Chinese
English
Research Fellow  |  Yang, Bo-Yin  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
invited_visit
honors
publications
supervised
Personal (New window)
 
 
 
 
 
Publications
 
1. A. Petzoldt, M.-S. Chen, J. Ding, and B.-Y. Yang, "MHFEv - An Efficient Multivariate Signature Scheme," Post-Quantum Cryptography, Lecture Notes in Computer Science, volume 10346, T. Lange and T. Takagi, editor, Springer, pages 205-223, June 2017.
2. Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng, "Gauss Sieve Algorithm on GPUs," Cryptographer's Track, RSA conference, Lecture Notes in Computer Science, volume 10159, Helena Handschuh, editor, pages 39-57, February 2017.
3. B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, C.-M. Cheng, B.-Y. Yang, "Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation," CANS-Cryptology and Network Security, Lecture Notes in Computer Science, volume 10052, Lecture Notes in Computer science, Sara Foresti and Giuseppe Persiano, editors, Springer, pages 626-636, November 2016.
4. A. Petzoldt, M.-S. Chen, B.-Y. Yang, C. Tao, and J. Ding, "Design Principles for HFEv- Based Multivariate Signature Schemes," Advances in Cryptology - ASIACRASIACYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I., Lecture Notes in Computer Science, volume 9452, Tetsu Iwata and Jung Hee Cheon, editors, Springer, pages 311-334, November 2015. :::icon
5. D. J. Bernstein, S. Josefsson, T. Lange, P. Schwabe, and B.-Y. Yang, "EdDSA for more curves," number 677, IACR Cryptology ePrint Archive October 2015.
6. Y.-A. Chang, M.-S. Chen, J.-S. Wu and B.-Y. Yang, "Postquantum SSL/TLS for Embedded Systems," IoTS workshop at IEEE SOCA, November 2014. :::icon
7. Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, and Shang-Yi Yang, "Verifying Curve25519 Software," ACM Conference on Computer and Communications Security (CCS 2014), November 2014. :::icon
8. R. Fitzpatrick, C. Bischof, J. Buchmann, Ö. Dagdelen, F. Göpfert, A. Mariano, B.-Y. Yang, "Tuning Gauss Sieve for Speed," Latincrypt, Lecture Notes in Computer Science, 8895, volume 8895, Lecture Notes in Computer Science, pages 288-305, September 2014. :::icon
9. Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y. Yang, A.-Y. Wu, and C.-M. Cheng, "Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics," International Workshop on Security, IWSEC, Lecture Notes in Computer Science, volume 8639, Lecture Notes in Computer Science, pages 174-186, August 2014. :::icon
10. J. C.-Y. Yeh, C.-M. Cheng, B.-Y. Yang, "Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal MQ} with Number of Equations Linear in That of Variables," Number Theory and Cryptography Workshop, Lecture Notes in Computer Science, number 8260, pages 19-33, November 2013. :::icon
11. Y.-H. Chiu, W.-C. Hong, L.-P. Chou, J. Ding, B.-Y. Yang and C.-M. Cheng, "A practical attack on patched MIFARE Classic," Inscrypt, Lecture Notes in Computer Science, 8567, pages 150-164, November 2013, Post-Proceedings, published 2014 :::icon
12. C. Bouillaguet, C.-M. Cheng, T. Chou, R. Niederhagen, B.-Y. Yang, "Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs," Selected Areas in Cryptography, Lecture Notes in Computer Science, volume 8282, pages 206-222, August 2013. :::icon
13. S. Tanaka, T. Yasuda, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Computing over GF(2^16) Using Graphics Processing Unit," Seventh International IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pages 843-846, July 2013.
14. M.-S. Chen, C.-M. Cheng, B.-Y. Yang, "RAIDq: A software-friendly, multiple-parity RAID," USENIX HotStorage, USENIX, June 2013. :::icon
15. J. Ding and B.-Y. Yang*, "Degree of Regularity for HFEv and HFEv-," Postquantum Cryptography, Lecture Notes in Computer Science, volume 7932, Philippe Gaborit, editor, Springer, pages 52-66, June 2013. :::icon
16. J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-T. Shen, B.-Y. Yang, and C.-M. Cheng, "Securing M2M with Post-Quantum Public-Key Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 3, number 1, pages 106-116, January 2013. :::icon
17. D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Journal of Cryptographic Engineering, volume 2, pages 77-89, September 2012, Previous version of the same name presented at CHES 2011 :::icon
18. T. Chou, C.-M. Cheng, R. Niederhagen, and B.-Y. Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 7428, E Prouff and P. Shaumont, editor, pages 356-373, IACR, September 2012. :::icon
19. C.-H. Yu and B.-Y. Yang, "Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation," Security of Computers and Networks, Lecture Notes in Computer Science, 7485, Ivan Visconti and Roberto De Prisco, editor, Springer, pages 426-444, September 2012. :::icon
20. S. Tanaka, T. Chou, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs," Workshop on Information Security Applications, Lecture Notes in Computer Science, volume 7690, pages 28-42, August 2012.
21. P. Schwabe, S.-Y. Yang, and B.-Y. Yang, "SHA-3 on ARM11 processors," Africacrypt, Lecture Notes in Computer Science, volume 7293, pages 190-205, July 2012, July 10-12, Ifrane, Morocco :::icon
22. Y.-J. Huang, F.-H. Liu, B.-Y. Yang, "Public-Key Cryptography from New Multivariate Quadratic Assumptions," Public-Key Cryptography, Lecture Notes in Computer Science, volume 7293, Marc Fischlin, editor, Springer, pages 190-295, IACR, May 2012. :::icon
23. "Post-Quantum Cryptography," B.-Y. Yang, editor, Lecture Notes in Computer Science, volume 7071, Springer, November 2011.
24. L. Goubin, J. Patarin, and *B.-Y. Yang,, chapter "Multivariate Cryptosystems," Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, editor, pages 824-828, Springer, November 2011.
25. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.-M. Cheng*, and B.-Y. Yang, "Extreme Enumeration on GPU and in Clouds," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, pages 176-191, September 2011. :::icon
26. D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, Springer, pages 124-142, September 2011. :::icon
27. D. J. Bernstein, H.-C. Chen, C.-M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.-Y. Yang, "ECC2K-130 on NVIDIA GPUs," Indocrypt, Lecture Notes in Computer Science, volume 6498, pages 328-344, December 2010. :::icon
28. K.-M. Chung, F.-H. Liu*, C.-J. Lu, and B.-Y. Yang, "Efficient String-Commitment from Weak Bit-Commitment and Full-Spectrum Amplification Theorem for Puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, volume 6477, Springer, pages 268-282, IACR, December 2010. :::icon
29. C. Bouillaguet, H.-C. Chen#, C.-M. Cheng, T. Chou#, R. Niederhagen#, A. Shamir, and *B.-Y. Yang, "Fast Exhaustive Search for Polynomial Systems in $\mathbf{F_2}$," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 6225, pages 203-218, August 2010. :::icon
30. C.-I Lee, T.-C. Wu*, B.-Y. Yang and W.-G. Tzeng, "New Secure Broadcasting Scheme Realizing Information Granularity," J. of Information Science and Engineering, volume 26, number 4, pages 1509-1523, July 2010.
31. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, and Bo-Yin Yang, "Efficient string-commitment from weak bit-commitment and full-spectrum amplification theorem for puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, pages 268-282, 2010. :::icon
32. Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo#, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y. Yang, H.-M. Sun, and P.-L. Lin, "SPATE: Small-group PKI-less Authenticated Trust Establishment," IEEE Trans. Mobile Computing, volume 9, number 12, pages 1666-1681, 2010, Extended version after the MobiSys best paper award :::icon
33. A. I.-T. Chen#, M.-S. Chen#, T.-R. Chen#, C.-M. Cheng, J. Ding, E. L.-H. Kuo#, F. Y.-S. Lee#, and B.-Y. Yang*, "SSE implementation of multivariate PKCs on modern x86 CPUs," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 5747, Springer, pages 33-48, IACR, September 2009. :::icon
34. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, B.-Y. Yang, "SPATE: Small-group PKI-less Authenticated Trust Establishment," Mobisys, Jason Flinn and Anthony LaMarca, editor, ACM SigMobile, pages 1-14, June 2009, ISBN 978-1-60558-566-6 :::icon
35. J. Baena, M.-S. Chen#, C. Clough*, J. Ding, and B.-Y. Yang, "Square, a New Multivariate Encryption Scheme," CT-RSA -- Cryptographer's Track, RSA Conference, Lecture Notes in Computer Science, volume 5473, M. Fischlin, editor, Springer, pages 252-264, April 2009. :::icon
36. J. Ding and B.-Y. Yang*,, chapter "Multivariate Cryptosystems," Post-Quantum Cryptography, D. J. Bernstein and J. Buchmann and E. Dahmen, editors, pages 193-241, Springer, 2009, ISBN 978-3-540-88701-0 :::icon
37. D. J. Bernstein, T.-R. Chen#, C.-M. Cheng, T. Lange, and B.-Y. Yang, "Elliptic Curve Method on Video Cards," Advances in Cryptology -- Eurocrypt, Lecture Notes in Computer Science, volume 5479, Antoine Joux, editor, pages 483-501, IACR, 2009. :::icon
38. A. Studer, C. Studer, H.-C. Hsiao, Y.-H. Lin, K.-H. Wang, A. Perrig, H.-M. Sun, B.-Y. Yang, "Study of User-Friendly Hash Comparison Schemes," ACSAC, pages 105-114, IEEE Computer Society, 2009, December 7-11, Honolulu
39. A. I.-T. Chen#, C.-H. O. Chen#, M.-S. Chen#, C.-M. Cheng and B.-Y. Yang*, "Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and $\ell$IC-derivatives," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Jintai Ding and Johannes Buchmann, editor, pages 95-106, October 2008, Post-Quantum Crypto workshop 2008, Cincinnati :::icon
40. F.-H. Liu#, C.-J. Lu, and B.-Y. Yang*, "Secure PRNGs from Specialized Polynomial Maps over Any $\mathrm{GF}(q)$," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Johannes Buchmann Jintai Ding, editor, pages 181-202, October 2008. :::icon
41. C.-H. O. Chen#, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, *A. Perrig, A. Studer, B.-Y. Yang, T.-C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Mobicom, Sigmobile, pages 92-103, ACM, September 2008. :::icon
42. J.Ding and B.-Y. Yang, "Multivariate Polynomials for Hashing," INSCRYPT 2007, post-proceedings, Lecture Notes in Computer Science, volume 4990, Springer, pages 358-371, State Key Laboratory of Information Security, August 2008, Xining, China, August 31 -- September 5, 2007. :::icon
43. J. Ding, V. Dubois, B.-Y. Yang*, C.-M. Cheng, and C.-H. O. Chen#, "Can SFLASH be saved?," Int'l Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, volume 5126, Springer, pages 691-701, EATCS, July 2008. :::icon
44. J. Ding, B.-Y. Yang*, C-H. O. Chen#, M.-S. Chen#, C.-M. Cheng, "New Differential-Algebraic Attacks and Reparametrization of Rainbow," Proc. 6th Applied Computer and Network Security, Lecture Notes in Computer Science, volume 5037, S. Bellovin et al, editor, Springer, pages 242-257, June 2008. :::icon
45. J. Ding, C. Wolf, and B.-Y. Yang, "\ell-Invertible Cycles for Multivariate Quadratic Public Key Cryptography," Proc. 11th International Workshop on Public Key Cryptography, Lecture Notes in Computer Science, volume 4450, Springer, pages 266-283, International Association of Cryptological Research, April 2007. :::icon
46. B.-Y. Yang, O. C.-H. Chen#, D. J. Bernstein, and J.-M. Chen, "Analysis of QUAD," IACR International Workshop for Fast Software Encryption, Lecture Notes in Computer Science, volume 4593, pages 290-307, Luxemberg City, Luxemberg, March 2007. :::icon
47. W. Yan, B.-Y. Yang, and Y.-N. Yeh,, "The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators," Appl. Math. Lett., volume 20, pages 290-295, 2007. :::icon
48. I. Gutman, W. Yan, B.-Y. Yang, and Y.-N. Yeh, "Generalized Wiener Indices of Zigzagging Pentachains," Journal of Mathematical Chemistry, volume 42, number 2, pages 103-117, 2007. :::icon
49. B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen,, "Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems," the 3rd Security of Pervasive Computing Conference, Lecture Notes in Computer Science, volume 3934, Lecture Notes in Computer Science, pages 73-88, June 2006. :::icon
50. S.-P. Eu, B.-Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," International Journal of Quantum Chemistry, 2006. :::icon
51. Y.-H. Hu, L.-C. Wang, and B.-Y. Yang,, "A “Medium-Field” Multivariate Public-Key Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages 132-149, 2006. :::icon
52. M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, "Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations," 8th Conf´erence des M´ethodes Effectives en G´eom´etrie Algebrique, April 2005. :::icon
53. L.-C. Wang, Y.-H. Hu, F.-P. Lai, C.-Y. Chou, and B.-Y. Yang,, "Tractable Rational Map Signature," Proc. 2005 IACR Int’l Workshop for Public-Key Cryptography, volume 3386, Lecture Notes in Computer Science, pages 244-257, 2005. :::icon
54. B.-Y. Yang and J.-M. Chen,, "Building Secure Tame-Like Multivariate Public-Key Cryptosystems: the New TTS," Proc. 10th Australasian Conference on Info. Sec. and Privacy, volume 3574, Lecture Notes in Computer Science, pages 518-531, 2005. :::icon
55. B.-Y. Yang and J.-M. Chen,, "Theoretical Analysis of XL over Small Fields," Proc. 9th Australasian Conference on Info. Sec. and Privacy, volume 3108, Lecture Notes in Computer Science, pages 277-288, 2004. :::icon
56. B.-Y. Yang, J.-M. Chen, and N. Courtois,, "On Asymptotic Security Estimates in XL and Gr¨obner Bases-Related Algebraic Cryptanalysis," Proc. 2004 International Conference on Information and Communications Security, volume 3269, Lecture Notes in Computer Science, pages 401-413, 2004. :::icon
57. B.-Y. Yang, J.-M. Chen, and Y.-H. Chen,, "TTS: High-Speed Signatures on a Low-Cost Smart Card," Proc. 2004Workshop on Cryptographic Hardware and Embedded Systems, volume 3156, Lecture Notes in Computer Science, pages 371-385, 2004. :::icon
58. B.-Y. Yang and Y. Yeh,, "Wiener Polynomials of some Chemically Interesting Graphs," International Journal of Quantum Chemistry, pages 80-91, 2004. :::icon
59. B.-Y. Yang and Y. Yeh,, "A Crowning Moment for Wiener Indices," Applied Mathematical, pages 333-340, 2004. :::icon
60. B.-Y. Yang and J.-M. Chen,, "All in the XL Family: Theory and Practice," Proc. 7th International Conference on Information Security and Cryptology, volume 3506, Lecture Notes in Computer Science, pages 67-86, 2004. :::icon
 
 
bg