Bo-Yin Yang

Orcid: 0000-0002-9362-5282

According to our database1, Bo-Yin Yang authored at least 113 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BGJ15 Revisited: Sieving with Streamed Memory Access.
IACR Cryptol. ePrint Arch., 2024

Jumping for Bernstein-Yang Inversion.
IACR Cryptol. ePrint Arch., 2024

2023
Streamlined NTRU Prime on FPGA.
J. Cryptogr. Eng., June, 2023

Oil and Vinegar: Modern Parameters and Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Fast Exhaustive Search for Polynomial Systems over F3.
IACR Cryptol. ePrint Arch., 2023

Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking.
IACR Cryptol. ePrint Arch., 2023

Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime.
IACR Cryptol. ePrint Arch., 2023

Algorithmic Views of Vectorized Polynomial Multipliers - NTRU.
IACR Cryptol. ePrint Arch., 2023

Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper).
IACR Cryptol. ePrint Arch., 2023

A 4.8mW, 800Mbps Hybrid Crypto SoC for Post-Quantum Secure Neural Interfacing.
Proceedings of the 2023 IEEE Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits), 2023

llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

CoqCryptoLine: A Verified Model Checker with Certified Results.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

Certified Verification for Algebraic Abstraction.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

2022
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE.
IACR Cryptol. ePrint Arch., 2022

Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms.
IACR Cryptol. ePrint Arch., 2022

Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Rainbow on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Parallelization on Gauss Sieve Algorithm over Ideal Lattice.
J. Inf. Sci. Eng., 2021

High Performance Post-Quantum Key Exchange on FPGAs.
J. Inf. Sci. Eng., 2021

Verifying Post-Quantum Signatures in 8 kB of RAM.
IACR Cryptol. ePrint Arch., 2021

Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions.
IACR Cryptol. ePrint Arch., 2021

CoqQFBV: A Scalable Certified SMT Quantifier-Free Bit-Vector Solver.
Proceedings of the Computer Aided Verification - 33rd International Conference, 2021

2020
Power Analysis on NTRU Prime.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.
IACR Cryptol. ePrint Arch., 2020

NTT Multiplication for NTT-unfriendly Rings.
IACR Cryptol. ePrint Arch., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

2019
Fast constant-time gcd computation and modular inversion.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Correlation Power Analysis on NTRU Prime and Related Countermeasures.
IACR Cryptol. ePrint Arch., 2019

Verifying Arithmetic in Cryptographic C Programs.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Signed Cryptographic Program Verification with Typed CryptoLine.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Implementing 128-Bit Secure MPKC Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform.
CoRR, 2018

Frobenius Additive Fast Fourier Transform.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

Verifying Arithmetic Assembly Programs in Cryptographic Primitives (Invited Talk).
Proceedings of the 29th International Conference on Concurrency Theory, 2018

2017
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
IACR Cryptol. ePrint Arch., 2017

Post-Quantum Key Exchange on FPGAs.
IACR Cryptol. ePrint Arch., 2017

Asymptotically faster quantum algorithms to solve multivariate quadratic equations.
IACR Cryptol. ePrint Arch., 2017

Faster Multiplication for Long Binary Polynomials.
CoRR, 2017

HMFEv - An Efficient Multivariate Signature Scheme.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Gauss Sieve Algorithm on GPUs.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
IACR Cryptol. ePrint Arch., 2016

Solving Quadratic Equations with XL on Parallel Architectures - extended version.
IACR Cryptol. ePrint Arch., 2016

2015
EdDSA for more curves.
IACR Cryptol. ePrint Arch., 2015

Design Principles for HFEv- Based Multivariate Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Tuning GaussSieve for Speed.
IACR Cryptol. ePrint Arch., 2014

Postquantum SSL/TLS for Embedded Systems.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Proceedings of the Advances in Information and Computer Security, 2014

A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Verifying Curve25519 Software.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013

Securing M2M With Post-Quantum Public-Key Cryptography.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013

Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Degree of Regularity for HFEv and HFEv-.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

RAIDq: A Software-friendly, Multiple-parity RAID.
Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems, 2013

A Practical Attack on Patched MIFARE Classic.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Proceedings of the Number Theory and Cryptography, 2013

2012
High-speed high-security signatures.
J. Cryptogr. Eng., 2012

Public-Key Cryptography from New Multivariate Quadratic Assumptions.
IACR Cryptol. ePrint Arch., 2012

Usable assembly language for GPUs: a success story.
IACR Cryptol. ePrint Arch., 2012

ECC2K-130 on NVIDIA GPUs.
IACR Cryptol. ePrint Arch., 2012

Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Solving Quadratic Equations with XL on Parallel Architectures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Multivariate Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.
IACR Cryptol. ePrint Arch., 2011

SHA-3 on ARM11 processors.
IACR Cryptol. ePrint Arch., 2011

Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

New Secure Broadcasting Scheme Realizing Information Granularity.
J. Inf. Sci. Eng., 2010

Fast Exhaustive Search for Polynomial Systems in F<sub>2</sub>.
IACR Cryptol. ePrint Arch., 2010

Fast Exhaustive Search for Polynomial Systems in <i>F</i><sub>2</sub>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Efficient String-Commitment from Weak Bit-Commitment.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Could SFLASH be repaired?
IACR Cryptol. ePrint Arch., 2009

Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Square, a New Multivariate Encryption Scheme.
Proceedings of the Topics in Cryptology, 2009

SSE Implementation of Multivariate PKCs on Modern x86 CPUs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
New Differential-Algebraic Attacks and Reparametrization of Rainbow.
IACR Cryptol. ePrint Arch., 2008

Odd-Char Multivariate Hidden Field Equations.
IACR Cryptol. ePrint Arch., 2008

Small Odd Prime Field Multivariate PKCs.
IACR Cryptol. ePrint Arch., 2008

ECM on Graphics Cards.
IACR Cryptol. ePrint Arch., 2008

Secure PRNGs from Specialized Polynomial Maps over Any .
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

2007
Secure PRNGs from Specialized Polynomial Maps over Any F<sub>q</sub>.
IACR Cryptol. ePrint Arch., 2007

Breaking the Symmetry: a Way to Resist the New Differential Attack.
IACR Cryptol. ePrint Arch., 2007

Multivariates Polynomials for Hashing.
IACR Cryptol. ePrint Arch., 2007

The behavior of Wiener indices and polynomials of graphs under five graph decorations.
Appl. Math. Lett., 2007

<i>l</i>-Invertible Cycles for <i>M</i>ultivariate <i>Q</i>uadratic (<i>MQ</i>) Public Key Cryptography.
Proceedings of the Public Key Cryptography, 2007

Analysis of QUAD
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Note on Design Criteria for Rainbow-Type Multivariates.
IACR Cryptol. ePrint Arch., 2006

Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

A "Medium-Field" Multivariate Public-Key Encryption Scheme.
Proceedings of the Topics in Cryptology, 2006

2005
Tractable Rational Map Signature.
Proceedings of the Public Key Cryptography, 2005

Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
TTS: Rank Attacks in Tame-Like Multivariate PKCs.
IACR Cryptol. ePrint Arch., 2004

Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack.
IACR Cryptol. ePrint Arch., 2004

All in the XL Family: Theory and Practice.
Proceedings of the Information Security and Cryptology, 2004

On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

TTS: High-Speed Signatures on a Low-Cost Smart Card.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

Theoretical Analysis of XL over Small Fields.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A More Secure and Efficacious TTS Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

2000
Presorting algorithms: An average-case point of view.
Theor. Comput. Sci., 2000

1997
From Ternary Strings to Wiener Indices of Benzenoid Chains.
Discret. Appl. Math., 1997


  Loading...