Use of spectral analysis in defense against DoS attacks CM Cheng, HT Kung, KS Tan Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 3, 2143-2148, 2002 | 306 | 2002 |
Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm CM Cheng, PH Hsiao, HT Kung, D Vlah 2007 IEEE Wireless Communications and Networking Conference, 4417-4424, 2007 | 187 | 2007 |
New differential-algebraic attacks and reparametrization of rainbow J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng Applied Cryptography and Network Security: 6th International Conference …, 2008 | 148 | 2008 |
Factoring RSA keys from certified smart cards: Coppersmith in the wild DJ Bernstein, YA Chang, CM Cheng, LP Chou, N Heninger, T Lange, ... Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 133 | 2013 |
Performance measurement of 802.11 a wireless links from UAV to ground nodes with various antenna orientations CM Cheng, PH Hsiao, HT Kung, D Vlah Proceedings of 15th International Conference on Computer Communications and …, 2006 | 133 | 2006 |
SSE implementation of multivariate PKCs on modern x86 CPUs AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ... Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009 | 129 | 2009 |
Wsn07-1: Adjacent channel interference in dual-radio 802.11 a nodes and its impact on multi-hop networking CM Cheng, PH Hsiao, HT Kung, D Vlah IEEE Globecom 2006, 1-6, 2006 | 111 | 2006 |
ECM on graphics cards DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 109 | 2009 |
Fast exhaustive search for polynomial systems in F2 C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ... CHES 6225, 203-218, 2010 | 98 | 2010 |
Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices CY Wu, PC Lan, PC Yeh, CH Lee, CM Cheng IEEE journal on selected areas in communications 31 (9), 1687-1700, 2013 | 89 | 2013 |
High performance post-quantum key exchange on FPGAs PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang Cryptology ePrint Archive, 2017 | 76 | 2017 |
Breaking ecc2k-130 DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... Cryptology ePrint Archive, Report 2009/541, 2009. http://eprint. iacr. org, 2009 | 74 | 2009 |
Securing M2M with post-quantum public-key cryptography JR Shih, Y Hu, MC Hsiao, MS Chen, WC Shen, BY Yang, AY Wu, ... IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3 (1 …, 2013 | 66 | 2013 |
Implementing minimized multivariate PKC on low-resource embedded systems BY Yang, CM Cheng, BR Chen, JM Chen Security in Pervasive Computing: Third International Conference, SPC 2006 …, 2006 | 63 | 2006 |
Extreme Enumeration on GPU and in Clouds: -How Many Dollars You Need to Break SVP Challenges PC Kuo, M Schneider, Ö Dagdelen, J Reichelt, J Buchmann, CM Cheng, ... Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 60 | 2011 |
The billion-mulmod-per-second PC DJ Bernstein, HC Chen, MS Chen, CM Cheng, CH Hsiao, T Lange, ... Workshop record of SHARCS 9, 131-144, 2009 | 60 | 2009 |
Coca: Computation offload to clouds using aop HY Chen, YH Lin, CM Cheng 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012 | 50 | 2012 |
Could SFLASH be repaired? J Ding, V Dubois, BY Yang, OCH Chen, CM Cheng Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008 | 47 | 2008 |
Solving quadratic equations with XL on parallel architectures CM Cheng, T Chou, R Niederhagen, BY Yang Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012 | 35 | 2012 |
Ecc2k-130 on nvidia gpus DJ Bernstein, HC Chen, CM Cheng, T Lange, R Niederhagen, ... Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 31 | 2010 |