What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bo-Yin Yang
Google Scholar
52
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Sieving with Streaming Memory Access.
Ziyu Zhao
Jintai Ding
Bo-Yin Yang
2025
journals/tches
Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography.
Chun-Ming Chiu
Jiaxiang Liu
Ming-Hsien Tsai
Xiaomu Shi
Bow-Yaw Wang
Bo-Yin Yang
2025
conf/ndss
PQConnect: Automated Post-Quantum End-to-End Tunnels.
Daniel J. Bernstein
Tanja Lange
Jonathan Levin
Bo-Yin Yang
2025
journals/tches
A New Trick for Polynomial Multiplication A verified CRT polymul utilizing a monomial factor.
Chun-Ming Chiu
Bo-Yin Yang
Bow-Yaw Wang
2024
conf/acisp
Jumping for Bernstein-Yang Inversion.
Li-Jie Jian
Ting-Yuan Wang
Bo-Yin Yang
Ming-Shing Chen
2024
conf/acns
Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime.
Vincent Hwang
Chi-Ting Liu
Bo-Yin Yang
2024
conf/esorics
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking.
Li-Chang Lai
Jiaxiang Liu
Xiaomu Shi
Ming-Hsien Tsai
Bow-Yaw Wang
Bo-Yin Yang
2023
journals/tches
Oil and Vinegar: Modern Parameters and Implementations.
Ward Beullens
Ming-Shing Chen
Shih-Hao Hung
Matthias J. Kannwischer
Bo-Yuan Peng
Cheng-Jhih Shih
Bo-Yin Yang
2022
journals/tches
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4.
Amin Abdulrahman
Jiun-Peng Chen
Yu-Jia Chen
Vincent Hwang
Matthias J. Kannwischer
Bo-Yin Yang
2022
journals/tches
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1.
Hanno Becker
Vincent Hwang
Matthias J. Kannwischer
Bo-Yin Yang
Shang-Yi Yang
2022
journals/tches
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4.
Erdem Alkim
Vincent Hwang
Bo-Yin Yang
2022
journals/tches
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU.
Vincent Hwang
Jiaxiang Liu
Gregor Seiler
Xiaomu Shi
Ming-Hsien Tsai
Bow-Yaw Wang
Bo-Yin Yang
2022
conf/icics
Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4.
Tzu-Hsien Chang
Yen-Ting Kuo
Jiun-Peng Chen
Bo-Yin Yang
2022
conf/iwsec
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms.
Hanno Becker
Vincent Hwang
Matthias J. Kannwischer
Lorenz Panny
Bo-Yin Yang
2021
journals/tches
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.
Erdem Alkim
Dean Yun-Li Cheng
Chi-Ming Marvin Chung
Hülya Evkan
Leo Wei-Lun Huang
Vincent Hwang
Ching-Lin Trista Li
Ruben Niederhagen
Cheng-Jhih Shih
Julian Wälde
Bo-Yin Yang
2021
journals/tches
NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2.
Chi-Ming Marvin Chung
Vincent Hwang
Matthias J. Kannwischer
Gregor Seiler
Cheng-Jhih Shih
Bo-Yin Yang
2021
journals/tches
Rainbow on Cortex-M4.
Tung Chou
Matthias J. Kannwischer
Bo-Yin Yang
2021
conf/eurocrypt
The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes.
Jintai Ding
Joshua Deaton
Vishakha
Bo-Yin Yang
2020
journals/tches
Power Analysis on NTRU Prime.
Wei-Lun Huang
Jiun-Peng Chen
Bo-Yin Yang
2019
journals/tches
Fast constant-time gcd computation and modular inversion.
Daniel J. Bernstein
Bo-Yin Yang
2019
conf/ccs
Signed Cryptographic Program Verification with Typed CryptoLine.
Yu-Fu Fu
Jiaxiang Liu
Xiaomu Shi
Ming-Hsien Tsai
Bow-Yaw Wang
Bo-Yin Yang
2017
conf/ccs
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs.
Ming-Hsien Tsai
Bow-Yaw Wang
Bo-Yin Yang
2017
conf/ctrsa
Gauss Sieve Algorithm on GPUs.
Shang-Yi Yang
Po-Chun Kuo
Bo-Yin Yang
Chen-Mou Cheng
2016
conf/cans
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
Bo-Yuan Peng
Yuan-Che Hsu
Yu-Jia Chen
Di-Chia Chueh
Chen-Mou Cheng
Bo-Yin Yang
2015
conf/asiacrypt
Design Principles for HFEv- Based Multivariate Signature Schemes.
Albrecht Petzoldt
Ming-Shing Chen
Bo-Yin Yang
Chengdong Tao
Jintai Ding
2014
conf/latincrypt
Tuning GaussSieve for Speed.
Robert Fitzpatrick
Christian H. Bischof
Johannes Buchmann
Özgür Dagdelen
Florian Göpfert
Artur Mariano
Bo-Yin Yang
2014
conf/ccs
Verifying Curve25519 Software.
Yu-Fang Chen
Chang-Hong Hsu
Hsin-Hung Lin
Peter Schwabe
Ming-Hsien Tsai
Bow-Yaw Wang
Bo-Yin Yang
Shang-Yi Yang
2014
conf/iwsec
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Yun-An Chang
Wei-Chih Hong
Ming-Chun Hsiao
Bo-Yin Yang
An-Yeu Wu
Chen-Mou Cheng
2013
conf/sacrypt
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Charles Bouillaguet
Chen-Mou Cheng
Tung Chou
Ruben Niederhagen
Bo-Yin Yang
2012
conf/ches
Solving Quadratic Equations with XL on Parallel Architectures.
Chen-Mou Cheng
Tung Chou
Ruben Niederhagen
Bo-Yin Yang
2012
conf/wisa
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Satoshi Tanaka
Tung Chou
Bo-Yin Yang
Chen-Mou Cheng
Kouichi Sakurai
2012
conf/pkc
Public-Key Cryptography from New Multivariate Quadratic Assumptions.
Yun-Ju Huang
Feng-Hao Liu
Bo-Yin Yang
2012
conf/africacrypt
SHA-3 on ARM11 Processors.
Peter Schwabe
Bo-Yin Yang
Shang-Yi Yang
2011
conf/ches
High-Speed High-Security Signatures.
Daniel J. Bernstein
Niels Duif
Tanja Lange
Peter Schwabe
Bo-Yin Yang
2011
conf/ches
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Po-Chun Kuo
Michael Schneider
Özgür Dagdelen
Jan Reichelt
Johannes Buchmann
Chen-Mou Cheng
Bo-Yin Yang
2010
conf/ches
<sub>2</sub>.
Charles Bouillaguet
Hsieh-Chung Chen
Chen-Mou Cheng
Tung Chou
Ruben Niederhagen
Adi Shamir
Bo-Yin Yang
2010
conf/asiacrypt
Efficient String-Commitment from Weak Bit-Commitment.
Kai-Min Chung
Feng-Hao Liu
Chi-Jen Lu
Bo-Yin Yang
2009
conf/ches
SSE Implementation of Multivariate PKCs on Modern x86 CPUs.
Anna Inn-Tung Chen
Ming-Shing Chen
Tien-Ren Chen
Chen-Mou Cheng
Jintai Ding
Eric Li-Hsiang Kuo
Frost Yu-Shuang Lee
Bo-Yin Yang
2009
conf/ctrsa
Square, a New Multivariate Encryption Scheme.
Crystal Clough
John Baena
Jintai Ding
Bo-Yin Yang
Ming-Shing Chen
2009
conf/eurocrypt
ECM on Graphics Cards.
Daniel J. Bernstein
Tien-Ren Chen
Chen-Mou Cheng
Tanja Lange
Bo-Yin Yang
2009
conf/acsac
A Study of User-Friendly Hash Comparison Schemes.
Hsu-Chun Hsiao
Yue-Hsun Lin
Ahren Studer
Cassandra Studer
King-Hang Wang
Hiroaki Kikuchi
Adrian Perrig
Hung-Min Sun
Bo-Yin Yang
2008
conf/acns
New Differential-Algebraic Attacks and Reparametrization of Rainbow.
Jintai Ding
Bo-Yin Yang
Chia-Hsin Owen Chen
Ming-Shing Chen
Chen-Mou Cheng
2007
conf/fse
Analysis of QUAD
Bo-Yin Yang
Chia-Hsin Owen Chen
Daniel J. Bernstein
Jiun-Ming Chen
2007
conf/pkc
) Public Key Cryptography.
Jintai Ding
Christopher Wolf
Bo-Yin Yang
2006
conf/ctrsa
A "Medium-Field" Multivariate Public-Key Encryption Scheme.
Lih-Chung Wang
Bo-Yin Yang
Yuh-Hua Hu
Feipei Lai
2005
conf/acisp
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.
Bo-Yin Yang
Jiun-Ming Chen
2005
conf/pkc
Tractable Rational Map Signature.
Lih-Chung Wang
Yuh-Hua Hu
Feipei Lai
Chun-yen Chou
Bo-Yin Yang
2004
conf/acisp
Theoretical Analysis of XL over Small Fields.
Bo-Yin Yang
Jiun-Ming Chen
2004
conf/icisc
All in the XL Family: Theory and Practice.
Bo-Yin Yang
Jiun-Ming Chen
2004
conf/ches
TTS: High-Speed Signatures on a Low-Cost Smart Card.
Bo-Yin Yang
Jiun-Ming Chen
Yen-Hung Chen
2004
conf/icics
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Bo-Yin Yang
Jiun-Ming Chen
Nicolas T. Courtois
2003
conf/icisc
A More Secure and Efficacious TTS Signature Scheme.
Jiun-Ming Chen
Bo-Yin Yang
Coauthors
Adi Shamir
(1)
Adrian Perrig
(1)
Ahren Studer
(1)
Albrecht Petzoldt
(1)
Amin Abdulrahman
(1)
An-Yeu Wu
(1)
Anna Inn-Tung Chen
(1)
Artur Mariano
(1)
Bo-Yin Yang
(52)
Bo-Yuan Peng
(2)
Bow-Yaw Wang
(7)
Cassandra Studer
(1)
Chang-Hong Hsu
(1)
Charles Bouillaguet
(2)
Chen-Mou Cheng
(11)
Cheng-Jhih Shih
(3)
Chengdong Tao
(1)
Chi-Jen Lu
(1)
Chi-Ming Marvin Chung
(2)
Chi-Ting Liu
(1)
Chia-Hsin Owen Chen
(2)
Ching-Lin Trista Li
(1)
Christian H. Bischof
(1)
Christopher Wolf
(1)
Chun-Ming Chiu
(2)
Chun-yen Chou
(1)
Crystal Clough
(1)
Daniel J. Bernstein
(5)
Dean Yun-Li Cheng
(1)
Di-Chia Chueh
(1)
Erdem Alkim
(2)
Eric Li-Hsiang Kuo
(1)
Feipei Lai
(2)
Feng-Hao Liu
(2)
Florian Göpfert
(1)
Frost Yu-Shuang Lee
(1)
Gregor Seiler
(2)
Hanno Becker
(2)
Hiroaki Kikuchi
(1)
Hsieh-Chung Chen
(1)
Hsin-Hung Lin
(1)
Hsu-Chun Hsiao
(1)
Hülya Evkan
(1)
Hung-Min Sun
(1)
Jan Reichelt
(1)
Jiaxiang Liu
(4)
Jintai Ding
(7)
Jiun-Ming Chen
(7)
Jiun-Peng Chen
(3)
Johannes Buchmann
(2)
John Baena
(1)
Jonathan Levin
(1)
Joshua Deaton
(1)
Julian Wälde
(1)
Kai-Min Chung
(1)
King-Hang Wang
(1)
Kouichi Sakurai
(1)
Leo Wei-Lun Huang
(1)
Li-Chang Lai
(1)
Li-Jie Jian
(1)
Lih-Chung Wang
(2)
Lorenz Panny
(1)
Matthias J. Kannwischer
(6)
Michael Schneider
(1)
Ming-Chun Hsiao
(1)
Ming-Hsien Tsai
(6)
Ming-Shing Chen
(6)
Nicolas T. Courtois
(1)
Niels Duif
(1)
Özgür Dagdelen
(2)
Peter Schwabe
(3)
Po-Chun Kuo
(2)
Robert Fitzpatrick
(1)
Ruben Niederhagen
(4)
Satoshi Tanaka
(1)
Shang-Yi Yang
(4)
Shih-Hao Hung
(1)
Tanja Lange
(3)
Tien-Ren Chen
(2)
Ting-Yuan Wang
(1)
Tung Chou
(5)
Tzu-Hsien Chang
(1)
Vincent Hwang
(8)
Vishakha
(1)
Ward Beullens
(1)
Wei-Chih Hong
(1)
Wei-Lun Huang
(1)
Xiaomu Shi
(4)
Yen-Hung Chen
(1)
Yen-Ting Kuo
(1)
Yu-Fang Chen
(1)
Yu-Fu Fu
(1)
Yu-Jia Chen
(2)
Yuan-Che Hsu
(1)
Yue-Hsun Lin
(1)
Yuh-Hua Hu
(2)
Yun-An Chang
(1)
Yun-Ju Huang
(1)
Ziyu Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to