



Publications 

1. 
Andy Polyakov, MingHsien Tsai, BowYaw Wang, and BoYin Yang, "Verifying Arithmetic Assembly Programs in Cryptographic Primitives," to appear in The 29th International Conference on Concurrency Theory (CONCUR 2018), Lecture Notes in Computer Science, Sven Schewe and Lijun Zhang, editors. 
2. 
R. Niederhagen, K.C. Ning and B.Y. Yang, "Implementing JouxVitse's Crossbred Algorithm for Solving MQ Systems on GPUs," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 121141, April 2018. 
3. 
D. J. Bernstein and B.Y. Yang, "Asymptotically faster quantum algorithms to solve multivariate quadratic equations," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 487506, April 2018. 
4. 
M.H. Tsai, B.Y. Wang, and B.Y. Yang, "Certified Verification of Algebraic Properties on LowLevel Mathematical Constructs in Cryptographic Programs," ACM CCS 2017, ACM, October 2017. 
5. 
A. Petzoldt, M.S. Chen, J. Ding, and B.Y. Yang, "MHFEv  An Efficient Multivariate Signature Scheme," PostQuantum Cryptography, Lecture Notes in Computer Science, volume 10346, T. Lange and T. Takagi, editor, Springer, pages 205223, June 2017. 
6. 
ShangYi Yang, PoChun Kuo, BoYin Yang, and ChenMou Cheng, "Gauss Sieve Algorithm on GPUs," Cryptographer's Track, RSA conference, Lecture Notes in Computer Science, volume 10159, Helena Handschuh, editor, pages 3957, February 2017. 
7. 
B.Y. Peng, Y.C. Hsu, Y.J. Chen, D.C. Chueh, C.M. Cheng, B.Y. Yang, "Multicore FPGA Implementation of ECC with Homogeneous CoZ Coordinate Representation," CANSCryptology and Network Security, Lecture Notes in Computer Science, volume 10052, Lecture Notes in Computer science, Sara Foresti and Giuseppe Persiano, editors, Springer, pages 626636, November 2016. 
8. 
A. Petzoldt, M.S. Chen, B.Y. Yang, C. Tao, and J. Ding, "Design Principles for HFEv Based Multivariate Signature Schemes," Advances in Cryptology  ASIACRASIACYPT 2015  21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29  December 3, 2015, Proceedings, Part I., Lecture Notes in Computer Science, volume 9452, Tetsu Iwata and Jung Hee Cheon, editors, Springer, pages 311334, November 2015. ::: 
9. 
D. J. Bernstein, S. Josefsson, T. Lange, P. Schwabe, and B.Y. Yang, "EdDSA for more curves," number 677, IACR Cryptology ePrint Archive October 2015. 
10. 
YuFang Chen, ChangHong Hsu, HsinHung Lin, Peter Schwabe, MingHsien Tsai, BowYaw Wang, BoYin Yang, and ShangYi Yang, "Verifying Curve25519 Software," ACM Conference on Computer and Communications Security (CCS 2014), November 2014. ::: 
11. 
Y.A. Chang, M.S. Chen, J.S. Wu and B.Y. Yang, "Postquantum SSL/TLS for Embedded Systems," IoTS workshop at IEEE SOCA, November 2014. ::: 
12. 
R. Fitzpatrick, C. Bischof, J. Buchmann, Ö. Dagdelen, F. Göpfert, A. Mariano, B.Y. Yang, "Tuning Gauss Sieve for Speed," Latincrypt, Lecture Notes in Computer Science, 8895, volume 8895, Lecture Notes in Computer Science, pages 288305, September 2014. ::: 
13. 
Y.A. Chang, W.C. Hong, M.C. Hsiao, B.Y. Yang, A.Y. Wu, and C.M. Cheng, "Hydra: An energyefficient programmable cryptographic coprocessor supporting ellipticcurve pairings over fields of large characteristics," International Workshop on Security, IWSEC, Lecture Notes in Computer Science, volume 8639, Lecture Notes in Computer Science, pages 174186, August 2014. ::: 
14. 
J. C.Y. Yeh, C.M. Cheng, B.Y. Yang, "Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal MQ} with Number of Equations Linear in That of Variables," Number Theory and Cryptography Workshop, Lecture Notes in Computer Science, number 8260, pages 1933, November 2013. ::: 
15. 
Y.H. Chiu, W.C. Hong, L.P. Chou, J. Ding, B.Y. Yang and C.M. Cheng, "A practical attack on patched MIFARE Classic," Inscrypt, Lecture Notes in Computer Science, 8567, pages 150164, November 2013, PostProceedings, published 2014 ::: 
16. 
C. Bouillaguet, C.M. Cheng, T. Chou, R. Niederhagen, B.Y. Yang, "Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs," Selected Areas in Cryptography, Lecture Notes in Computer Science, volume 8282, pages 206222, August 2013. ::: 
17. 
S. Tanaka, T. Yasuda, B.Y. Yang, C.M. Cheng, K. Sakurai, "Efficient Computing over GF(2^16) Using Graphics Processing Unit," Seventh International IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pages 843846, July 2013. 
18. 
M.S. Chen, C.M. Cheng, B.Y. Yang, "RAIDq: A softwarefriendly, multipleparity RAID," USENIX HotStorage, USENIX, June 2013. ::: 
19. 
J. Ding and B.Y. Yang*, "Degree of Regularity for HFEv and HFEv," Postquantum Cryptography, Lecture Notes in Computer Science, volume 7932, Philippe Gaborit, editor, Springer, pages 5266, June 2013. ::: 
20. 
J.R. Shih, Y. Hu, M.C. Hsiao, M.S. Chen, W.T. Shen, B.Y. Yang, and C.M. Cheng, "Securing M2M with PostQuantum PublicKey Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 3, number 1, pages 106116, January 2013. ::: 
21. 
C.H. Yu and B.Y. Yang, "Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation," Security of Computers and Networks, Lecture Notes in Computer Science, 7485, Ivan Visconti and Roberto De Prisco, editor, Springer, pages 426444, September 2012. ::: 
22. 
D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.Y. Yang, "Highspeed highsecurity signatures," Journal of Cryptographic Engineering, volume 2, pages 7789, September 2012, Previous version of the same name presented at CHES 2011 ::: 
23. 
T. Chou, C.M. Cheng, R. Niederhagen, and B.Y. Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 7428, E Prouff and P. Shaumont, editor, pages 356373, IACR, September 2012. ::: 
24. 
S. Tanaka, T. Chou, B.Y. Yang, C.M. Cheng, K. Sakurai, "Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs," Workshop on Information Security Applications, Lecture Notes in Computer Science, volume 7690, pages 2842, August 2012. 
25. 
P. Schwabe, S.Y. Yang, and B.Y. Yang, "SHA3 on ARM11 processors," Africacrypt, Lecture Notes in Computer Science, volume 7293, pages 190205, July 2012, July 1012, Ifrane, Morocco ::: 
26. 
Y.J. Huang, F.H. Liu, B.Y. Yang, "PublicKey Cryptography from New Multivariate Quadratic Assumptions," PublicKey Cryptography, Lecture Notes in Computer Science, volume 7293, Marc Fischlin, editor, Springer, pages 190295, IACR, May 2012. ::: 
27. 
"PostQuantum Cryptography," B.Y. Yang, editor, Lecture Notes in Computer Science, volume 7071, Springer, November 2011. 
28. 
L. Goubin, J. Patarin, and *B.Y. Yang,, chapter "Multivariate Cryptosystems," Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, editor, pages 824828, Springer, November 2011. 
29. 
D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.Y. Yang, "Highspeed highsecurity signatures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, Springer, pages 124142, September 2011. ::: 
30. 
P.C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.M. Cheng*, and B.Y. Yang, "Extreme Enumeration on GPU and in Clouds," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, pages 176191, September 2011. ::: 
31. 
K.M. Chung, F.H. Liu*, C.J. Lu, and B.Y. Yang, "Efficient StringCommitment from Weak BitCommitment and FullSpectrum Amplification Theorem for Puzzles," Advances in Cryptology  ASIACRYPT, Lecture Notes in Computer Science, volume 6477, Springer, pages 268282, IACR, December 2010. ::: 
32. 
D. J. Bernstein, H.C. Chen, C.M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.Y. Yang, "ECC2K130 on NVIDIA GPUs," Indocrypt, Lecture Notes in Computer Science, volume 6498, pages 328344, December 2010. ::: 
33. 
C. Bouillaguet, H.C. Chen#, C.M. Cheng, T. Chou#, R. Niederhagen#, A. Shamir, and *B.Y. Yang, "Fast Exhaustive Search for Polynomial Systems in $\mathbf{F_2}$," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 6225, pages 203218, August 2010. ::: 
34. 
C.I Lee, T.C. Wu*, B.Y. Yang and W.G. Tzeng, "New Secure Broadcasting Scheme Realizing Information Granularity," J. of Information Science and Engineering, volume 26, number 4, pages 15091523, July 2010. 
35. 
Y.H. Lin, A. Studer, Y.H. Chen, H.C. Hsiao, E. L.H. Kuo#, J. Lee, J. McCune, K.H. Wang, M. Krohn, A. Perrig, B.Y. Yang, H.M. Sun, and P.L. Lin, "SPATE: Smallgroup PKIless Authenticated Trust Establishment," IEEE Trans. Mobile Computing, volume 9, number 12, pages 16661681, 2010, Extended version after the MobiSys best paper award ::: 
36. 
KaiMin Chung, FengHao Liu, ChiJen Lu, and BoYin Yang, "Efficient stringcommitment from weak bitcommitment and fullspectrum amplification theorem for puzzles," Advances in Cryptology  ASIACRYPT, Lecture Notes in Computer Science, pages 268282, 2010. ::: 
37. 
A. I.T. Chen#, M.S. Chen#, T.R. Chen#, C.M. Cheng, J. Ding, E. L.H. Kuo#, F. Y.S. Lee#, and B.Y. Yang*, "SSE implementation of multivariate PKCs on modern x86 CPUs," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 5747, Springer, pages 3348, IACR, September 2009. ::: 
38. 
Y.H. Lin, A. Studer, H.C. Hsiao, J. McCune, K.H. Wang, M. Krohn, P.L. Lin, A. Perrig, H.M. Sun, B.Y. Yang, "SPATE: Smallgroup PKIless Authenticated Trust Establishment," Mobisys, Jason Flinn and Anthony LaMarca, editor, ACM SigMobile, pages 114, June 2009, ISBN 9781605585666 ::: 
39. 
J. Baena, M.S. Chen#, C. Clough*, J. Ding, and B.Y. Yang, "Square, a New Multivariate Encryption Scheme," CTRSA  Cryptographer's Track, RSA Conference, Lecture Notes in Computer Science, volume 5473, M. Fischlin, editor, Springer, pages 252264, April 2009. ::: 
40. 
A. Studer, C. Studer, H.C. Hsiao, Y.H. Lin, K.H. Wang, A. Perrig, H.M. Sun, B.Y. Yang, "Study of UserFriendly Hash Comparison Schemes," ACSAC, pages 105114, IEEE Computer Society, 2009, December 711, Honolulu 
41. 
D. J. Bernstein, T.R. Chen#, C.M. Cheng, T. Lange, and B.Y. Yang, "Elliptic Curve Method on Video Cards," Advances in Cryptology  Eurocrypt, Lecture Notes in Computer Science, volume 5479, Antoine Joux, editor, pages 483501, IACR, 2009. ::: 
42. 
J. Ding and B.Y. Yang*,, chapter "Multivariate Cryptosystems," PostQuantum Cryptography, D. J. Bernstein and J. Buchmann and E. Dahmen, editors, pages 193241, Springer, 2009, ISBN 9783540887010 ::: 
43. 
A. I.T. Chen#, C.H. O. Chen#, M.S. Chen#, C.M. Cheng and B.Y. Yang*, "PracticalSized Instances of Multivariate PKCs: Rainbow, TTS, and $\ell$ICderivatives," PostQuantum Crypto, Lecture Notes in Computer Science, volume 5299, Jintai Ding and Johannes Buchmann, editor, pages 95106, October 2008, PostQuantum Crypto workshop 2008, Cincinnati ::: 
44. 
F.H. Liu#, C.J. Lu, and B.Y. Yang*, "Secure PRNGs from Specialized Polynomial Maps over Any $\mathrm{GF}(q)$," PostQuantum Crypto, Lecture Notes in Computer Science, volume 5299, Johannes Buchmann Jintai Ding, editor, pages 181202, October 2008. ::: 
45. 
C.H. O. Chen#, C.W. Chen, C. Kuo, Y.H. Lai, J. McCune, *A. Perrig, A. Studer, B.Y. Yang, T.C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Mobicom, Sigmobile, pages 92103, ACM, September 2008. ::: 
46. 
J.Ding and B.Y. Yang, "Multivariate Polynomials for Hashing," INSCRYPT 2007, postproceedings, Lecture Notes in Computer Science, volume 4990, Springer, pages 358371, State Key Laboratory of Information Security, August 2008, Xining, China, August 31  September 5, 2007. ::: 
47. 
J. Ding, V. Dubois, B.Y. Yang*, C.M. Cheng, and C.H. O. Chen#, "Can SFLASH be saved?," Int'l Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, volume 5126, Springer, pages 691701, EATCS, July 2008. ::: 
48. 
J. Ding, B.Y. Yang*, CH. O. Chen#, M.S. Chen#, C.M. Cheng, "New DifferentialAlgebraic Attacks and Reparametrization of Rainbow," Proc. 6th Applied Computer and Network Security, Lecture Notes in Computer Science, volume 5037, S. Bellovin et al, editor, Springer, pages 242257, June 2008. ::: 
49. 
J. Ding, C. Wolf, and B.Y. Yang, "\ellInvertible Cycles for Multivariate Quadratic Public Key Cryptography," Proc. 11th International Workshop on Public Key Cryptography, Lecture Notes in Computer Science, volume 4450, Springer, pages 266283, International Association of Cryptological Research, April 2007. ::: 
50. 
B.Y. Yang, O. C.H. Chen#, D. J. Bernstein, and J.M. Chen, "Analysis of QUAD," IACR International Workshop for Fast Software Encryption, Lecture Notes in Computer Science, volume 4593, pages 290307, Luxemberg City, Luxemberg, March 2007. ::: 
51. 
I. Gutman, W. Yan, B.Y. Yang, and Y.N. Yeh, "Generalized Wiener Indices of Zigzagging Pentachains," Journal of Mathematical Chemistry, volume 42, number 2, pages 103117, 2007. ::: 
52. 
W. Yan, B.Y. Yang, and Y.N. Yeh,, "The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators," Appl. Math. Lett., volume 20, pages 290295, 2007. ::: 
53. 
B.Y. Yang, C.M. Cheng, B.R. Chen, and J.M. Chen,, "Implementing Minimized Multivariate PublicKey Cryptosystems on LowResource Embedded Systems," the 3rd Security of Pervasive Computing Conference, Lecture Notes in Computer Science, volume 3934, Lecture Notes in Computer Science, pages 7388, June 2006. ::: 
54. 
S.P. Eu, B.Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," International Journal of Quantum Chemistry, 2006. ::: 
55. 
Y.H. Hu, L.C. Wang, and B.Y. Yang,, "A “MediumField” Multivariate PublicKey Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages 132149, 2006. ::: 
56. 
M. Bardet, J.C. Faugère, B. Salvy, and B.Y. Yang, "Asymptotic Expansion of the Degree of Regularity for SemiRegular Systems of Equations," 8th Conf´erence des M´ethodes Effectives en G´eom´etrie Algebrique, April 2005. ::: 
57. 
L.C. Wang, Y.H. Hu, F.P. Lai, C.Y. Chou, and B.Y. Yang,, "Tractable Rational Map Signature," Proc. 2005 IACR Int’l Workshop for PublicKey Cryptography, volume 3386, Lecture Notes in Computer Science, pages 244257, 2005. ::: 
58. 
B.Y. Yang and J.M. Chen,, "Building Secure TameLike Multivariate PublicKey Cryptosystems: the New TTS," Proc. 10th Australasian Conference on Info. Sec. and Privacy, volume 3574, Lecture Notes in Computer Science, pages 518531, 2005. ::: 
59. 
B.Y. Yang, J.M. Chen, and N. Courtois,, "On Asymptotic Security Estimates in XL and Gr¨obner BasesRelated Algebraic Cryptanalysis," Proc. 2004 International Conference on Information and Communications Security, volume 3269, Lecture Notes in Computer Science, pages 401413, 2004. ::: 
60. 
B.Y. Yang and J.M. Chen,, "Theoretical Analysis of XL over Small Fields," Proc. 9th Australasian Conference on Info. Sec. and Privacy, volume 3108, Lecture Notes in Computer Science, pages 277288, 2004. ::: 
61. 
B.Y. Yang and J.M. Chen,, "All in the XL Family: Theory and Practice," Proc. 7th International Conference on Information Security and Cryptology, volume 3506, Lecture Notes in Computer Science, pages 6786, 2004. ::: 
62. 
B.Y. Yang, J.M. Chen, and Y.H. Chen,, "TTS: HighSpeed Signatures on a LowCost Smart Card," Proc. 2004Workshop on Cryptographic Hardware and Embedded Systems, volume 3156, Lecture Notes in Computer Science, pages 371385, 2004. ::: 
63. 
B.Y. Yang and Y. Yeh,, "Wiener Polynomials of some Chemically Interesting Graphs," International Journal of Quantum Chemistry, pages 8091, 2004. ::: 
64. 
B.Y. Yang and Y. Yeh,, "A Crowning Moment for Wiener Indices," Applied Mathematical, pages 333340, 2004. ::: 











