中文版
English
特聘研究員  |  楊柏因  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
invited_visit
honors
grants
publications
others
supervised
 
 
 
 
 
Publications
 
1. Chun-Ming Chiu, Bo-Yin Yang, Bow-Yaw Wang, "A New Trick for Polynomial Multiplication A verified CRT polymul utilizing a monomial factor," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2025, number 4, pages 795-816, December 2025. :::icon
2. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Lionel Blatter, Gustavo Xavier Delerue Marinho Alves, João Diogo Duarte, Benjamin Grégoire, Tiago Oliveira, Miguel Quaresma, Pierre-Yves Strub, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, "Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin Programs," ACMCCS, pages 1409-1423, October 2025. :::icon
3. C.-M. Chiu, J. Liu, X. Shi, Ming-Hsien Tsai, Bow-Yaw Wang and B.-Y. Yang, "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography,," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2025, number 3, September 2025. :::icon
4. Ziyu Zhao, Jintai Ding, Bo-Yin Yang, "Sieving with Streaming Memory Access," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2025, number 3, pages 668-692, September 2025. :::icon
5. D. J. Bernstein, T. Lange, J. Levin, and B.-Y. Yang, "PQConnect: Automated Post-Quantum End-to-End Tunnels," NDSS 2025, February 2025. :::icon
6. Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking," European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, 14985, pages 377-395, September 2024.
7. W. Beullens, M.-S. Chen, S.-H. Hung, Matthias J. Kannwischer, B.-Y. Peng, C.-J. Shih, B.-Y. Yang, "Oil and Vinegar: Modern Parameters and Implementation," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 3, pages 321-365, 2023.
8. B.-Y. Peng, A. Marotzke, M.-H. Tsai, B.-Y. Yang, and H.-L. Chen, "Streamlined NTRU Prime on FPGA," Journal of Cryptographic Engineering, volume 13, number 2, pages 167–186, 2023.
9. J. Ding, S. Kim, T. Takagi, Y. Wang and B.-Y. Yang, "A physical study of the LLL algorithm," Journal of Number Theory, volume 244, pages 339-368, March 2023.
10. T.-H. Chang, Y.-T. Kuo, J.-P. Chen, and B.-Y. Yang, "Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4," ICICS 2022 (24th International Conference on Information and Communications Security, Sept. 5–8, U. of Kent, Canterbury), Lecture Notes in Computer Science, volume 13407, Springer, pages 376-393, September 2022.
11. H. Becker, V. Hwang, M. J. Kannwischer, L. Panny, and B.-Y. Yang, "Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms," IWSEC 2022 (17th International Workshop on Security,Tokyo, Japan, August 31 – September 2), Lecture Notes in Computer Science, volume 13504, Springer, pages 3-23, July 2022, Best Paper
12. H. Becker, V. Hwang, M. J. Kannwischer, B.-Y. Yang, and S.-Y. Yang, "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1," IACR Transactions on Cryptographic Hardware and Embedded Systems, number 1, pages 221-244, January 2022.
13. A. Abdulrahman, J.-P. Chen, Y.-J. Chen, V. Hwang, M. J. Kannwischer, and B.-Y. Yang, "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, number 1, pages 127-151, January 2022.
14. V. Hwang, J. Liu, G. Seiler, X. Shi, M.-H. Tsai, B.-Y. Wang, and B.-Y. Yang, "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU,," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 4, pages 718-750, 2022.
15. T. Chou, M. J. Kannwischer, and B.-Y. Yang, "Rainbow on Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 4, pages 650-675, December 2021.
16. E. Alkim, D. Y.-L. Cheng, C.-M. M. Chung, H. Evkan, L. W.-L. Huang, V. Hwang, C.-L. T. Li, R. Niederhagen, C.J. Shih, J. Wälde, and B.-Y. Yang, "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, number 1, pages 217-238, September 2021, Full version: available as IACR e-Print 2020/1216 :::icon
17. J. Ding, J. Deaton, Vishaka, B.-Y. Yang, "The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes," Eurocrypt 2021, Lecture Notes in Computer Science, 12696, volume 12696, Anne Canteaut and Francois-Xavier Standaert, editor, Springer, pages 329--347, International Association of Cryptologic Research, August 2021. :::icon
18. C.-M. M. Chung, V. Hwang, M. J. Kannwischer, G. Seiler, C.-J. Shih and B.-Y. Yang, "NTT Multiplication for NTT-unfriendly Rings, New Speed Records for Saber and NTRU on Cortex-M4 and AVX2," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2, pages 159–188, June 2021, available as IACR e-Print 2020/1397 :::icon
19. W.-L. Huang, J.-P. Chen, and B.-Y. Yang,, "Power Analysis on NTRU Prime," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 1, pages 123-151, September 2020. :::icon
20. Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Verifying Arithmetic in Cryptographic C Programs," Automated Software Engineering Conference, IEEE/ACM, November 2019. :::icon
21. Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Signed Cryptographic Program Verification with Typed CryptoLine," ACM CCS 2019, ACM, November 2019. :::icon
22. D. J. Bernstein and Bo-Yin Yang, "Fast constant-time gcd computation and modular inversion," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 3, pages 340-398, April 2019.
23. Andy Polyakov, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Verifying Arithmetic Assembly Programs in Cryptographic Primitives," The 29th International Conference on Concurrency Theory (CONCUR 2018), Lecture Notes in Computer Science, Sven Schewe and Lijun Zhang, editors, August 2018. :::icon
24. W.-D. Li, M.-S. Chen, P.-C. Kuo, C.-M. Cheng, and B.-Y. Yang, "Frobenius Additive Fast Fourier Transform," ISSAC, ACM, July 2018. :::icon
25. R. Niederhagen, K.-C. Ning and B.-Y. Yang, "Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems on GPUs," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 121-141, April 2018. :::icon
26. D. J. Bernstein and B.-Y. Yang, "Asymptotically faster quantum algorithms to solve multivariate quadratic equations," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 487-506, April 2018. :::icon
27. M.-S. Chen, W.-D. Li, B.-Y. Peng, B.-Y. Yang, and C.-M. Cheng, "Implementing 128-bit Secure MPKC Signatures," IEICE Transactions, volume E101(A), number 3, pages 553-569, January 2018. :::icon
28. M.-H. Tsai, B.-Y. Wang, and B.-Y. Yang, "Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs," ACM CCS 2017, ACM, October 2017. :::icon
29. A. Petzoldt, M.-S. Chen, J. Ding, and B.-Y. Yang, "MHFEv - An Efficient Multivariate Signature Scheme," Post-Quantum Cryptography, Lecture Notes in Computer Science, volume 10346, T. Lange and T. Takagi, editor, Springer, pages 205-223, June 2017. :::icon
30. Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng, "Gauss Sieve Algorithm on GPUs," Cryptographer's Track, RSA conference, Lecture Notes in Computer Science, volume 10159, Helena Handschuh, editor, pages 39-57, February 2017. :::icon
31. B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, C.-M. Cheng, B.-Y. Yang, "Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation," CANS-Cryptology and Network Security, Lecture Notes in Computer Science, volume 10052, Lecture Notes in Computer science, Sara Foresti and Giuseppe Persiano, editors, Springer, pages 626-636, November 2016. :::icon
32. A. Petzoldt, M.-S. Chen, B.-Y. Yang, C. Tao, and J. Ding, "Design Principles for HFEv- Based Multivariate Signature Schemes," Advances in Cryptology - ASIACRASIACYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I., Lecture Notes in Computer Science, volume 9452, Tetsu Iwata and Jung Hee Cheon, editors, Springer, pages 311-334, November 2015. :::icon
33. D. J. Bernstein, S. Josefsson, T. Lange, P. Schwabe, and B.-Y. Yang, "EdDSA for more curves," number 677, IACR Cryptology ePrint Archive, October 2015.
34. Y.-A. Chang, M.-S. Chen, J.-S. Wu and B.-Y. Yang, "Postquantum SSL/TLS for Embedded Systems," IoTS workshop at IEEE SOCA, November 2014. :::icon
35. Y.-F. Chen, C.-H. Hsu, H.-H. Lin, P. Schwabe, M.-H. Tsai, B.-Y. Wang, B.-Y. Yang, and S.-Y. Yang, "Verifying Curve25519 Software," ACM Conference on Computer and Communications Security (CCS 2014), November 2014. :::icon
36. R. Fitzpatrick, C. Bischof, J. Buchmann, Ö. Dagdelen, F. Göpfert, A. Mariano, B.-Y. Yang, "Tuning Gauss Sieve for Speed," Latincrypt, Lecture Notes in Computer Science, 8895, volume 8895, Lecture Notes in Computer Science, pages 288-305, September 2014. :::icon
37. Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y. Yang, A.-Y. Wu, and C.-M. Cheng, "Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics," International Workshop on Security, IWSEC, Lecture Notes in Computer Science, volume 8639, Lecture Notes in Computer Science, pages 174-186, August 2014. :::icon
38. J. C.-Y. Yeh, C.-M. Cheng, B.-Y. Yang, "Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal MQ} with Number of Equations Linear in That of Variables," Number Theory and Cryptography Workshop, Lecture Notes in Computer Science, number 8260, pages 19-33, November 2013. :::icon
39. Y.-H. Chiu, W.-C. Hong, L.-P. Chou, J. Ding, B.-Y. Yang and C.-M. Cheng, "A practical attack on patched MIFARE Classic," Inscrypt, Lecture Notes in Computer Science, 8567, pages 150-164, November 2013, Post-Proceedings, published 2014 :::icon
40. C. Bouillaguet, C.-M. Cheng, T. Chou, R. Niederhagen, B.-Y. Yang, "Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs," Selected Areas in Cryptography, Lecture Notes in Computer Science, volume 8282, pages 206-222, August 2013. :::icon
41. S. Tanaka, T. Yasuda, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Computing over GF(2^16) Using Graphics Processing Unit," Seventh International IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pages 843-846, July 2013.
42. J. Ding and B.-Y. Yang*, "Degree of Regularity for HFEv and HFEv-," Postquantum Cryptography, Lecture Notes in Computer Science, volume 7932, Philippe Gaborit, editor, Springer, pages 52-66, June 2013. :::icon
43. M.-S. Chen, C.-M. Cheng, B.-Y. Yang, "RAIDq: A software-friendly, multiple-parity RAID," USENIX HotStorage, USENIX, June 2013. :::icon
44. J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-T. Shen, B.-Y. Yang, and C.-M. Cheng, "Securing M2M with Post-Quantum Public-Key Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 3, number 1, pages 106-116, January 2013. :::icon
45. C.-H. Yu and B.-Y. Yang, "Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation," Security of Computers and Networks, Lecture Notes in Computer Science, 7485, Ivan Visconti and Roberto De Prisco, editor, Springer, pages 426-444, September 2012. :::icon
46. D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Journal of Cryptographic Engineering, volume 2, pages 77-89, September 2012, Previous version of the same name presented at CHES 2011 :::icon
47. T. Chou, C.-M. Cheng, R. Niederhagen, and B.-Y. Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 7428, E Prouff and P. Shaumont, editor, pages 356-373, IACR, September 2012. :::icon
48. S. Tanaka, T. Chou, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs," Workshop on Information Security Applications, Lecture Notes in Computer Science, volume 7690, pages 28-42, August 2012.
49. P. Schwabe, S.-Y. Yang, and B.-Y. Yang, "SHA-3 on ARM11 processors," Africacrypt, Lecture Notes in Computer Science, volume 7293, pages 190-205, July 2012, July 10-12, Ifrane, Morocco :::icon
50. Y.-J. Huang, F.-H. Liu, B.-Y. Yang, "Public-Key Cryptography from New Multivariate Quadratic Assumptions," Public-Key Cryptography, Lecture Notes in Computer Science, volume 7293, Marc Fischlin, editor, Springer, pages 190-295, IACR, May 2012. :::icon
51. "Post-Quantum Cryptography," B.-Y. Yang, editor, Lecture Notes in Computer Science, volume 7071, Springer, November 2011.
52. L. Goubin, J. Patarin, and *B.-Y. Yang,, chapter "Multivariate Cryptosystems," Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, editor, pages 824-828, Springer, November 2011.
53. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.-M. Cheng*, and B.-Y. Yang, "Extreme Enumeration on GPU and in Clouds," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, pages 176-191, September 2011. :::icon
54. D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, Springer, pages 124-142, September 2011. :::icon
55. D. J. Bernstein, H.-C. Chen, C.-M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.-Y. Yang, "ECC2K-130 on NVIDIA GPUs," Indocrypt, Lecture Notes in Computer Science, volume 6498, pages 328-344, December 2010. :::icon
56. K.-M. Chung, F.-H. Liu*, C.-J. Lu, and B.-Y. Yang, "Efficient String-Commitment from Weak Bit-Commitment and Full-Spectrum Amplification Theorem for Puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, volume 6477, Springer, pages 268-282, IACR, December 2010. :::icon
57. C. Bouillaguet, H.-C. Chen#, C.-M. Cheng, T. Chou#, R. Niederhagen#, A. Shamir, and *B.-Y. Yang, "Fast Exhaustive Search for Polynomial Systems in $\mathbf{F_2}$," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 6225, pages 203-218, August 2010. :::icon
58. C.-I Lee, T.-C. Wu*, B.-Y. Yang and W.-G. Tzeng, "New Secure Broadcasting Scheme Realizing Information Granularity," J. of Information Science and Engineering, volume 26, number 4, pages 1509-1523, July 2010.
59. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, and Bo-Yin Yang, "Efficient string-commitment from weak bit-commitment and full-spectrum amplification theorem for puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, pages 268-282, 2010. :::icon
60. Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo#, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y. Yang, H.-M. Sun, and P.-L. Lin, "SPATE: Small-group PKI-less Authenticated Trust Establishment," IEEE Trans. Mobile Computing, volume 9, number 12, pages 1666-1681, 2010, Extended version after the MobiSys best paper award :::icon
61. A. I.-T. Chen#, M.-S. Chen#, T.-R. Chen#, C.-M. Cheng, J. Ding, E. L.-H. Kuo#, F. Y.-S. Lee#, and B.-Y. Yang*, "SSE implementation of multivariate PKCs on modern x86 CPUs," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 5747, Springer, pages 33-48, IACR, September 2009. :::icon
62. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, B.-Y. Yang, "SPATE: Small-group PKI-less Authenticated Trust Establishment," Mobisys, Jason Flinn and Anthony LaMarca, editor, ACM SigMobile, pages 1-14, June 2009, ISBN 978-1-60558-566-6 :::icon
63. J. Baena, M.-S. Chen#, C. Clough*, J. Ding, and B.-Y. Yang, "Square, a New Multivariate Encryption Scheme," CT-RSA -- Cryptographer's Track, RSA Conference, Lecture Notes in Computer Science, volume 5473, M. Fischlin, editor, Springer, pages 252-264, April 2009. :::icon
64. D. J. Bernstein, T.-R. Chen#, C.-M. Cheng, T. Lange, and B.-Y. Yang, "Elliptic Curve Method on Video Cards," Advances in Cryptology -- Eurocrypt, Lecture Notes in Computer Science, volume 5479, Antoine Joux, editor, pages 483-501, IACR, 2009. :::icon
65. A. Studer, C. Studer, H.-C. Hsiao, Y.-H. Lin, K.-H. Wang, A. Perrig, H.-M. Sun, B.-Y. Yang, "Study of User-Friendly Hash Comparison Schemes," ACSAC, pages 105-114, IEEE Computer Society, 2009, December 7-11, Honolulu
66. J. Ding and B.-Y. Yang*,, chapter "Multivariate Cryptosystems," Post-Quantum Cryptography, D. J. Bernstein and J. Buchmann and E. Dahmen, editors, pages 193-241, Springer, 2009, ISBN 978-3-540-88701-0 :::icon
67. F.-H. Liu#, C.-J. Lu, and B.-Y. Yang*, "Secure PRNGs from Specialized Polynomial Maps over Any $\mathrm{GF}(q)$," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Johannes Buchmann Jintai Ding, editor, pages 181-202, October 2008. :::icon
68. A. I.-T. Chen#, C.-H. O. Chen#, M.-S. Chen#, C.-M. Cheng and B.-Y. Yang*, "Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and $\ell$IC-derivatives," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Jintai Ding and Johannes Buchmann, editor, pages 95-106, October 2008, Post-Quantum Crypto workshop 2008, Cincinnati :::icon
69. C.-H. O. Chen#, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, *A. Perrig, A. Studer, B.-Y. Yang, T.-C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Mobicom, Sigmobile, pages 92-103, ACM, September 2008. :::icon
70. J.Ding and B.-Y. Yang, "Multivariate Polynomials for Hashing," INSCRYPT 2007, post-proceedings, Lecture Notes in Computer Science, volume 4990, Springer, pages 358-371, State Key Laboratory of Information Security, August 2008, Xining, China, August 31 -- September 5, 2007. :::icon
71. J. Ding, V. Dubois, B.-Y. Yang*, C.-M. Cheng, and C.-H. O. Chen#, "Can SFLASH be saved?," Int'l Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, volume 5126, Springer, pages 691-701, EATCS, July 2008. :::icon
72. J. Ding, B.-Y. Yang*, C-H. O. Chen#, M.-S. Chen#, C.-M. Cheng, "New Differential-Algebraic Attacks and Reparametrization of Rainbow," Proc. 6th Applied Computer and Network Security, Lecture Notes in Computer Science, volume 5037, S. Bellovin et al, editor, Springer, pages 242-257, June 2008. :::icon
73. J. Ding, C. Wolf, and B.-Y. Yang, "\ell-Invertible Cycles for Multivariate Quadratic Public Key Cryptography," Proc. 11th International Workshop on Public Key Cryptography, Lecture Notes in Computer Science, volume 4450, Springer, pages 266-283, International Association of Cryptological Research, April 2007. :::icon
74. B.-Y. Yang, O. C.-H. Chen#, D. J. Bernstein, and J.-M. Chen, "Analysis of QUAD," IACR International Workshop for Fast Software Encryption, Lecture Notes in Computer Science, volume 4593, pages 290-307, Luxemberg City, Luxemberg, March 2007. :::icon
75. I. Gutman, W. Yan, B.-Y. Yang, and Y.-N. Yeh, "Generalized Wiener Indices of Zigzagging Pentachains," Journal of Mathematical Chemistry, volume 42, number 2, pages 103-117, 2007. :::icon
76. W. Yan, B.-Y. Yang, and Y.-N. Yeh,, "The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators," Appl. Math. Lett., volume 20, pages 290-295, 2007. :::icon
77. B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen,, "Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems," the 3rd Security of Pervasive Computing Conference, Lecture Notes in Computer Science, volume 3934, Lecture Notes in Computer Science, pages 73-88, June 2006. :::icon
78. Y.-H. Hu, L.-C. Wang, and B.-Y. Yang,, "A “Medium-Field” Multivariate Public-Key Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages 132-149, 2006. :::icon
79. S.-P. Eu, B.-Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," International Journal of Quantum Chemistry, 2006. :::icon
80. M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, "Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations," 8th Conf´erence des M´ethodes Effectives en G´eom´etrie Algebrique, April 2005. :::icon
81. L.-C. Wang, Y.-H. Hu, F.-P. Lai, C.-Y. Chou, and B.-Y. Yang,, "Tractable Rational Map Signature," Proc. 2005 IACR Int’l Workshop for Public-Key Cryptography, volume 3386, Lecture Notes in Computer Science, pages 244-257, 2005. :::icon
82. B.-Y. Yang and J.-M. Chen,, "Building Secure Tame-Like Multivariate Public-Key Cryptosystems: the New TTS," Proc. 10th Australasian Conference on Info. Sec. and Privacy, volume 3574, Lecture Notes in Computer Science, pages 518-531, 2005. :::icon
83. B.-Y. Yang and J.-M. Chen,, "All in the XL Family: Theory and Practice," Proc. 7th International Conference on Information Security and Cryptology, volume 3506, Lecture Notes in Computer Science, pages 67-86, 2004. :::icon
84. B.-Y. Yang, J.-M. Chen, and N. Courtois,, "On Asymptotic Security Estimates in XL and Gr¨obner Bases-Related Algebraic Cryptanalysis," Proc. 2004 International Conference on Information and Communications Security, volume 3269, Lecture Notes in Computer Science, pages 401-413, 2004. :::icon
85. B.-Y. Yang, J.-M. Chen, and Y.-H. Chen,, "TTS: High-Speed Signatures on a Low-Cost Smart Card," Proc. 2004Workshop on Cryptographic Hardware and Embedded Systems, volume 3156, Lecture Notes in Computer Science, pages 371-385, 2004. :::icon
86. B.-Y. Yang and J.-M. Chen,, "Theoretical Analysis of XL over Small Fields," Proc. 9th Australasian Conference on Info. Sec. and Privacy, volume 3108, Lecture Notes in Computer Science, pages 277-288, 2004. :::icon
87. B.-Y. Yang and Y. Yeh,, "Wiener Polynomials of some Chemically Interesting Graphs," International Journal of Quantum Chemistry, pages 80-91, 2004. :::icon
88. B.-Y. Yang and Y. Yeh,, "A Crowning Moment for Wiener Indices," Applied Mathematical, pages 333-340, 2004. :::icon
 
 
bg