Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at moscito.org
Title
Cited by
Cited by
Year
Introduction to post-quantum cryptography
DJ Bernstein
Post-quantum cryptography, 1-14, 2009
10062009
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
3832012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2005
204*2005
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 124-142, 2011
1362011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1112010
Building secure tame-like multivariate public-key cryptosystems: The new TTS
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 518-531, 2005
1112005
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2009
1042009
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
International Conference on Applied Cryptography and Network Security, 242-257, 2008
1002008
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Annual International Conference on the Theory and Applications of …, 2009
992009
GAnGS: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
942008
All in the XL family: Theory and practice
BY Yang, JM Chen
International Conference on Information Security and Cryptology, 67-86, 2004
942004
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
932009
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
912004
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
International Conference on the Theory and Application of Cryptology and …, 2015
882015
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 277-288, 2004
832004
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
782007
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Cryptographers’ Track at the RSA Conference, 132-149, 2006
722006
ℓ-Invertible Cycles for ultivariate uadratic () Public Key Cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
702007
Fast Exhaustive Search for Polynomial Systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
632010
Breaking ECC2K-130.
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptol. ePrint Arch. 2009, 541, 2009
622009
The system can't perform the operation now. Try again later.
Articles 1–20