Chen-Mou Cheng
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j5]Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-Bit Secure MPKC Signatures. IEICE Transactions 101-A(3): 553-569 (2018) - [i20]Wen-Ding Li, Ming-Shing Chen, Po-Chun Kuo, Chen-Mou Cheng, Bo-Yin Yang:
Frobenius Additive Fast Fourier Transform. CoRR abs/1802.03932 (2018) - [i19]Ming-Shing Chen, Chen-Mou Cheng, Po-Chun Kuo, Wen-Ding Li, Bo-Yin Yang:
Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform. CoRR abs/1803.11301 (2018) - 2017
- [c43]Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng:
Gauss Sieve Algorithm on GPUs. CT-RSA 2017: 39-57 - [c42]Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji:
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. ICISC 2017: 245-263 - [i18]Ming-Shing Chen, Chen-Mou Cheng, Po-Chun Kuo, Wen-Ding Li, Bo-Yin Yang:
Faster Multiplication for Long Binary Polynomials. CoRR abs/1708.09746 (2017) - [i17]Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-bit Secure MPKC Signatures. IACR Cryptology ePrint Archive 2017: 636 (2017) - [i16]Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang:
Post-Quantum Key Exchange on FPGAs. IACR Cryptology ePrint Archive 2017: 690 (2017) - 2016
- [j4]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-based Cryptography using JavaScript. IJNC 6(2): 309-327 (2016) - [c41]Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. CANS 2016: 637-647 - [e2]Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang:
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9614, Springer 2016, ISBN 978-3-662-49383-0 [contents] - [e1]Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang:
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9615, Springer 2016, ISBN 978-3-662-49386-1 [contents] - [i15]Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures - extended version. IACR Cryptology ePrint Archive 2016: 412 (2016) - [i14]Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. IACR Cryptology ePrint Archive 2016: 909 (2016) - 2015
- [c40]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-Based Cryptography Using JavaScript. CANDAR 2015: 58-67 - [c39]Cheng-Rung Tsai, Ming-Chun Hsiao, Wen-Chung Shen, An-Yeu Andy Wu, Chen-Mou Cheng:
A 1.96mm2 low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols. ISCAS 2015: 834-837 - 2014
- [c38]Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda, Kouichi Sakurai:
Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units. CANDAR 2014: 543-548 - [c37]Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang:
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. INTRUST 2014: 374-393 - [c36]Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng:
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics. IWSEC 2014: 174-186 - [c35]Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi:
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics. PQCrypto 2014: 40-58 - [c34]Haw Lee, Wei-Chih Hong, Chia-Hung Kao, Chen-Mou Cheng:
A User-Friendly Authentication Solution Using NFC Card Emulation on Android. SOCA 2014: 271-278 - 2013
- [j3]Jie-Ren Shih, Yongbo Hu, Ming-Chun Hsiao, Ming-Shing Chen, Wen-Chung Shen, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng:
Securing M2M With Post-Quantum Public-Key Cryptography. IEEE J. Emerg. Sel. Topics Circuits Syst. 3(1): 106-116 (2013) - [j2]Chih-Yao Wu, Pang-Chang Lan, Ping-Cheng Yeh, Chia-Han Lee, Chen-Mou Cheng:
Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices. IEEE Journal on Selected Areas in Communications 31(9): 1687-1700 (2013) - [c33]Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren:
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild. ASIACRYPT (2) 2013: 341-360 - [c32]Jenny Yuan-Chun Yeh, Chen-Mou Cheng, Bo-Yin Yang:
Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables. Number Theory and Cryptography 2013: 19-33 - [c31]Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng:
A Practical Attack on Patched MIFARE Classic. Inscrypt 2013: 150-164 - [c30]Ming-Shing Chen, Bo-Yin Yang, Chen-Mou Cheng:
RAIDq: A Software-friendly, Multiple-parity RAID. HotStorage 2013 - [c29]Satoshi Tanaka, Takanori Yasuda, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Computing over GF(2^16) Using Graphics Processing Unit. IMIS 2013: 843-846 - [c28]Jung-Wei Chou, Min-Huang Chu, Yi-Lin Tsai, Yun Jin, Chen-Mou Cheng, Shou-De Lin:
An Unsupervised Learning Model to Perform Side Channel Attack. PAKDD (1) 2013: 414-425 - [c27]Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng:
Design and implementation of multi-user secure indices for encrypted cloud storage. PST 2013: 177-184 - [c26]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. Selected Areas in Cryptography 2013: 205-222 - [i13]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in 𝔽2 on FPGAs - Extended Version. IACR Cryptology ePrint Archive 2013: 436 (2013) - [i12]Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren:
Factoring RSA keys from certified smart cards: Coppersmith in the wild. IACR Cryptology ePrint Archive 2013: 599 (2013) - 2012
- [c25]Hsing-Yu Chen, Yue-Hsun Lin, Chen-Mou Cheng:
COCA: Computation Offload to Clouds Using AOP. CCGRID 2012: 466-473 - [c24]Jung-Wei Chou, Shou-De Lin, Chen-Mou Cheng:
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. AISec 2012: 105-110 - [c23]Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures. CHES 2012: 356-373 - [c22]Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. WISA 2012: 28-42 - [i11]Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. IACR Cryptology ePrint Archive 2012: 2 (2012) - [i10]Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
Usable assembly language for GPUs: a success story. IACR Cryptology ePrint Archive 2012: 137 (2012) - 2011
- [c21]Po-Chun Kuo, Michael Schneider, Özgür Dagdelen, Jan Reichelt, Johannes A. Buchmann, Chen-Mou Cheng, Bo-Yin Yang:
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -. CHES 2011: 176-191 - [c20]
- [r1]Chen-Mou Cheng:
Multi-Threaded Implementation for Cryptography and Cryptanalysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 823-824 - [i9]Pang-Chang Lan, Chih-Yao Wu, Chia-han Lee, Ping-Cheng Yeh, Chen-Mou Cheng:
PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme. CoRR abs/1101.4075 (2011) - [i8]Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi:
Efficient Implementation of the etaT Pairing on GPU. IACR Cryptology ePrint Archive 2011: 540 (2011) - 2010
- [j1]Chang-Ching Yang, Chen-Mou Cheng, Sheng-De Wang:
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems. J. Inf. Sci. Eng. 26(5): 1563-1582 (2010) - [c19]Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. CHES 2010: 203-218 - [c18]Hsieh-Chung Chen, Chen-Mou Cheng, Shih-Hao Hung, Zong-Cing Lin:
Integer Number Crunching on the Cell Processor. ICPP 2010: 508-515 - [c17]Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. INDOCRYPT 2010: 328-346 - [c16]Jen-Po Cheng, Yen-Huan Li, Ping-Cheng Yeh, Chen-Mou Cheng:
MIMO-OFDM PHY Integrated (MOPI) Scheme for Confidential Wireless Transmission. WCNC 2010: 1-6 - [i7]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. IACR Cryptology ePrint Archive 2010: 313 (2010)
2000 – 2009
- 2009
- [c15]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang:
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. CHES 2009: 33-48 - [c14]Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang:
ECM on Graphics Cards. EUROCRYPT 2009: 483-501 - [c13]Chun-Chieh Chen, Anna Inn-Tung Chen, Chen-Mou Cheng, Ming-Yang Chih, Jie-Ren Shih:
A Practical Experience with RFID Security. Mobile Data Management 2009: 395-396 - [i6]Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis J. Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang:
Breaking ECC2K-130. IACR Cryptology ePrint Archive 2009: 541 (2009) - [i5]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be repaired? IACR Cryptology ePrint Archive 2009: 596 (2009) - 2008
- [c12]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. ACNS 2008: 242-257 - [c11]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be Repaired?. ICALP (2) 2008: 691-701 - [c10]Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang:
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. PQCrypto 2008: 95-108 - [i4]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. IACR Cryptology ePrint Archive 2008: 108 (2008) - [i3]Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang:
ECM on Graphics Cards. IACR Cryptology ePrint Archive 2008: 480 (2008) - [i2]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Li, Bo-Yin Yang:
Small Odd Prime Field Multivariate PKCs. IACR Cryptology ePrint Archive 2008: 498 (2008) - 2007
- [c9]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Maximizing Throughput of UAV-Relaying Networks with the Load-Carry-and-Deliver Paradigm. WCNC 2007: 4417-4424 - [c8]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Transmit Antenna Selection Based on Link-layer Channel Probing. WOWMOM 2007: 1-6 - [i1]Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Chia-Hsin Owen Chen, Vivien Dubois:
Breaking the Symmetry: a Way to Resist the New Differential Attack. IACR Cryptology ePrint Archive 2007: 366 (2007) - 2006
- [c7]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Adjacent Channel Interference in Dual-radio 802.11a Nodes and Its Impact on Multi-hop Networking. GLOBECOM 2006 - [c6]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Performance Measurement of 802.11a Wireless Links from UAV to Ground Nodes with Various Antenna Orientations. ICCCN 2006: 303-308 - [c5]Bo-Yin Yang, Chen-Mou Cheng, Bor-Rong Chen, Jiun-Ming Chen:
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. SPC 2006: 73-88 - 2004
- [c4]Chen-Mou Cheng, Yu-Sheng Huan, H. T. Kung, Chun-Hsin Wu:
Path probing relay routing for achieving high end-to-end performance. GLOBECOM 2004: 1359-1365 - 2003
- [c3]H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott O. Bradner:
Design and Analysis of an IP-Layer Anonymizing Infrastructure. DISCEX (1) 2003: 62- - [c2]Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott O. Bradner:
ANON: An IP-Layer Anonymizing Infrastructure. DISCEX (2) 2003: 78-80 - 2002
- [c1]Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan:
Use of spectral analysis in defense against DoS attacks. GLOBECOM 2002: 2143-2148
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-13 20:33 CEST by the dblp team