Bo-Yin Yang

According to our database1, Bo-Yin Yang authored at least 96 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fast constant-time gcd computation and modular inversion.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Correlation Power Analysis on NTRU Prime and Related Countermeasures.
IACR Cryptology ePrint Archive, 2019

Fast constant-time gcd computation and modular inversion.
IACR Cryptology ePrint Archive, 2019

2018
Implementing 128-Bit Secure MPKC Signatures.
IEICE Transactions, 2018

Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform.
CoRR, 2018

Frobenius Additive Fast Fourier Transform.
CoRR, 2018

Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Frobenius Additive Fast Fourier Transform.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

Verifying Arithmetic Assembly Programs in Cryptographic Primitives (Invited Talk).
Proceedings of the 29th International Conference on Concurrency Theory, 2018

2017
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
IACR Cryptology ePrint Archive, 2017

Post-Quantum Key Exchange on FPGAs.
IACR Cryptology ePrint Archive, 2017

Implementing 128-bit Secure MPKC Signatures.
IACR Cryptology ePrint Archive, 2017

Asymptotically faster quantum algorithms to solve multivariate quadratic equations.
IACR Cryptology ePrint Archive, 2017

Faster Multiplication for Long Binary Polynomials.
CoRR, 2017

HMFEv - An Efficient Multivariate Signature Scheme.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Gauss Sieve Algorithm on GPUs.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
IACR Cryptology ePrint Archive, 2016

Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptology ePrint Archive, 2016

Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
EdDSA for more curves.
IACR Cryptology ePrint Archive, 2015

Design Principles for HFEv- Based Multivariate Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Tuning GaussSieve for Speed.
IACR Cryptology ePrint Archive, 2014

Postquantum SSL/TLS for Embedded Systems.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Tuning GaussSieve for Speed.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Proceedings of the Advances in Information and Computer Security, 2014

A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Verifying Curve25519 Software.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Fast Exhaustive Search for Quadratic Systems in 𝔽2 on FPGAs - Extended Version.
IACR Cryptology ePrint Archive, 2013

Securing M2M With Post-Quantum Public-Key Cryptography.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Degree of Regularity for HFEv and HFEv-.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

RAIDq: A Software-friendly, Multiple-parity RAID.
Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems, 2013

A Practical Attack on Patched MIFARE Classic.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Proceedings of the Number Theory and Cryptography, 2013

2012
High-speed high-security signatures.
J. Cryptographic Engineering, 2012

Public-Key Cryptography from New Multivariate Quadratic Assumptions.
IACR Cryptology ePrint Archive, 2012

Usable assembly language for GPUs: a success story.
IACR Cryptology ePrint Archive, 2012

ECC2K-130 on NVIDIA GPUs.
IACR Cryptology ePrint Archive, 2012

Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Public-Key Cryptography from New Multivariate Quadratic Assumptions.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

SHA-3 on ARM11 Processors.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Multivariate Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.
IACR Cryptology ePrint Archive, 2011

SHA-3 on ARM11 processors.
IACR Cryptology ePrint Archive, 2011

High-speed high-security signatures.
IACR Cryptology ePrint Archive, 2011

Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

High-Speed High-Security Signatures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

New Secure Broadcasting Scheme Realizing Information Granularity.
J. Inf. Sci. Eng., 2010

Fast Exhaustive Search for Polynomial Systems in F2.
IACR Cryptology ePrint Archive, 2010

ECC2K-130 on NVIDIA GPUs.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Fast Exhaustive Search for Polynomial Systems in F2.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Efficient String-Commitment from Weak Bit-Commitment.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Could SFLASH be repaired?
IACR Cryptology ePrint Archive, 2009

Breaking ECC2K-130.
IACR Cryptology ePrint Archive, 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

ECM on Graphics Cards.
Proceedings of the Advances in Cryptology, 2009

Square, a New Multivariate Encryption Scheme.
Proceedings of the Topics in Cryptology, 2009

SSE Implementation of Multivariate PKCs on Modern x86 CPUs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
New Differential-Algebraic Attacks and Reparametrization of Rainbow.
IACR Cryptology ePrint Archive, 2008

Odd-Char Multivariate Hidden Field Equations.
IACR Cryptology ePrint Archive, 2008

Small Odd Prime Field Multivariate PKCs.
IACR Cryptology ePrint Archive, 2008

ECM on Graphics Cards.
IACR Cryptology ePrint Archive, 2008

Secure PRNGs from Specialized Polynomial Maps over Any .
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Could SFLASH be Repaired?.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

New Differential-Algebraic Attacks and Reparametrization of Rainbow.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Secure PRNGs from Specialized Polynomial Maps over Any Fq.
IACR Cryptology ePrint Archive, 2007

Breaking the Symmetry: a Way to Resist the New Differential Attack.
IACR Cryptology ePrint Archive, 2007

Multivariates Polynomials for Hashing.
IACR Cryptology ePrint Archive, 2007

The behavior of Wiener indices and polynomials of graphs under five graph decorations.
Appl. Math. Lett., 2007

l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography.
Proceedings of the Public Key Cryptography, 2007

Analysis of QUAD
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Multivariates Polynomials for Hashing.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Note on Design Criteria for Rainbow-Type Multivariates.
IACR Cryptology ePrint Archive, 2006

Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

A "Medium-Field" Multivariate Public-Key Encryption Scheme.
Proceedings of the Topics in Cryptology, 2006

2005
Tractable Rational Map Signature.
Proceedings of the Public Key Cryptography, 2005

Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
TTS: Rank Attacks in Tame-Like Multivariate PKCs.
IACR Cryptology ePrint Archive, 2004

Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack.
IACR Cryptology ePrint Archive, 2004

All in the XL Family: Theory and Practice.
Proceedings of the Information Security and Cryptology, 2004

On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

TTS: High-Speed Signatures on a Low-Cost Smart Card.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

Theoretical Analysis of XL over Small Fields.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A More Secure and Efficacious TTS Signature Scheme.
IACR Cryptology ePrint Archive, 2003

A More Secure and Efficacious TTS Signature Scheme.
Proceedings of the Information Security and Cryptology, 2003

2000
Presorting algorithms: An average-case point of view.
Theor. Comput. Sci., 2000

1997
From Ternary Strings to Wiener Indices of Benzenoid Chains.
Discrete Applied Mathematics, 1997


  Loading...