Folgen
Chen-Mou Cheng
Chen-Mou Cheng
BTQ AG
Bestätigte E-Mail-Adresse bei btq.li - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Use of spectral analysis in defense against DoS attacks
CM Cheng, HT Kung, KS Tan
Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 3, 2143-2148, 2002
3122002
Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm
CM Cheng, PH Hsiao, HT Kung, D Vlah
2007 IEEE Wireless Communications and Networking Conference, 4417-4424, 2007
1972007
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
Applied Cryptography and Network Security: 6th International Conference …, 2008
1672008
Factoring RSA keys from certified smart cards: Coppersmith in the wild
DJ Bernstein, YA Chang, CM Cheng, LP Chou, N Heninger, T Lange, ...
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1542013
Performance measurement of 802.11 a wireless links from UAV to ground nodes with various antenna orientations
CM Cheng, PH Hsiao, HT Kung, D Vlah
Proceedings of 15th International Conference on Computer Communications and …, 2006
1362006
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International workshop on cryptographic hardware and embedded systems, 33-48, 2009
1312009
Fast exhaustive search for polynomial systems in F2
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
CHES 6225, 203-218, 2010
1212010
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
1122009
Wsn07-1: Adjacent channel interference in dual-radio 802.11 a nodes and its impact on multi-hop networking
CM Cheng, PH Hsiao, HT Kung, D Vlah
IEEE Globecom 2006, 1-6, 2006
1122006
Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices
CY Wu, PC Lan, PC Yeh, CH Lee, CM Cheng
IEEE journal on selected areas in communications 31 (9), 1687-1700, 2013
962013
High performance post-quantum key exchange on FPGAs
PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang
Cryptology ePrint Archive, 2017
922017
Breaking ecc2k-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
Cryptology ePrint Archive, Report 2009/541, 2009. http://eprint. iacr. org, 2009
782009
Securing M2M with post-quantum public-key cryptography
JR Shih, Y Hu, MC Hsiao, MS Chen, WC Shen, BY Yang, AY Wu, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3 (1 …, 2013
692013
Extreme Enumeration on GPU and in Clouds: -How Many Dollars You Need to Break SVP Challenges
PC Kuo, M Schneider, Ö Dagdelen, J Reichelt, J Buchmann, CM Cheng, ...
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
642011
Implementing minimized multivariate PKC on low-resource embedded systems
BY Yang, CM Cheng, BR Chen, JM Chen
International Conference on Security in Pervasive Computing, 73-88, 2006
632006
The billion-mulmod-per-second PC
DJ Bernstein, HC Chen, MS Chen, CM Cheng, CH Hsiao, T Lange, ...
Workshop record of SHARCS 9, 131-144, 2009
612009
Coca: Computation offload to clouds using aop
HY Chen, YH Lin, CM Cheng
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
532012
Solving quadratic equations with XL on parallel architectures
CM Cheng, T Chou, R Niederhagen, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012
512012
Could SFLASH be repaired?
J Ding, V Dubois, BY Yang, OCH Chen, CM Cheng
Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008
492008
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks
JW Chou, SD Lin, CM Cheng
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence …, 2012
332012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20