中文版
English
研究員  |  楊柏因  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
invited_visit
honors
grants
publications
others
supervised
 
 
 
 
 
Publications
 
1. J. Ding, S. Kim, T. Takagi, Y. Wang and B.-Y. Yang, "A physical study of the LLL algorithm," Journal of Number Theory, volume 244, pages 339-368, March 2023.
2. W. Beullens, M.-S. Chen, S.-H. Hung, Matthias J. Kannwischer, B.-Y. Peng, C.-J. Shih, B.-Y. Yang, "Oil and Vinegar: Modern Parameters and Implementation," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 3, pages 321-365, 2023.
3. B.-Y. Peng, A. Marotzke, M.-H. Tsai, B.-Y. Yang, and H.-L. Chen, "Streamlined NTRU Prime on FPGA," Journal of Cryptographic Engineering, volume 13, number 2, pages 167–186, 2023.
4. T.-H. Chang, Y.-T. Kuo, J.-P. Chen, and B.-Y. Yang, "Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4," ICICS 2022 (24th International Conference on Information and Communications Security, Sept. 5–8, U. of Kent, Canterbury), Lecture Notes in Computer Science, volume 13407, Springer, pages 376-393, September 2022.
5. H. Becker, V. Hwang, M. J. Kannwischer, L. Panny, and B.-Y. Yang, "Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms," IWSEC 2022 (17th International Workshop on Security,Tokyo, Japan, August 31 – September 2), Lecture Notes in Computer Science, volume 13504, Springer, pages 3-23, July 2022, Best Paper
6. H. Becker, V. Hwang, M. J. Kannwischer, B.-Y. Yang, and S.-Y. Yang, "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1," IACR Transactions on Cryptographic Hardware and Embedded Systems, number 1, pages 221-244, January 2022.
7. A. Abdulrahman, J.-P. Chen, Y.-J. Chen, V. Hwang, M. J. Kannwischer, and B.-Y. Yang, "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, number 1, pages 127-151, January 2022.
8. V. Hwang, J. Liu, G. Seiler, X. Shi, M.-H. Tsai, B.-Y. Wang, and B.-Y. Yang, "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU,," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 4, pages 718-750, 2022.
9. T. Chou, M. J. Kannwischer, and B.-Y. Yang, "Rainbow on Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 4, pages 650-675, December 2021.
10. E. Alkim, D. Y.-L. Cheng, C.-M. M. Chung, H. Evkan, L. W.-L. Huang, V. Hwang, C.-L. T. Li, R. Niederhagen, C.J. Shih, J. Wälde, and B.-Y. Yang, "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, number 1, pages 217-238, September 2021, Full version: available as IACR e-Print 2020/1216 :::icon
11. J. Ding, J. Deaton, Vishaka, B.-Y. Yang, "The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes," Eurocrypt 2021, Lecture Notes in Computer Science, 12696, volume 12696, Anne Canteaut and Francois-Xavier Standaert, editor, Springer, pages 329--347, International Association of Cryptologic Research, August 2021. :::icon
12. C.-M. M. Chung, V. Hwang, M. J. Kannwischer, G. Seiler, C.-J. Shih and B.-Y. Yang, "NTT Multiplication for NTT-unfriendly Rings, New Speed Records for Saber and NTRU on Cortex-M4 and AVX2," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 2, pages 159–188, June 2021, available as IACR e-Print 2020/1397 :::icon
13. W.-L. Huang, J.-P. Chen, and B.-Y. Yang,, "Power Analysis on NTRU Prime," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 1, pages 123-151, September 2020. :::icon
14. Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Verifying Arithmetic in Cryptographic C Programs," Automated Software Engineering Conference, IEEE/ACM, November 2019. :::icon
15. Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Signed Cryptographic Program Verification with Typed CryptoLine," ACM CCS 2019, ACM, November 2019. :::icon
16. D. J. Bernstein and Bo-Yin Yang, "Fast constant-time gcd computation and modular inversion," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 3, pages 340-398, April 2019.
17. Andy Polyakov, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Verifying Arithmetic Assembly Programs in Cryptographic Primitives," The 29th International Conference on Concurrency Theory (CONCUR 2018), Lecture Notes in Computer Science, Sven Schewe and Lijun Zhang, editors, August 2018. :::icon
18. W.-D. Li, M.-S. Chen, P.-C. Kuo, C.-M. Cheng, and B.-Y. Yang, "Frobenius Additive Fast Fourier Transform," ISSAC, ACM, July 2018. :::icon
19. R. Niederhagen, K.-C. Ning and B.-Y. Yang, "Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems on GPUs," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 121-141, April 2018. :::icon
20. D. J. Bernstein and B.-Y. Yang, "Asymptotically faster quantum algorithms to solve multivariate quadratic equations," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 487-506, April 2018. :::icon
21. M.-S. Chen, W.-D. Li, B.-Y. Peng, B.-Y. Yang, and C.-M. Cheng, "Implementing 128-bit Secure MPKC Signatures," IEICE Transactions, volume E101(A), number 3, pages 553-569, January 2018. :::icon
22. M.-H. Tsai, B.-Y. Wang, and B.-Y. Yang, "Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs," ACM CCS 2017, ACM, October 2017. :::icon
23. A. Petzoldt, M.-S. Chen, J. Ding, and B.-Y. Yang, "MHFEv - An Efficient Multivariate Signature Scheme," Post-Quantum Cryptography, Lecture Notes in Computer Science, volume 10346, T. Lange and T. Takagi, editor, Springer, pages 205-223, June 2017. :::icon
24. Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng, "Gauss Sieve Algorithm on GPUs," Cryptographer's Track, RSA conference, Lecture Notes in Computer Science, volume 10159, Helena Handschuh, editor, pages 39-57, February 2017. :::icon
25. B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, C.-M. Cheng, B.-Y. Yang, "Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation," CANS-Cryptology and Network Security, Lecture Notes in Computer Science, volume 10052, Lecture Notes in Computer science, Sara Foresti and Giuseppe Persiano, editors, Springer, pages 626-636, November 2016. :::icon
26. A. Petzoldt, M.-S. Chen, B.-Y. Yang, C. Tao, and J. Ding, "Design Principles for HFEv- Based Multivariate Signature Schemes," Advances in Cryptology - ASIACRASIACYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I., Lecture Notes in Computer Science, volume 9452, Tetsu Iwata and Jung Hee Cheon, editors, Springer, pages 311-334, November 2015. :::icon
27. D. J. Bernstein, S. Josefsson, T. Lange, P. Schwabe, and B.-Y. Yang, "EdDSA for more curves," number 677, IACR Cryptology ePrint Archive, October 2015.
28. Y.-A. Chang, M.-S. Chen, J.-S. Wu and B.-Y. Yang, "Postquantum SSL/TLS for Embedded Systems," IoTS workshop at IEEE SOCA, November 2014. :::icon
29. Y.-F. Chen, C.-H. Hsu, H.-H. Lin, P. Schwabe, M.-H. Tsai, B.-Y. Wang, B.-Y. Yang, and S.-Y. Yang, "Verifying Curve25519 Software," ACM Conference on Computer and Communications Security (CCS 2014), November 2014. :::icon
30. R. Fitzpatrick, C. Bischof, J. Buchmann, Ö. Dagdelen, F. Göpfert, A. Mariano, B.-Y. Yang, "Tuning Gauss Sieve for Speed," Latincrypt, Lecture Notes in Computer Science, 8895, volume 8895, Lecture Notes in Computer Science, pages 288-305, September 2014. :::icon
31. Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y. Yang, A.-Y. Wu, and C.-M. Cheng, "Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics," International Workshop on Security, IWSEC, Lecture Notes in Computer Science, volume 8639, Lecture Notes in Computer Science, pages 174-186, August 2014. :::icon
32. Y.-H. Chiu, W.-C. Hong, L.-P. Chou, J. Ding, B.-Y. Yang and C.-M. Cheng, "A practical attack on patched MIFARE Classic," Inscrypt, Lecture Notes in Computer Science, 8567, pages 150-164, November 2013, Post-Proceedings, published 2014 :::icon
33. J. C.-Y. Yeh, C.-M. Cheng, B.-Y. Yang, "Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal MQ} with Number of Equations Linear in That of Variables," Number Theory and Cryptography Workshop, Lecture Notes in Computer Science, number 8260, pages 19-33, November 2013. :::icon
34. C. Bouillaguet, C.-M. Cheng, T. Chou, R. Niederhagen, B.-Y. Yang, "Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs," Selected Areas in Cryptography, Lecture Notes in Computer Science, volume 8282, pages 206-222, August 2013. :::icon
35. S. Tanaka, T. Yasuda, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Computing over GF(2^16) Using Graphics Processing Unit," Seventh International IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pages 843-846, July 2013.
36. M.-S. Chen, C.-M. Cheng, B.-Y. Yang, "RAIDq: A software-friendly, multiple-parity RAID," USENIX HotStorage, USENIX, June 2013. :::icon
37. J. Ding and B.-Y. Yang*, "Degree of Regularity for HFEv and HFEv-," Postquantum Cryptography, Lecture Notes in Computer Science, volume 7932, Philippe Gaborit, editor, Springer, pages 52-66, June 2013. :::icon
38. J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-T. Shen, B.-Y. Yang, and C.-M. Cheng, "Securing M2M with Post-Quantum Public-Key Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 3, number 1, pages 106-116, January 2013. :::icon
39. T. Chou, C.-M. Cheng, R. Niederhagen, and B.-Y. Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 7428, E Prouff and P. Shaumont, editor, pages 356-373, IACR, September 2012. :::icon
40. C.-H. Yu and B.-Y. Yang, "Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation," Security of Computers and Networks, Lecture Notes in Computer Science, 7485, Ivan Visconti and Roberto De Prisco, editor, Springer, pages 426-444, September 2012. :::icon
41. D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Journal of Cryptographic Engineering, volume 2, pages 77-89, September 2012, Previous version of the same name presented at CHES 2011 :::icon
42. S. Tanaka, T. Chou, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs," Workshop on Information Security Applications, Lecture Notes in Computer Science, volume 7690, pages 28-42, August 2012.
43. P. Schwabe, S.-Y. Yang, and B.-Y. Yang, "SHA-3 on ARM11 processors," Africacrypt, Lecture Notes in Computer Science, volume 7293, pages 190-205, July 2012, July 10-12, Ifrane, Morocco :::icon
44. Y.-J. Huang, F.-H. Liu, B.-Y. Yang, "Public-Key Cryptography from New Multivariate Quadratic Assumptions," Public-Key Cryptography, Lecture Notes in Computer Science, volume 7293, Marc Fischlin, editor, Springer, pages 190-295, IACR, May 2012. :::icon
45. L. Goubin, J. Patarin, and *B.-Y. Yang,, chapter "Multivariate Cryptosystems," Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, editor, pages 824-828, Springer, November 2011.
46. "Post-Quantum Cryptography," B.-Y. Yang, editor, Lecture Notes in Computer Science, volume 7071, Springer, November 2011.
47. D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, Springer, pages 124-142, September 2011. :::icon
48. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.-M. Cheng*, and B.-Y. Yang, "Extreme Enumeration on GPU and in Clouds," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, pages 176-191, September 2011. :::icon
49. K.-M. Chung, F.-H. Liu*, C.-J. Lu, and B.-Y. Yang, "Efficient String-Commitment from Weak Bit-Commitment and Full-Spectrum Amplification Theorem for Puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, volume 6477, Springer, pages 268-282, IACR, December 2010. :::icon
50. D. J. Bernstein, H.-C. Chen, C.-M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.-Y. Yang, "ECC2K-130 on NVIDIA GPUs," Indocrypt, Lecture Notes in Computer Science, volume 6498, pages 328-344, December 2010. :::icon
51. C. Bouillaguet, H.-C. Chen#, C.-M. Cheng, T. Chou#, R. Niederhagen#, A. Shamir, and *B.-Y. Yang, "Fast Exhaustive Search for Polynomial Systems in $\mathbf{F_2}$," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 6225, pages 203-218, August 2010. :::icon
52. C.-I Lee, T.-C. Wu*, B.-Y. Yang and W.-G. Tzeng, "New Secure Broadcasting Scheme Realizing Information Granularity," J. of Information Science and Engineering, volume 26, number 4, pages 1509-1523, July 2010.
53. Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo#, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y. Yang, H.-M. Sun, and P.-L. Lin, "SPATE: Small-group PKI-less Authenticated Trust Establishment," IEEE Trans. Mobile Computing, volume 9, number 12, pages 1666-1681, 2010, Extended version after the MobiSys best paper award :::icon
54. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, and Bo-Yin Yang, "Efficient string-commitment from weak bit-commitment and full-spectrum amplification theorem for puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, pages 268-282, 2010. :::icon
55. A. I.-T. Chen#, M.-S. Chen#, T.-R. Chen#, C.-M. Cheng, J. Ding, E. L.-H. Kuo#, F. Y.-S. Lee#, and B.-Y. Yang*, "SSE implementation of multivariate PKCs on modern x86 CPUs," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 5747, Springer, pages 33-48, IACR, September 2009. :::icon
56. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, B.-Y. Yang, "SPATE: Small-group PKI-less Authenticated Trust Establishment," Mobisys, Jason Flinn and Anthony LaMarca, editor, ACM SigMobile, pages 1-14, June 2009, ISBN 978-1-60558-566-6 :::icon
57. J. Baena, M.-S. Chen#, C. Clough*, J. Ding, and B.-Y. Yang, "Square, a New Multivariate Encryption Scheme," CT-RSA -- Cryptographer's Track, RSA Conference, Lecture Notes in Computer Science, volume 5473, M. Fischlin, editor, Springer, pages 252-264, April 2009. :::icon
58. J. Ding and B.-Y. Yang*,, chapter "Multivariate Cryptosystems," Post-Quantum Cryptography, D. J. Bernstein and J. Buchmann and E. Dahmen, editors, pages 193-241, Springer, 2009, ISBN 978-3-540-88701-0 :::icon
59. D. J. Bernstein, T.-R. Chen#, C.-M. Cheng, T. Lange, and B.-Y. Yang, "Elliptic Curve Method on Video Cards," Advances in Cryptology -- Eurocrypt, Lecture Notes in Computer Science, volume 5479, Antoine Joux, editor, pages 483-501, IACR, 2009. :::icon
60. A. Studer, C. Studer, H.-C. Hsiao, Y.-H. Lin, K.-H. Wang, A. Perrig, H.-M. Sun, B.-Y. Yang, "Study of User-Friendly Hash Comparison Schemes," ACSAC, pages 105-114, IEEE Computer Society, 2009, December 7-11, Honolulu
61. A. I.-T. Chen#, C.-H. O. Chen#, M.-S. Chen#, C.-M. Cheng and B.-Y. Yang*, "Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and $\ell$IC-derivatives," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Jintai Ding and Johannes Buchmann, editor, pages 95-106, October 2008, Post-Quantum Crypto workshop 2008, Cincinnati :::icon
62. F.-H. Liu#, C.-J. Lu, and B.-Y. Yang*, "Secure PRNGs from Specialized Polynomial Maps over Any $\mathrm{GF}(q)$," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Johannes Buchmann Jintai Ding, editor, pages 181-202, October 2008. :::icon
63. C.-H. O. Chen#, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, *A. Perrig, A. Studer, B.-Y. Yang, T.-C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Mobicom, Sigmobile, pages 92-103, ACM, September 2008. :::icon
64. J.Ding and B.-Y. Yang, "Multivariate Polynomials for Hashing," INSCRYPT 2007, post-proceedings, Lecture Notes in Computer Science, volume 4990, Springer, pages 358-371, State Key Laboratory of Information Security, August 2008, Xining, China, August 31 -- September 5, 2007. :::icon
65. J. Ding, V. Dubois, B.-Y. Yang*, C.-M. Cheng, and C.-H. O. Chen#, "Can SFLASH be saved?," Int'l Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, volume 5126, Springer, pages 691-701, EATCS, July 2008. :::icon
66. J. Ding, B.-Y. Yang*, C-H. O. Chen#, M.-S. Chen#, C.-M. Cheng, "New Differential-Algebraic Attacks and Reparametrization of Rainbow," Proc. 6th Applied Computer and Network Security, Lecture Notes in Computer Science, volume 5037, S. Bellovin et al, editor, Springer, pages 242-257, June 2008. :::icon
67. J. Ding, C. Wolf, and B.-Y. Yang, "\ell-Invertible Cycles for Multivariate Quadratic Public Key Cryptography," Proc. 11th International Workshop on Public Key Cryptography, Lecture Notes in Computer Science, volume 4450, Springer, pages 266-283, International Association of Cryptological Research, April 2007. :::icon
68. B.-Y. Yang, O. C.-H. Chen#, D. J. Bernstein, and J.-M. Chen, "Analysis of QUAD," IACR International Workshop for Fast Software Encryption, Lecture Notes in Computer Science, volume 4593, pages 290-307, Luxemberg City, Luxemberg, March 2007. :::icon
69. W. Yan, B.-Y. Yang, and Y.-N. Yeh,, "The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators," Appl. Math. Lett., volume 20, pages 290-295, 2007. :::icon
70. I. Gutman, W. Yan, B.-Y. Yang, and Y.-N. Yeh, "Generalized Wiener Indices of Zigzagging Pentachains," Journal of Mathematical Chemistry, volume 42, number 2, pages 103-117, 2007. :::icon
71. B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen,, "Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems," the 3rd Security of Pervasive Computing Conference, Lecture Notes in Computer Science, volume 3934, Lecture Notes in Computer Science, pages 73-88, June 2006. :::icon
72. S.-P. Eu, B.-Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," International Journal of Quantum Chemistry, 2006. :::icon
73. Y.-H. Hu, L.-C. Wang, and B.-Y. Yang,, "A “Medium-Field” Multivariate Public-Key Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages 132-149, 2006. :::icon
74. M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, "Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations," 8th Conf´erence des M´ethodes Effectives en G´eom´etrie Algebrique, April 2005. :::icon
75. B.-Y. Yang and J.-M. Chen,, "Building Secure Tame-Like Multivariate Public-Key Cryptosystems: the New TTS," Proc. 10th Australasian Conference on Info. Sec. and Privacy, volume 3574, Lecture Notes in Computer Science, pages 518-531, 2005. :::icon
76. L.-C. Wang, Y.-H. Hu, F.-P. Lai, C.-Y. Chou, and B.-Y. Yang,, "Tractable Rational Map Signature," Proc. 2005 IACR Int’l Workshop for Public-Key Cryptography, volume 3386, Lecture Notes in Computer Science, pages 244-257, 2005. :::icon
77. B.-Y. Yang and J.-M. Chen,, "Theoretical Analysis of XL over Small Fields," Proc. 9th Australasian Conference on Info. Sec. and Privacy, volume 3108, Lecture Notes in Computer Science, pages 277-288, 2004. :::icon
78. B.-Y. Yang, J.-M. Chen, and Y.-H. Chen,, "TTS: High-Speed Signatures on a Low-Cost Smart Card," Proc. 2004Workshop on Cryptographic Hardware and Embedded Systems, volume 3156, Lecture Notes in Computer Science, pages 371-385, 2004. :::icon
79. B.-Y. Yang and J.-M. Chen,, "All in the XL Family: Theory and Practice," Proc. 7th International Conference on Information Security and Cryptology, volume 3506, Lecture Notes in Computer Science, pages 67-86, 2004. :::icon
80. B.-Y. Yang and Y. Yeh,, "A Crowning Moment for Wiener Indices," Applied Mathematical, pages 333-340, 2004. :::icon
81. B.-Y. Yang, J.-M. Chen, and N. Courtois,, "On Asymptotic Security Estimates in XL and Gr¨obner Bases-Related Algebraic Cryptanalysis," Proc. 2004 International Conference on Information and Communications Security, volume 3269, Lecture Notes in Computer Science, pages 401-413, 2004. :::icon
82. B.-Y. Yang and Y. Yeh,, "Wiener Polynomials of some Chemically Interesting Graphs," International Journal of Quantum Chemistry, pages 80-91, 2004. :::icon
 
 
bg