Bo-Yin Yang
Orcid: 0000-0002-9362-5282
According to our database1,
Bo-Yin Yang
authored at least 113 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper).
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 2023 IEEE Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits), 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the Computer Aided Verification - 35th International Conference, 2023
Proceedings of the Computer Aided Verification - 35th International Conference, 2023
2022
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2021
NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Computer Aided Verification - 33rd International Conference, 2021
2020
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform.
CoRR, 2018
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018
Proceedings of the 29th International Conference on Concurrency Theory, 2018
2017
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Proceedings of the Advances in Information and Computer Security, 2014
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Proceedings of the Number Theory and Cryptography, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.
IACR Cryptol. ePrint Arch., 2011
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
IEEE Trans. Mob. Comput., 2010
J. Inf. Sci. Eng., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
The behavior of Wiener indices and polynomials of graphs under five graph decorations.
Appl. Math. Lett., 2007
<i>l</i>-Invertible Cycles for <i>M</i>ultivariate <i>Q</i>uadratic (<i>MQ</i>) Public Key Cryptography.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Topics in Cryptology, 2006
2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security and Cryptology, 2004
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
2000
1997
Discret. Appl. Math., 1997