Bo-Yin Yang
Bo-Yin Yang
Academia Sinica
Geverifieerd e-mailadres voor moscito.org
Titel
Geciteerd door
Geciteerd door
Jaar
Introduction to post-quantum cryptography
DJ Bernstein
Post-quantum cryptography, 1-14, 2009
11822009
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
Journal of cryptographic engineering 2 (2), 77-89, 2012
4502012
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
M Bardet, JC Faugere, B Salvy, BY Yang
Proc. of MEGA 5, 2005
223*2005
High-speed high-security signatures
DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 124-142, 2011
1632011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1182010
Building secure tame-like multivariate public-key cryptosystems: The new TTS
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 518-531, 2005
1162005
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
International Conference on Applied Cryptography and Network Security, 242-257, 2008
1142008
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2009
1112009
Multivariate public key cryptography
J Ding, BY Yang
Post-quantum cryptography, 193-241, 2009
1062009
Design principles for HFEv-based multivariate signature schemes
A Petzoldt, MS Chen, BY Yang, C Tao, J Ding
International Conference on the Theory and Application of Cryptology and …, 2015
1042015
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Annual International Conference on the Theory and Applications of …, 2009
1022009
Gangs: gather, authenticate'n group securely
CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ...
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
982008
All in the XL family: Theory and practice
BY Yang, JM Chen
International Conference on Information Security and Cryptology, 67-86, 2004
952004
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
BY Yang, JM Chen, NT Courtois
Information and Communications Security, 401-413, 2004
932004
The behavior of Wiener indices and polynomials of graphs under five graph decorations
W Yan, BY Yang, YN Yeh
Applied Mathematics Letters 20 (3), 290-295, 2007
912007
Theoretical analysis of XL over small fields
BY Yang, JM Chen
Australasian Conference on Information Security and Privacy, 277-288, 2004
832004
Fast Exhaustive Search for Polynomial Systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
752010
A “medium-field” multivariate public-key encryption scheme
LC Wang, BY Yang, YH Hu, F Lai
Cryptographers’ Track at the RSA Conference, 132-149, 2006
742006
ℓ-Invertible Cycles for ultivariate uadratic () Public Key Cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
732007
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
662009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20