Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Verified email at
Cited by
Cited by
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2-2, 2005
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
Applied Cryptography and Network Security: 6th International Conference …, 2008
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International workshop on cryptographic hardware and embedded systems, 33-48, 2009
Building secure tame-like multivariate public-key cryptosystems: The new TTS
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 518-531, 2005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
Fast exhaustive search for polynomial systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
All in the XL family: Theory and practice
BY Yang, JM Chen
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
NTT multiplication for NTT-unfriendly rings: New speed records for Saber and NTRU on Cortex-M4 and AVX2
CMM Chung, V Hwang, MJ Kannwischer, G Seiler, CJ Shih, BY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 159-188, 2021
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
Fast constant-time gcd computation and modular inversion
DJ Bernstein, BY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 340-398, 2019
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
High performance post-quantum key exchange on FPGAs
PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang
Cryptology ePrint Archive, 2017
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Cryptographers’ Track at the RSA Conference, 132-149, 2006
ℓ-Invertible Cycles for ultivariate uadratic () public key cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
The system can't perform the operation now. Try again later.
Articles 1–20