 a nodes and its impact on multi-hop networking
CM Cheng, PH Hsiao, HT Kung, D Vlah
IEEE Globecom 2006, 1-6, 2006
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Annual International Conference on the Theory and Applications of†…, 2009
Fast exhaustive search for polynomial systems in F2
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
CHES 6225, 203-218, 2010
Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices
CY Wu, PC Lan, PC Yeh, CH Lee, CM Cheng
IEEE journal on selected areas in communications 31 (9), 1687-1700, 2013
Breaking ecc2k-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
Cryptology ePrint Archive, Report 2009/541, 2009. http://eprint. iacr. org, 2009
High performance post-quantum key exchange on FPGAs
PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang
Cryptology ePrint Archive, 2017
Securing M2M with post-quantum public-key cryptography
JR Shih, Y Hu, MC Hsiao, MS Chen, WC Shen, BY Yang, AY Wu, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3 (1†…, 2013
Implementing minimized multivariate PKC on low-resource embedded systems
BY Yang, CM Cheng, BR Chen, JM Chen
International Conference on Security in Pervasive Computing, 73-88, 2006
The billion-mulmod-per-second PC
DJ Bernstein, HC Chen, MS Chen, CM Cheng, CH Hsiao, T Lange, ...
Workshop record of SHARCS 9, 131-144, 2009
Extreme Enumeration on GPU and in Clouds
PC Kuo, M Schneider, ÷ Dagdelen, J Reichelt, J Buchmann, CM Cheng, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 176-191, 2011
Coca: Computation offload to clouds using aop
HY Chen, YH Lin, CM Cheng
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid†…, 2012
Could SFLASH be repaired?
J Ding, V Dubois, BY Yang, OCH Chen, CM Cheng
International Colloquium on Automata, Languages, and Programming, 691-701, 2008
Solving quadratic equations with XL on parallel architectures
CM Cheng, T Chou, R Niederhagen, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012
Ecc2k-130 on nvidia gpus
DJ Bernstein, HC Chen, CM Cheng, T Lange, R Niederhagen, ...
International conference on cryptology in India, 328-346, 2010
The system can't perform the operation now. Try again later.
Articles 1–20