High-speed high-security signatures DJ Bernstein, N Duif, T Lange, P Schwabe, BY Yang Journal of cryptographic engineering 2 (2), 77-89, 2012 | 1015 | 2012 |
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems M Bardet, JC Faugere, B Salvy, BY Yang Proc. of MEGA 5, 2-2, 2005 | 289* | 2005 |
Multivariate public key cryptography J Ding, BY Yang Post-quantum cryptography, 193-241, 2009 | 189 | 2009 |
New differential-algebraic attacks and reparametrization of rainbow J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng Applied Cryptography and Network Security: 6th International Conference …, 2008 | 172 | 2008 |
Design principles for HFEv-based multivariate signature schemes A Petzoldt, MS Chen, BY Yang, C Tao, J Ding Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015 | 158 | 2015 |
NTT multiplication for NTT-unfriendly rings: New speed records for Saber and NTRU on Cortex-M4 and AVX2 CMM Chung, V Hwang, MJ Kannwischer, G Seiler, CJ Shih, BY Yang IACR Transactions on Cryptographic Hardware and Embedded Systems, 159-188, 2021 | 141 | 2021 |
The behavior of Wiener indices and polynomials of graphs under five graph decorations W Yan, BY Yang, YN Yeh Applied Mathematics Letters 20 (3), 290-295, 2007 | 139 | 2007 |
SSE implementation of multivariate PKCs on modern x86 CPUs AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ... International workshop on cryptographic hardware and embedded systems, 33-48, 2009 | 132 | 2009 |
Building secure tame-like multivariate public-key cryptosystems: The new TTS BY Yang, JM Chen Australasian Conference on Information Security and Privacy, 518-531, 2005 | 132 | 2005 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 126 | 2009 |
Fast constant-time gcd computation and modular inversion DJ Bernstein, BY Yang IACR Transactions on Cryptographic Hardware and Embedded Systems, 340-398, 2019 | 124 | 2019 |
Fast exhaustive search for polynomial systems in C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ... International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010 | 123 | 2010 |
All in the XL family: Theory and practice BY Yang, JM Chen Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 119 | 2005 |
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis BY Yang, JM Chen, NT Courtois Information and Communications Security, 401-413, 2004 | 113 | 2004 |
ECM on graphics cards DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 112 | 2009 |
Theoretical analysis of XL over small fields BY Yang, JM Chen Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 109 | 2004 |
Gangs: gather, authenticate'n group securely CHO Chen, CW Chen, C Kuo, YH Lai, JM McCune, A Studer, A Perrig, ... Proceedings of the 14th ACM international conference on Mobile computing and …, 2008 | 96 | 2008 |
High performance post-quantum key exchange on FPGAs PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang Cryptology ePrint Archive, 2017 | 94 | 2017 |
A “medium-field” multivariate public-key encryption scheme LC Wang, BY Yang, YH Hu, F Lai Cryptographers’ Track at the RSA Conference, 132-149, 2006 | 86 | 2006 |
ℓ-Invertible Cycles for ultivariate uadratic () public key cryptography J Ding, C Wolf, BY Yang International Workshop on Public Key Cryptography, 266-281, 2007 | 79 | 2007 |