Follow
Chen-Mou Cheng
Chen-Mou Cheng
BTQ AG
Verified email at btq.li - Homepage
Title
Cited by
Cited by
Year
Use of spectral analysis in defense against DoS attacks
CM Cheng, HT Kung, KS Tan
Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 3, 2143-2148, 2002
3132002
Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm
CM Cheng, PH Hsiao, HT Kung, D Vlah
2007 IEEE Wireless Communications and Networking Conference, 4417-4424, 2007
1992007
New differential-algebraic attacks and reparametrization of rainbow
J Ding, BY Yang, CHO Chen, MS Chen, CM Cheng
Applied Cryptography and Network Security: 6th International Conference …, 2008
1712008
Factoring RSA keys from certified smart cards: Coppersmith in the wild
DJ Bernstein, YA Chang, CM Cheng, LP Chou, N Heninger, T Lange, ...
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1552013
Performance measurement of 802.11 a wireless links from UAV to ground nodes with various antenna orientations
CM Cheng, PH Hsiao, HT Kung, D Vlah
Proceedings of 15th International Conference on Computer Communications and …, 2006
1362006
SSE implementation of multivariate PKCs on modern x86 CPUs
AIT Chen, MS Chen, TR Chen, CM Cheng, J Ding, ELH Kuo, FYS Lee, ...
International workshop on cryptographic hardware and embedded systems, 33-48, 2009
1322009
Fast exhaustive search for polynomial systems in F2
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
CHES 6225, 203-218, 2010
1232010
ECM on graphics cards
DJ Bernstein, TR Chen, CM Cheng, T Lange, BY Yang
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
1122009
Wsn07-1: Adjacent channel interference in dual-radio 802.11 a nodes and its impact on multi-hop networking
CM Cheng, PH Hsiao, HT Kung, D Vlah
IEEE Globecom 2006, 1-6, 2006
1122006
Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices
CY Wu, PC Lan, PC Yeh, CH Lee, CM Cheng
IEEE journal on selected areas in communications 31 (9), 1687-1700, 2013
982013
High performance post-quantum key exchange on FPGAs
PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng, CM Cheng, BY Yang
Cryptology ePrint Archive, 2017
942017
Breaking ecc2k-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
Cryptology ePrint Archive, Report 2009/541, 2009. http://eprint. iacr. org, 2009
782009
Securing M2M with post-quantum public-key cryptography
JR Shih, Y Hu, MC Hsiao, MS Chen, WC Shen, BY Yang, AY Wu, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3 (1 …, 2013
692013
Extreme Enumeration on GPU and in Clouds: -How Many Dollars You Need to Break SVP Challenges
PC Kuo, M Schneider, Ö Dagdelen, J Reichelt, J Buchmann, CM Cheng, ...
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
642011
Implementing minimized multivariate PKC on low-resource embedded systems
BY Yang, CM Cheng, BR Chen, JM Chen
International Conference on Security in Pervasive Computing, 73-88, 2006
632006
The billion-mulmod-per-second PC
DJ Bernstein, HC Chen, MS Chen, CM Cheng, CH Hsiao, T Lange, ...
Workshop record of SHARCS 9, 131-144, 2009
622009
Coca: Computation offload to clouds using aop
HY Chen, YH Lin, CM Cheng
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
532012
Solving quadratic equations with XL on parallel architectures
CM Cheng, T Chou, R Niederhagen, BY Yang
International Workshop on Cryptographic Hardware and Embedded Systems, 356-373, 2012
522012
Could SFLASH be repaired?
J Ding, V Dubois, BY Yang, OCH Chen, CM Cheng
Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008
492008
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks
JW Chou, SD Lin, CM Cheng
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence …, 2012
352012
The system can't perform the operation now. Try again later.
Articles 1–20