1. Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, and Bo-Yin Yang, Odd-char multivariate hidden field equations, IACR eprint2008:543 (2008), 18 pages.
  2. Jiun-Ming Chen and Bo-Yin Yang, All in the XL family: theory and practice, Information Security and Cryptology. ICISC 2004: 7th International Conference, Seoul, Korea, December 2–3, 2004, Lecture Notes in Comput. Sci., vol. 3506, Springer, Berlin, 2005, pp. 296.
  3. Jiun-Ming Chen and Bo-Yin Yang, Building secure tame-like multivariate public-key cryptosystems: the new TTS, Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings, Lecture Notes in Comput. Sci., vol. 3574, Springer, Berlin, 2005, pp. 518.
  4. Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, and Chen-Mou Cheng, New differential-algebraic attacks and reparametrization of Rainbow, Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 5037, Springer, 2008, pp. 242–257.
  5. Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, and Vivien Dubois, Breaking the symmetry: A way to resist the new differential attack, IACR (2007).[eprint]
  6. Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, and Jintai Ding, Secure PRNGs from specialized polynomial maps over any Fq, IACR (2007).[eprint]
  7. Bo-Yin Yang, Chen-Mou Cheng, Bor-Rong Chen, and Chen Jiun-Ming, Implementing minimized multivariate public-key cryptosystems on low-resource embedded systems, Preprint (2005), 15 pages.