Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at
Cited by
Cited by
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2.2, 2005
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
Applied Cryptography and Network Security: 6th International Conference …, 2008
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.
BY Yang, JM Chen
ACISP 5, 518-531, 2005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
All in the XL family: Theory and practice
BY Yang, JM Chen
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
Fast exhaustive search for polynomial systems in F2.
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
CHES 6225, 203-218, 2010
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
High Performance Post-Quantum Key Exchange on FPGAs.
PC Kuo, YW Chen, YC Hsu, CM Cheng, WD Li, BY Yang
J. Inf. Sci. Eng. 37 (5), 1211-1229, 2021
Fast constant-time gcd computation and modular inversion
DJ Bernstein, BY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 340-398, 2019
NTT multiplication for NTT-unfriendly rings: New speed records for Saber and NTRU on Cortex-M4 and AVX2
CMM Chung, V Hwang, MJ Kannwischer, G Seiler, CJ Shih, BY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 159-188, 2021
The system can't perform the operation now. Try again later.
Articles 1–20