Chen-Mou Cheng

According to our database1, Chen-Mou Cheng authored at least 75 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fast Exhaustive Search for Polynomial Systems over F3.
IACR Cryptol. ePrint Arch., 2023

2022
High Performance Post-Quantum Key Exchange on FPGAs.
J. Inf. Sci. Eng., 2022

Certificate Management Scheme for VANETs Using Blockchain Structure.
Cryptogr., 2022

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity.
Cryptogr., 2022

Decentralized and Collaborative Tracing for Group Signatures.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Parallelization on Gauss Sieve Algorithm over Ideal Lattice.
J. Inf. Sci. Eng., 2021

Efficient Algorithm to Compute Odd-Degree Isogenies Between Montgomery Curves for CSIDH.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Fair Byzantine Agreements for Blockchains.
IEEE Access, 2020

Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery Curves.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Cryptography Core Technology.
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020

2019
Differences among Summation Polynomials over Various Forms of Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

2018
Implementing 128-Bit Secure MPKC Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform.
CoRR, 2018

Frobenius Additive Fast Fourier Transform.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

Functional Pearl: Folding Polynomials of Polynomials.
Proceedings of the Functional and Logic Programming - 14th International Symposium, 2018

2017
Post-Quantum Key Exchange on FPGAs.
IACR Cryptol. ePrint Arch., 2017

Faster Multiplication for Long Binary Polynomials.
CoRR, 2017

On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Gauss Sieve Algorithm on GPUs.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Portable Implementation of Lattice-based Cryptography using JavaScript.
Int. J. Netw. Comput., 2016

Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
IACR Cryptol. ePrint Arch., 2016

Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptol. ePrint Arch., 2016

2015
A 1.96mm<sup>2</sup> low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
A User-Friendly Authentication Solution Using NFC Card Emulation on Android.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Proceedings of the Advances in Information and Computer Security, 2014

A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Lattice-based cryptanalysis - How to estimate the security parameter of lattice-based cryptosystem.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2014

Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices.
IEEE J. Sel. Areas Commun., 2013

Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013

Factoring RSA keys from certified smart cards: Coppersmith in the wild.
IACR Cryptol. ePrint Arch., 2013

Securing M2M With Post-Quantum Public-Key Cryptography.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Design and implementation of multi-user secure indices for encrypted cloud storage.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

An Unsupervised Learning Model to Perform Side Channel Attack.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

RAIDq: A Software-friendly, Multiple-parity RAID.
Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems, 2013

A Practical Attack on Patched MIFARE Classic.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Proceedings of the Number Theory and Cryptography, 2013

2012
Usable assembly language for GPUs: a success story.
IACR Cryptol. ePrint Arch., 2012

ECC2K-130 on NVIDIA GPUs.
IACR Cryptol. ePrint Arch., 2012

Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

COCA: Computation Offload to Clouds Using AOP.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Multi-Threaded Implementation for Cryptography and Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Efficient Implementation of the eta<sub>T</sub> Pairing on GPU.
IACR Cryptol. ePrint Arch., 2011

PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme
CoRR, 2011

Toward green cloud computing.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems.
J. Inf. Sci. Eng., 2010

Fast Exhaustive Search for Polynomial Systems in F<sub>2</sub>.
IACR Cryptol. ePrint Arch., 2010

MIMO-OFDM PHY Integrated (MOPI) Scheme for Confidential Wireless Transmission.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Integer Number Crunching on the Cell Processor.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Fast Exhaustive Search for Polynomial Systems in <i>F</i><sub>2</sub>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Could SFLASH be repaired?
IACR Cryptol. ePrint Arch., 2009

Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

A Practical Experience with RFID Security.
Proceedings of the MDM 2009, 2009

SSE Implementation of Multivariate PKCs on Modern x86 CPUs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
New Differential-Algebraic Attacks and Reparametrization of Rainbow.
IACR Cryptol. ePrint Arch., 2008

Small Odd Prime Field Multivariate PKCs.
IACR Cryptol. ePrint Arch., 2008

ECM on Graphics Cards.
IACR Cryptol. ePrint Arch., 2008

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

2007
Breaking the Symmetry: a Way to Resist the New Differential Attack.
IACR Cryptol. ePrint Arch., 2007

Transmit Antenna Selection Based on Link-layer Channel Probing.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Maximizing Throughput of UAV-Relaying Networks with the Load-Carry-and-Deliver Paradigm.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Performance Measurement of 802.11a Wireless Links from UAV to Ground Nodes with Various Antenna Orientations.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

Adjacent Channel Interference in Dual-radio 802.11a Nodes and Its Impact on Multi-hop Networking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2004
Path probing relay routing for achieving high end-to-end performance.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Design and Analysis of an IP-Layer Anonymizing Infrastructure.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

ANON: An IP-Layer Anonymizing Infrastructure.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Use of spectral analysis in defense against DoS attacks.
Proceedings of the Global Telecommunications Conference, 2002


  Loading...