Chen-Mou Cheng
According to our database1,
Chen-Mou Cheng
authored at least 75 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
2022
Cryptogr., 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Efficient Algorithm to Compute Odd-Degree Isogenies Between Montgomery Curves for CSIDH.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform.
CoRR, 2018
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018
Proceedings of the Functional and Logic Programming - 14th International Symposium, 2018
2017
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
Int. J. Netw. Comput., 2016
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
A 1.96mm<sup>2</sup> low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
2014
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics.
Proceedings of the Advances in Information and Computer Security, 2014
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014
Lattice-based cryptanalysis - How to estimate the security parameter of lattice-based cryptosystem.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2014
Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices.
IEEE J. Sel. Areas Commun., 2013
Fast Exhaustive Search for Quadratic Systems in 𝔽<sub>2</sub> on FPGAs - Extended Version.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Proceedings of the Number Theory and Cryptography, 2013
2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
J. Inf. Sci. Eng., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Proceedings of the 39th International Conference on Parallel Processing, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Maximizing Throughput of UAV-Relaying Networks with the Load-Carry-and-Deliver Paradigm.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Performance Measurement of 802.11a Wireless Links from UAV to Ground Nodes with Various Antenna Orientations.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006
Adjacent Channel Interference in Dual-radio 802.11a Nodes and Its Impact on Multi-hop Networking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the Global Telecommunications Conference, 2002