Chinese
English
Research Fellow/Professor  |  Yang, Bo-Yin  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
invited_visit
honors
publications
others
supervised
Personal (New window)
 
 
 
 
 
Publications
 
1. Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Signed Cryptographic Program Verification with Typed CryptoLine," to appear in ACM CCS 2019, ACM.
2. Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Verifying Arithmetic in Cryptographic C Programs," to appear in Automated Software Engineering Conference, IEEE/ACM.
3. D. J. Bernstein and Bo-Yin Yang, "Fast constant-time gcd computation and modular inversion," IACR Transactions on Cryptographic Hardware and Embedded Systems, volume 3, pages 340-398, April 2019.
4. Andy Polyakov, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang, "Verifying Arithmetic Assembly Programs in Cryptographic Primitives," The 29th International Conference on Concurrency Theory (CONCUR 2018), Lecture Notes in Computer Science, Sven Schewe and Lijun Zhang, editors, August 2018. :::icon
5. W.-D. Li, M.-S. Chen, P.-C. Kuo, C.-M. Cheng, and B.-Y. Yang, "Frobenius Additive Fast Fourier Transform," ISSAC, ACM, July 2018. :::icon
6. D. J. Bernstein and B.-Y. Yang, "Asymptotically faster quantum algorithms to solve multivariate quadratic equations," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 487-506, April 2018. :::icon
7. R. Niederhagen, K.-C. Ning and B.-Y. Yang, "Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems on GPUs," PQCRYPTO, Lecture Notes in Computer Science, volume 10786, Springer, pages 121-141, April 2018. :::icon
8. M.-S. Chen, W.-D. Li, B.-Y. Peng, B.-Y. Yang, and C.-M. Cheng, "Implementing 128-bit Secure MPKC Signatures," IEICE Transactions, volume E101(A), number 3, pages 553-569, January 2018. :::icon
9. M.-H. Tsai, B.-Y. Wang, and B.-Y. Yang, "Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs," ACM CCS 2017, ACM, October 2017. :::icon
10. A. Petzoldt, M.-S. Chen, J. Ding, and B.-Y. Yang, "MHFEv - An Efficient Multivariate Signature Scheme," Post-Quantum Cryptography, Lecture Notes in Computer Science, volume 10346, T. Lange and T. Takagi, editor, Springer, pages 205-223, June 2017. :::icon
11. Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng, "Gauss Sieve Algorithm on GPUs," Cryptographer's Track, RSA conference, Lecture Notes in Computer Science, volume 10159, Helena Handschuh, editor, pages 39-57, February 2017. :::icon
12. B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, C.-M. Cheng, B.-Y. Yang, "Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation," CANS-Cryptology and Network Security, Lecture Notes in Computer Science, volume 10052, Lecture Notes in Computer science, Sara Foresti and Giuseppe Persiano, editors, Springer, pages 626-636, November 2016. :::icon
13. A. Petzoldt, M.-S. Chen, B.-Y. Yang, C. Tao, and J. Ding, "Design Principles for HFEv- Based Multivariate Signature Schemes," Advances in Cryptology - ASIACRASIACYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I., Lecture Notes in Computer Science, volume 9452, Tetsu Iwata and Jung Hee Cheon, editors, Springer, pages 311-334, November 2015. :::icon
14. D. J. Bernstein, S. Josefsson, T. Lange, P. Schwabe, and B.-Y. Yang, "EdDSA for more curves," number 677, IACR Cryptology ePrint Archive October 2015.
15. Y.-A. Chang, M.-S. Chen, J.-S. Wu and B.-Y. Yang, "Postquantum SSL/TLS for Embedded Systems," IoTS workshop at IEEE SOCA, November 2014. :::icon
16. Y.-F. Chen, C.-H. Hsu, H.-H. Lin, P. Schwabe, M.-H. Tsai, B.-Y. Wang, B.-Y. Yang, and S.-Y. Yang, "Verifying Curve25519 Software," ACM Conference on Computer and Communications Security (CCS 2014), November 2014. :::icon
17. R. Fitzpatrick, C. Bischof, J. Buchmann, Ö. Dagdelen, F. Göpfert, A. Mariano, B.-Y. Yang, "Tuning Gauss Sieve for Speed," Latincrypt, Lecture Notes in Computer Science, 8895, volume 8895, Lecture Notes in Computer Science, pages 288-305, September 2014. :::icon
18. Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y. Yang, A.-Y. Wu, and C.-M. Cheng, "Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics," International Workshop on Security, IWSEC, Lecture Notes in Computer Science, volume 8639, Lecture Notes in Computer Science, pages 174-186, August 2014. :::icon
19. Y.-H. Chiu, W.-C. Hong, L.-P. Chou, J. Ding, B.-Y. Yang and C.-M. Cheng, "A practical attack on patched MIFARE Classic," Inscrypt, Lecture Notes in Computer Science, 8567, pages 150-164, November 2013, Post-Proceedings, published 2014 :::icon
20. J. C.-Y. Yeh, C.-M. Cheng, B.-Y. Yang, "Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal MQ} with Number of Equations Linear in That of Variables," Number Theory and Cryptography Workshop, Lecture Notes in Computer Science, number 8260, pages 19-33, November 2013. :::icon
21. C. Bouillaguet, C.-M. Cheng, T. Chou, R. Niederhagen, B.-Y. Yang, "Fast Exhaustive Search for Quadratic Systems in $\\mathbb{F}_2$ on FPGAs," Selected Areas in Cryptography, Lecture Notes in Computer Science, volume 8282, pages 206-222, August 2013. :::icon
22. S. Tanaka, T. Yasuda, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Computing over GF(2^16) Using Graphics Processing Unit," Seventh International IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pages 843-846, July 2013.
23. J. Ding and B.-Y. Yang*, "Degree of Regularity for HFEv and HFEv-," Postquantum Cryptography, Lecture Notes in Computer Science, volume 7932, Philippe Gaborit, editor, Springer, pages 52-66, June 2013. :::icon
24. M.-S. Chen, C.-M. Cheng, B.-Y. Yang, "RAIDq: A software-friendly, multiple-parity RAID," USENIX HotStorage, USENIX, June 2013. :::icon
25. J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-T. Shen, B.-Y. Yang, and C.-M. Cheng, "Securing M2M with Post-Quantum Public-Key Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 3, number 1, pages 106-116, January 2013. :::icon
26. C.-H. Yu and B.-Y. Yang, "Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation," Security of Computers and Networks, Lecture Notes in Computer Science, 7485, Ivan Visconti and Roberto De Prisco, editor, Springer, pages 426-444, September 2012. :::icon
27. T. Chou, C.-M. Cheng, R. Niederhagen, and B.-Y. Yang, "Solving Quadratic Equations with XL on Parallel Architectures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 7428, E Prouff and P. Shaumont, editor, pages 356-373, IACR, September 2012. :::icon
28. D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Journal of Cryptographic Engineering, volume 2, pages 77-89, September 2012, Previous version of the same name presented at CHES 2011 :::icon
29. S. Tanaka, T. Chou, B.-Y. Yang, C.-M. Cheng, K. Sakurai, "Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs," Workshop on Information Security Applications, Lecture Notes in Computer Science, volume 7690, pages 28-42, August 2012.
30. P. Schwabe, S.-Y. Yang, and B.-Y. Yang, "SHA-3 on ARM11 processors," Africacrypt, Lecture Notes in Computer Science, volume 7293, pages 190-205, July 2012, July 10-12, Ifrane, Morocco :::icon
31. Y.-J. Huang, F.-H. Liu, B.-Y. Yang, "Public-Key Cryptography from New Multivariate Quadratic Assumptions," Public-Key Cryptography, Lecture Notes in Computer Science, volume 7293, Marc Fischlin, editor, Springer, pages 190-295, IACR, May 2012. :::icon
32. L. Goubin, J. Patarin, and *B.-Y. Yang,, chapter "Multivariate Cryptosystems," Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, editor, pages 824-828, Springer, November 2011.
33. "Post-Quantum Cryptography," B.-Y. Yang, editor, Lecture Notes in Computer Science, volume 7071, Springer, November 2011.
34. D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang, "High-speed high-security signatures," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, Springer, pages 124-142, September 2011. :::icon
35. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.-M. Cheng*, and B.-Y. Yang, "Extreme Enumeration on GPU and in Clouds," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 6917, B. Preneel and T. Takagi, editor, pages 176-191, September 2011. :::icon
36. K.-M. Chung, F.-H. Liu*, C.-J. Lu, and B.-Y. Yang, "Efficient String-Commitment from Weak Bit-Commitment and Full-Spectrum Amplification Theorem for Puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, volume 6477, Springer, pages 268-282, IACR, December 2010. :::icon
37. D. J. Bernstein, H.-C. Chen, C.-M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.-Y. Yang, "ECC2K-130 on NVIDIA GPUs," Indocrypt, Lecture Notes in Computer Science, volume 6498, pages 328-344, December 2010. :::icon
38. C. Bouillaguet, H.-C. Chen#, C.-M. Cheng, T. Chou#, R. Niederhagen#, A. Shamir, and *B.-Y. Yang, "Fast Exhaustive Search for Polynomial Systems in $\mathbf{F_2}$," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 6225, pages 203-218, August 2010. :::icon
39. C.-I Lee, T.-C. Wu*, B.-Y. Yang and W.-G. Tzeng, "New Secure Broadcasting Scheme Realizing Information Granularity," J. of Information Science and Engineering, volume 26, number 4, pages 1509-1523, July 2010.
40. Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo#, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y. Yang, H.-M. Sun, and P.-L. Lin, "SPATE: Small-group PKI-less Authenticated Trust Establishment," IEEE Trans. Mobile Computing, volume 9, number 12, pages 1666-1681, 2010, Extended version after the MobiSys best paper award :::icon
41. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, and Bo-Yin Yang, "Efficient string-commitment from weak bit-commitment and full-spectrum amplification theorem for puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, pages 268-282, 2010. :::icon
42. A. I.-T. Chen#, M.-S. Chen#, T.-R. Chen#, C.-M. Cheng, J. Ding, E. L.-H. Kuo#, F. Y.-S. Lee#, and B.-Y. Yang*, "SSE implementation of multivariate PKCs on modern x86 CPUs," Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, volume 5747, Springer, pages 33-48, IACR, September 2009. :::icon
43. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, B.-Y. Yang, "SPATE: Small-group PKI-less Authenticated Trust Establishment," Mobisys, Jason Flinn and Anthony LaMarca, editor, ACM SigMobile, pages 1-14, June 2009, ISBN 978-1-60558-566-6 :::icon
44. J. Baena, M.-S. Chen#, C. Clough*, J. Ding, and B.-Y. Yang, "Square, a New Multivariate Encryption Scheme," CT-RSA -- Cryptographer's Track, RSA Conference, Lecture Notes in Computer Science, volume 5473, M. Fischlin, editor, Springer, pages 252-264, April 2009. :::icon
45. A. Studer, C. Studer, H.-C. Hsiao, Y.-H. Lin, K.-H. Wang, A. Perrig, H.-M. Sun, B.-Y. Yang, "Study of User-Friendly Hash Comparison Schemes," ACSAC, pages 105-114, IEEE Computer Society, 2009, December 7-11, Honolulu
46. D. J. Bernstein, T.-R. Chen#, C.-M. Cheng, T. Lange, and B.-Y. Yang, "Elliptic Curve Method on Video Cards," Advances in Cryptology -- Eurocrypt, Lecture Notes in Computer Science, volume 5479, Antoine Joux, editor, pages 483-501, IACR, 2009. :::icon
47. J. Ding and B.-Y. Yang*,, chapter "Multivariate Cryptosystems," Post-Quantum Cryptography, D. J. Bernstein and J. Buchmann and E. Dahmen, editors, pages 193-241, Springer, 2009, ISBN 978-3-540-88701-0 :::icon
48. F.-H. Liu#, C.-J. Lu, and B.-Y. Yang*, "Secure PRNGs from Specialized Polynomial Maps over Any $\mathrm{GF}(q)$," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Johannes Buchmann Jintai Ding, editor, pages 181-202, October 2008. :::icon
49. A. I.-T. Chen#, C.-H. O. Chen#, M.-S. Chen#, C.-M. Cheng and B.-Y. Yang*, "Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and $\ell$IC-derivatives," Post-Quantum Crypto, Lecture Notes in Computer Science, volume 5299, Jintai Ding and Johannes Buchmann, editor, pages 95-106, October 2008, Post-Quantum Crypto workshop 2008, Cincinnati :::icon
50. C.-H. O. Chen#, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, *A. Perrig, A. Studer, B.-Y. Yang, T.-C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Mobicom, Sigmobile, pages 92-103, ACM, September 2008. :::icon
51. J.Ding and B.-Y. Yang, "Multivariate Polynomials for Hashing," INSCRYPT 2007, post-proceedings, Lecture Notes in Computer Science, volume 4990, Springer, pages 358-371, State Key Laboratory of Information Security, August 2008, Xining, China, August 31 -- September 5, 2007. :::icon
52. J. Ding, V. Dubois, B.-Y. Yang*, C.-M. Cheng, and C.-H. O. Chen#, "Can SFLASH be saved?," Int'l Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, volume 5126, Springer, pages 691-701, EATCS, July 2008. :::icon
53. J. Ding, B.-Y. Yang*, C-H. O. Chen#, M.-S. Chen#, C.-M. Cheng, "New Differential-Algebraic Attacks and Reparametrization of Rainbow," Proc. 6th Applied Computer and Network Security, Lecture Notes in Computer Science, volume 5037, S. Bellovin et al, editor, Springer, pages 242-257, June 2008. :::icon
54. J. Ding, C. Wolf, and B.-Y. Yang, "\ell-Invertible Cycles for Multivariate Quadratic Public Key Cryptography," Proc. 11th International Workshop on Public Key Cryptography, Lecture Notes in Computer Science, volume 4450, Springer, pages 266-283, International Association of Cryptological Research, April 2007. :::icon
55. B.-Y. Yang, O. C.-H. Chen#, D. J. Bernstein, and J.-M. Chen, "Analysis of QUAD," IACR International Workshop for Fast Software Encryption, Lecture Notes in Computer Science, volume 4593, pages 290-307, Luxemberg City, Luxemberg, March 2007. :::icon
56. W. Yan, B.-Y. Yang, and Y.-N. Yeh,, "The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators," Appl. Math. Lett., volume 20, pages 290-295, 2007. :::icon
57. I. Gutman, W. Yan, B.-Y. Yang, and Y.-N. Yeh, "Generalized Wiener Indices of Zigzagging Pentachains," Journal of Mathematical Chemistry, volume 42, number 2, pages 103-117, 2007. :::icon
58. B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen,, "Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems," the 3rd Security of Pervasive Computing Conference, Lecture Notes in Computer Science, volume 3934, Lecture Notes in Computer Science, pages 73-88, June 2006. :::icon
59. Y.-H. Hu, L.-C. Wang, and B.-Y. Yang,, "A “Medium-Field” Multivariate Public-Key Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages 132-149, 2006. :::icon
60. S.-P. Eu, B.-Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," International Journal of Quantum Chemistry, 2006. :::icon
61. M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, "Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations," 8th Conf´erence des M´ethodes Effectives en G´eom´etrie Algebrique, April 2005. :::icon
62. B.-Y. Yang and J.-M. Chen,, "Building Secure Tame-Like Multivariate Public-Key Cryptosystems: the New TTS," Proc. 10th Australasian Conference on Info. Sec. and Privacy, volume 3574, Lecture Notes in Computer Science, pages 518-531, 2005. :::icon
63. L.-C. Wang, Y.-H. Hu, F.-P. Lai, C.-Y. Chou, and B.-Y. Yang,, "Tractable Rational Map Signature," Proc. 2005 IACR Int’l Workshop for Public-Key Cryptography, volume 3386, Lecture Notes in Computer Science, pages 244-257, 2005. :::icon
64. B.-Y. Yang and J.-M. Chen,, "All in the XL Family: Theory and Practice," Proc. 7th International Conference on Information Security and Cryptology, volume 3506, Lecture Notes in Computer Science, pages 67-86, 2004. :::icon
65. B.-Y. Yang and J.-M. Chen,, "Theoretical Analysis of XL over Small Fields," Proc. 9th Australasian Conference on Info. Sec. and Privacy, volume 3108, Lecture Notes in Computer Science, pages 277-288, 2004. :::icon
66. B.-Y. Yang, J.-M. Chen, and Y.-H. Chen,, "TTS: High-Speed Signatures on a Low-Cost Smart Card," Proc. 2004Workshop on Cryptographic Hardware and Embedded Systems, volume 3156, Lecture Notes in Computer Science, pages 371-385, 2004. :::icon
67. B.-Y. Yang, J.-M. Chen, and N. Courtois,, "On Asymptotic Security Estimates in XL and Gr¨obner Bases-Related Algebraic Cryptanalysis," Proc. 2004 International Conference on Information and Communications Security, volume 3269, Lecture Notes in Computer Science, pages 401-413, 2004. :::icon
68. B.-Y. Yang and Y. Yeh,, "Wiener Polynomials of some Chemically Interesting Graphs," International Journal of Quantum Chemistry, pages 80-91, 2004. :::icon
69. B.-Y. Yang and Y. Yeh,, "A Crowning Moment for Wiener Indices," Applied Mathematical, pages 333-340, 2004. :::icon
 
 
bg