Follow
Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at moscito.org
Title
Cited by
Cited by
Year
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
5522012
Asymptotic behaviour of the index of regularity of quadratic semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
The Effective Methods in Algebraic Geometry Conference (MEGA’05)(P. Gianni …, 2005
251*2005
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 124-142, 2011
2132011
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
International Conference on Applied Cryptography and Network Security, 242-257, 2008
1372008
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
International conference on the theory and application of cryptology and …, 2015
1302015
Building secure tame-like multivariate public-key cryptosystems: The new TTS
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 518-531, 2005
1272005
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
1262009
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International workshop on cryptographic hardware and embedded systems, 33-48, 2009
1242009
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1222009
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
1072007
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Annual International Conference on the Theory and Applications of …, 2009
1052009
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
1052004
All in the XL family: Theory and practice
BY Yang, JM Chen
International Conference on Information Security and Cryptology, 67-86, 2004
1032004
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
982008
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 277-288, 2004
942004
Fast Exhaustive Search for Polynomial Systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
932010
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Cryptographers’ Track at the RSA Conference, 132-149, 2006
792006
ℓ-Invertible Cycles for ultivariate uadratic () Public Key Cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
762007
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
732009
Breaking ecc2k-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
Cryptology EPrint Archive, 2009
722009
The system can't perform the operation now. Try again later.
Articles 1–20