The SCEAS System
Navigation Menu

Search the dblp DataBase


Bo-Yin Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bo-Yin Yang, Jiun-Ming Chen
    Theoretical Analysis of XL over Small Fields. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:277-288 [Conf]
  2. Bo-Yin Yang, Jiun-Ming Chen
    Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:518-531 [Conf]
  3. Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen
    TTS: High-Speed Signatures on a Low-Cost Smart Card. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:371-385 [Conf]
  4. Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai
    A "Medium-Field" Multivariate Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:132-149 [Conf]
  5. Bo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois
    On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:401-413 [Conf]
  6. Jiun-Ming Chen, Bo-Yin Yang
    A More Secure and Efficacious TTS Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:320-338 [Conf]
  7. Bo-Yin Yang, Jiun-Ming Chen
    All in the XL Family: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:67-86 [Conf]
  8. Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang
    Tractable Rational Map Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:244-257 [Conf]
  9. Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen
    Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:73-88 [Conf]
  10. Weigen Yan, Bo-Yin Yang, Yeong-Nan Yeh
    The behavior of Wiener indices and polynomials of graphs under five graph decorations. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2007, v:20, n:3, pp:290-295 [Journal]
  11. Wen-Chung Huang, Bo-Yin Yang, Yeong-Nan Yeh
    From Ternary Strings to Wiener Indices of Benzenoid Chains. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1997, v:73, n:2, pp:113-131 [Journal]
  12. Hsien-Kuei Hwang, Bo-Yin Yang, Yeong-Nan Yeh
    Presorting algorithms: An average-case point of view. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:242, n:1-2, pp:29-40 [Journal]
  13. Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jiun-Ming Chen
    Analysis of QUAD [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:290-308 [Conf]
  14. Jintai Ding, Christopher Wolf, Bo-Yin Yang
    l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:266-281 [Conf]

  15. New Differential-Algebraic Attacks and Reparametrization of Rainbow. [Citation Graph (, )][DBLP]

  16. A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP]

  17. SSE Implementation of Multivariate PKCs on Modern x86 CPUs. [Citation Graph (, )][DBLP]

  18. Fast Exhaustive Search for Polynomial Systems in F2. [Citation Graph (, )][DBLP]

  19. Multivariates Polynomials for Hashing. [Citation Graph (, )][DBLP]

  20. Square, a New Multivariate Encryption Scheme. [Citation Graph (, )][DBLP]

  21. ECM on Graphics Cards. [Citation Graph (, )][DBLP]

  22. Could SFLASH be Repaired?. [Citation Graph (, )][DBLP]

  23. GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP]

  24. SPATE: small-group PKI-less authenticated trust establishment. [Citation Graph (, )][DBLP]

  25. Secure PRNGs from Specialized Polynomial Maps over Any . [Citation Graph (, )][DBLP]

  26. Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. [Citation Graph (, )][DBLP]

Search in 0.015secs, Finished in 0.016secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002