# Chen-Mou Cheng

According to our database1, Chen-Mou Cheng authored at least 61 papers between 2002 and 2018.

Collaborative distances:

Book
In proceedings
Article
PhD thesis
Other

## Bibliography

2018
Implementing 128-Bit Secure MPKC Signatures.
IEICE Transactions, 2018

Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

Functional Pearl: Folding Polynomials of Polynomials.
Proceedings of the Functional and Logic Programming - 14th International Symposium, 2018

2017
Post-Quantum Key Exchange on FPGAs.
IACR Cryptology ePrint Archive, 2017

Implementing 128-bit Secure MPKC Signatures.
IACR Cryptology ePrint Archive, 2017

On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Gauss Sieve Algorithm on GPUs.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptology ePrint Archive, 2016

Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
A 1.96mm2 low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Portable Implementation of Lattice-Based Cryptography Using JavaScript.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
A User-Friendly Authentication Solution Using NFC Card Emulation on Android.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Proceedings of the Advances in Information and Computer Security, 2014

A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices.
IEEE Journal on Selected Areas in Communications, 2013

Fast Exhaustive Search for Quadratic Systems in 𝔽2 on FPGAs - Extended Version.
IACR Cryptology ePrint Archive, 2013

Securing M2M With Post-Quantum Public-Key Cryptography.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Design and implementation of multi-user secure indices for encrypted cloud storage.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

An Unsupervised Learning Model to Perform Side Channel Attack.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

RAIDq: A Software-friendly, Multiple-parity RAID.
Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems, 2013

A Practical Attack on Patched MIFARE Classic.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Proceedings of the Number Theory and Cryptography, 2013

Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Usable assembly language for GPUs: a success story.
IACR Cryptology ePrint Archive, 2012

Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

COCA: Computation Offload to Clouds Using AOP.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Multi-Threaded Implementation for Cryptography and Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Efficient Implementation of the etaT Pairing on GPU.
IACR Cryptology ePrint Archive, 2011

Toward green cloud computing.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems.
J. Inf. Sci. Eng., 2010

Fast Exhaustive Search for Polynomial Systems in F2.
IACR Cryptology ePrint Archive, 2010

MIMO-OFDM PHY Integrated (MOPI) Scheme for Confidential Wireless Transmission.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

ECC2K-130 on NVIDIA GPUs.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Integer Number Crunching on the Cell Processor.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Fast Exhaustive Search for Polynomial Systems in F2.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Could SFLASH be repaired?
IACR Cryptology ePrint Archive, 2009

Breaking ECC2K-130.
IACR Cryptology ePrint Archive, 2009

A Practical Experience with RFID Security.
Proceedings of the MDM 2009, 2009

ECM on Graphics Cards.
Proceedings of the Advances in Cryptology, 2009

SSE Implementation of Multivariate PKCs on Modern x86 CPUs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Small Odd Prime Field Multivariate PKCs.
IACR Cryptology ePrint Archive, 2008

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Could SFLASH be Repaired?.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

New Differential-Algebraic Attacks and Reparametrization of Rainbow.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Breaking the Symmetry: a Way to Resist the New Differential Attack.
IACR Cryptology ePrint Archive, 2007

Transmit Antenna Selection Based on Link-layer Channel Probing.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Performance Measurement of 802.11a Wireless Links from UAV to Ground Nodes with Various Antenna Orientations.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

Adjacent Channel Interference in Dual-radio 802.11a Nodes and Its Impact on Multi-hop Networking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2004
Path probing relay routing for achieving high end-to-end performance.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Design and Analysis of an IP-Layer Anonymizing Infrastructure.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

ANON: An IP-Layer Anonymizing Infrastructure.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Use of spectral analysis in defense against DoS attacks.
Proceedings of the Global Telecommunications Conference, 2002