Chinese
English
Research Fellow  |  Yang, Bo-Yin  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
invited_visit
honors
publications
others
supervised
Personal (New window)
 
 
 
 
 
Research Descriptions
 

         My research interests can be roughly stated as "Useful Cryptography, Now and in the Future".  More divided into the following areas: Effective Crypto Algorithms (especially for Low-Resource and Pervasive Applications); Cryptology (including Post-Quantum Cryptosystems and Algebraic Cryptanalysis).  I also study other topics that are Combinatorial in nature, including Analysis of Algorithms.  My work cover both theory and applied cryptography.  Some of these activities involve cooperation with the industry including e.g. Sony and Intel.

         1. Effective Crypto Algorithms especially for Low-Resource and Pervasive Applications: It seems that computers are everywhere, working invisibly and seamlessly. As it is getting more and more ubiquitous, security and privacy becomes pressing issues. RSA may be on its way out within 5-10 years even without the advance of Quantum Computing. Indeed, NATO is standardizing on ECC (ECIES, ECDSA) as the next standard. This is due to the need for security in pervasive or ubiquitous computing. RSA is simply too heavy-weight to fit all occasions. Even the proponents concede this point. We study topics ranging from restricted linear algebra, resource-limited arithmetic, fast arithmetic to efficient primitives. 

  • The work of my group on cryptographic primitives based on the "Curve25519" elliptic curve have earned respect and is currently being used by Apple in all iOS devices and soon to be incorportated by Google into the Chrome browser.
  • We have also cooperated with the formal methods group to complete the first formal verification for a hand-crafted assembly program with more than 100,000 instructions, which is the central part of the Curve25519 routines in intel x86 assembly.
  • Recent work in this area includes flexible optimizations with domain knowledge, and the possibility of software-hardware codesign with a scalable co-processor for security (of which we hoping to produce a prototype incorporating ECC and post-quantum crypto this year). 

         2. Cryptology: In this area, we concentrate in the following areas:

  1. Post-Quantum Cryptography: The current real meaning of this term is the study of cryptography that resists the advent of Quantum Computers, which are rumored to arrive within two decades. Our research in MPKCs (Multivariate Public-Key Cryptosystems) which depends on the difficulty of instances in EIP (Extended Isomorphism of Polynomials) and Multivariate Quadratic problems, are world-leading and has advanced the understanding of the field in both theoretical and practical viewpoints. MPKCs operate on a vector of variables over a small field as opposed to an element in a huge algebraic structure (as in RSA or ECC). This key characteristic makes MPKCs faster at comparable design security. This is useful for low-resource environments, such as embedded systems and smart cards. Recently we have proposed several analysis and improvements in the design of such primitives. We also have made our marks in other post-quantum cryptography, such as lattice-based.

  2. Cryptanalysis: We have made theoretical and practical advances to equation-solving and algebraic cryptanalysis, especially those including Gröbner Bases and the related XL (eXtended Linearization) method and its variants.  We have proved that the F4/F5 methods are not the best for most random systems.  We have also made great strides in terms of cryptanalysis of lattice-based cryptography, which theoreticians often use with blithe abandon with no regard to their pragmatic security or utility.

        3. Other Combinatorial Studies I work on many other combinatorial problems especially those dealing with enumeration and analysis of algorithms that deals with iterative or recursive structures that can be handled by standard combinatorial methods.

 
 
bg