中文版
English
研究員  |  楊柏因  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
invited_visit
honors
grants
publications
others
supervised
 
 
 
 
 
Publications
 
1. Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, and Shang-Yi Yang, "Verifying Curve25519 Software," to appear in ACMCCS 2014,.
2. J. C.-Y. Yeh, C.-M. Cheng, B.-Y. Yang, "Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal MQ} with Number of Equations Linear in That of Variables," Number Theory and Cryptography Workshop, Lecture Notes in Computer Science, number 8260, pages 19-33, November 2013. :::icon
3. C. Bouillaguet, C.-M. Cheng, T. Chou, R. Niederhagen, B.-Y. Yang, "Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs," Selected Areas in Cryptography, Lecture Notes in Computer Science, volume 8282, pages 206-222, August 2013. :::icon
4. J. Ding and B.-Y. Yang*, "Degree of Regularity for HFEv and HFEv-," Postquantum Cryptography, Lecture Notes in Computer Science, volume 7932, Philippe Gaborit, editor, Springer, pages 52-66, June 2013. :::icon
5. J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-T. Shen, B.-Y. Yang, and C.-M. Cheng, "Securing M2M with Post-Quantum Public-Key Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 3, number 1, pages 106-116, January 2013. :::icon
6. C.-H. Yu and B.-Y. Yang, "Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation," Security of Computers and Networks, Lecture Notes in Computer Science, 7485, Ivan Visconti and Roberto De Prisco, editor, Springer, pages 426-444, September 2012. :::icon
7. T. Chou, C.-M. Cheng, R. Niederhagen, and B.-Y. Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 7428, E Prouff and P. Shaumont, editor, pages 356-373, IACR, September 2012. :::icon
8. D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Journal of Cryptographic Engineering, volume 2, pages 77-89, September 2012, Previous version of the same name presented at CHES 2011 :::icon
9. S. Tanaka, T. Chou, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs," Workshop on Information Security Applications, Lecture Notes in Computer Science, volume 7690, pages 28-42, August 2012.
10. P. Schwabe, S.-Y. Yang, and B.-Y. Yang, "SHA-3 on ARM11 processors," Africacrypt, Lecture Notes in Computer Science, volume 7293, pages 190-205, July 2012, July 10-12, Ifrane, Morocco :::icon
11. Y.-J. Huang, F.-H. Liu, B.-Y. Yang, "Public-Key Cryptography from New Multivariate Quadratic Assumptions," Public-Key Cryptography, Lecture Notes in Computer Science, volume 7293, Marc Fischlin, editor, Springer, pages 190-295, IACR, May 2012. :::icon
12. "Post-Quantum Cryptography," B.-Y. Yang, editor, Lecture Notes in Computer Science, volume 7071, Springer, November 2011.
13. L. Goubin, J. Patarin, and *B.-Y. Yang,, chapter "Multivariate Cryptosystems," Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, editor, pages 824-828, Springer, November 2011.
14. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.-M. Cheng*, and B.-Y. Yang, "Extreme Enumeration on GPU and in Clouds," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, pages 176-191, September 2011. :::icon
15. K.-M. Chung, F.-H. Liu*, C.-J. Lu, and B.-Y. Yang, "Efficient String-Commitment from Weak Bit-Commitment and Full-Spectrum Amplification Theorem for Puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, volume 6477, Springer, pages 268-282, IACR, December 2010. :::icon
16. D. J. Bernstein, H.-C. Chen, C.-M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.-Y. Yang, "ECC2K-130 on NVIDIA GPUs," Indocrypt, Lecture Notes in Computer Science, volume 6498, pages 328-344, December 2010. :::icon
17. C. Bouillaguet, H.-C. Chen#, C.-M. Cheng, T. Chou#, R. Niederhagen#, A. Shamir, and *B.-Y. Yang, "Fast Exhaustive Search for Polynomial Systems in $\mathbf{F_2}$," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 6225, pages 203-218, August 2010. :::icon
18. C.-I Lee, T.-C. Wu*, B.-Y. Yang and W.-G. Tzeng, "New Secure Broadcasting Scheme Realizing Information Granularity," J. of Information Science and Engineering, volume 26, number 4, pages 1509-1523, July 2010.
19. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, and Bo-Yin Yang, "Efficient string-commitment from weak bit-commitment and full-spectrum amplification theorem for puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, pages 268-282, 2010. :::icon
20. Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo#, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y. Yang, H.-M. Sun, and P.-L. Lin, "SPATE: Small-group PKI-less Authenticated Trust Establishment," IEEE Trans. Mobile Computing, volume 9, number 12, pages 1666-1681, 2010, Extended version after the MobiSys best paper award :::icon
21. A. I.-T. Chen#, M.-S. Chen#, T.-R. Chen#, C.-M. Cheng, J. Ding, E. L.-H. Kuo#, F. Y.-S. Lee#, and B.-Y. Yang*, "SSE implementation of multivariate PKCs on modern x86 CPUs," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 5747, Springer, pages 33-48, IACR, September 2009. :::icon
22. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, B.-Y. Yang, "SPATE: Small-group PKI-less Authenticated Trust Establishment," Mobisys, Jason Flinn and Anthony LaMarca, editor, ACM SigMobile, pages 1-14, June 2009, ISBN 978-1-60558-566-6 :::icon
23. J. Baena, M.-S. Chen#, C. Clough*, J. Ding, and B.-Y. Yang, "Square, a New Multivariate Encryption Scheme," CT-RSA -- Cryptographer's Track, RSA Conference, Lecture Notes in Computer Science, volume 5473, M. Fischlin, editor, Springer, pages 252-264, April 2009. :::icon
24. A. Studer, C. Studer, H.-C. Hsiao, Y.-H. Lin, K.-H. Wang, A. Perrig, H.-M. Sun, B.-Y. Yang, "Study of User-Friendly Hash Comparison Schemes," ACSAC, pages 105-114, IEEE Computer Society, 2009, December 7-11, Honolulu
25. D. J. Bernstein, T.-R. Chen#, C.-M. Cheng, T. Lange, and B.-Y. Yang, "Elliptic Curve Method on Video Cards," Advances in Cryptology -- Eurocrypt, Lecture Notes in Computer Science, volume 5479, Antoine Joux, editor, pages 483-501, IACR, 2009. :::icon
26. J. Ding and B.-Y. Yang*,, chapter "Multivariate Cryptosystems," Post-Quantum Cryptography, D. J. Bernstein and J. Buchmann and E. Dahmen, editors, pages 193-241, Springer, 2009, ISBN 978-3-540-88701-0 :::icon
27. F.-H. Liu#, C.-J. Lu, and B.-Y. Yang*, "Secure PRNGs from Specialized Polynomial Maps over Any $\mathrm{GF}(q)$," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Johannes Buchmann Jintai Ding, editor, pages 181-202, October 2008. :::icon
28. A. I.-T. Chen#, C.-H. O. Chen#, M.-S. Chen#, C.-M. Cheng and B.-Y. Yang*, "Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and $\ell$IC-derivatives," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Jintai Ding and Johannes Buchmann, editor, pages 95-106, October 2008, Post-Quantum Crypto workshop 2008, Cincinnati :::icon
29. C.-H. O. Chen#, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, *A. Perrig, A. Studer, B.-Y. Yang, T.-C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Mobicom, Sigmobile, pages 92-103, ACM, September 2008. :::icon
30. J.Ding and B.-Y. Yang, "Multivariate Polynomials for Hashing," INSCRYPT 2007, post-proceedings, Lecture Notes in Computer Science, volume 4990, Springer, pages 358-371, State Key Laboratory of Information Security, August 2008, Xining, China, August 31 -- September 5, 2007. :::icon
31. J. Ding, V. Dubois, B.-Y. Yang*, C.-M. Cheng, and C.-H. O. Chen#, "Can SFLASH be saved?," Int'l Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, volume 5126, Springer, pages 691-701, EATCS, July 2008. :::icon
32. J. Ding, B.-Y. Yang*, C-H. O. Chen#, M.-S. Chen#, C.-M. Cheng, "New Differential-Algebraic Attacks and Reparametrization of Rainbow," Proc. 6th Applied Computer and Network Security, Lecture Notes in Computer Science, volume 5037, S. Bellovin et al, editor, Springer, pages 242-257, June 2008. :::icon
33. J. Ding, C. Wolf, and B.-Y. Yang, "\ell-Invertible Cycles for Multivariate Quadratic Public Key Cryptography," Proc. 11th International Workshop on Public Key Cryptography, Lecture Notes in Computer Science, volume 4450, Springer, pages 266-283, International Association of Cryptological Research, April 2007. :::icon
34. B.-Y. Yang, O. C.-H. Chen#, D. J. Bernstein, and J.-M. Chen, "Analysis of QUAD," IACR International Workshop for Fast Software Encryption, Lecture Notes in Computer Science, volume 4593, pages 290-307, Luxemberg City, Luxemberg, March 2007. :::icon
35. W. Yan, B.-Y. Yang, and Y.-N. Yeh,, "The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators," Appl. Math. Lett., volume 20, pages 290-295, 2007. :::icon
36. I. Gutman, W. Yan, B.-Y. Yang, and Y.-N. Yeh, "Generalized Wiener Indices of Zigzagging Pentachains," Journal of Mathematical Chemistry, volume 42, number 2, pages 103-117, 2007. :::icon
37. B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen,, "Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems," the 3rd Security of Pervasive Computing Conference, Lecture Notes in Computer Science, volume 3934, Lecture Notes in Computer Science, pages 73-88, June 2006. :::icon
38. Y.-H. Hu, L.-C. Wang, and B.-Y. Yang,, "A “Medium-Field” Multivariate Public-Key Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages 132-149, 2006. :::icon
39. S.-P. Eu, B.-Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," International Journal of Quantum Chemistry, 2006. :::icon
40. M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, "Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations," 8th Conf´erence des M´ethodes Effectives en G´eom´etrie Algebrique, April 2005. :::icon
41. B.-Y. Yang and J.-M. Chen,, "Building Secure Tame-Like Multivariate Public-Key Cryptosystems: the New TTS," Proc. 10th Australasian Conference on Info. Sec. and Privacy, volume 3574, Lecture Notes in Computer Science, pages 518-531, 2005. :::icon
42. L.-C. Wang, Y.-H. Hu, F.-P. Lai, C.-Y. Chou, and B.-Y. Yang,, "Tractable Rational Map Signature," Proc. 2005 IACR Int’l Workshop for Public-Key Cryptography, volume 3386, Lecture Notes in Computer Science, pages 244-257, 2005. :::icon
43. B.-Y. Yang, J.-M. Chen, and Y.-H. Chen,, "TTS: High-Speed Signatures on a Low-Cost Smart Card," Proc. 2004Workshop on Cryptographic Hardware and Embedded Systems, volume 3156, Lecture Notes in Computer Science, pages 371-385, 2004. :::icon
44. B.-Y. Yang, J.-M. Chen, and N. Courtois,, "On Asymptotic Security Estimates in XL and Gr¨obner Bases-Related Algebraic Cryptanalysis," Proc. 2004 International Conference on Information and Communications Security, volume 3269, Lecture Notes in Computer Science, pages 401-413, 2004. :::icon
45. B.-Y. Yang and J.-M. Chen,, "All in the XL Family: Theory and Practice," Proc. 7th International Conference on Information Security and Cryptology, volume 3506, Lecture Notes in Computer Science, pages 67-86, 2004. :::icon
46. B.-Y. Yang and J.-M. Chen,, "Theoretical Analysis of XL over Small Fields," Proc. 9th Australasian Conference on Info. Sec. and Privacy, volume 3108, Lecture Notes in Computer Science, pages 277-288, 2004. :::icon
47. B.-Y. Yang and Y. Yeh,, "Wiener Polynomials of some Chemically Interesting Graphs," International Journal of Quantum Chemistry, pages 80-91, 2004. :::icon
48. B.-Y. Yang and Y. Yeh,, "A Crowning Moment for Wiener Indices," Applied Mathematical, pages 333-340, 2004. :::icon
 
 
bg