Curriculum Vitae

Bo-Yin Yang

Work:

2011.1-present:
Research Fellow, Institute of Information Science, Academia Sinica.
2006.8- 2011.1:
Associate Research Fellow, IIS, Academia Sinica

1992.8- 2006.7:
Associate Professor of Mathematics, Tamkang University.
  • Granted retroactive promotion to full Professor, effective 2006.2, before my departure.
  • Tamkang University Research Award 2000 and 2005.

1992.1- 1992.7:
Postdoc, Institute of Mathematics, Academia Sinica.

Contact Information:
Institute of Information Science, Academia Sinica.
128 Section 2 Academia Road, Taipei 115, Taiwan.
Tel: +886-(0)2-27883799#1731. FAX:-(0)2-27824814.

E-Mail: by at crypto.tw, byyang at iis.sinica.edu.tw

Born:
February 14, 1969 in Princeton, New Jersey, USA
Education:
National Taiwan University B.S. Physics 1987
Massachusetts Institute of Technology Ph.D. Applied Mathematics 1991
    (Prof. Richard Stanley, thesis advisor)  

Current Research Interest:
Cryptography, Analysis of Algorithms, Combinatorics.

Awards/Honors:
 
  • Academia Sinica Investigator Award 2015-19.
  • Academia Sinica Career Development Award 2010-14.
  • National Science Council Excellent Young Research Investigator Grant 2011-14.

Program Committees:
Indocrypt'06. {PQCrypto, ISC}'08. {PQCrypto, Africacrypt, Pairings}'10. {ICICS, Indocrypt}'11. {CT-RSA, SHARCS, SPACE}'12. {PQCrypto, CHES, SPACE, WISA}'13. {CHES, PQCrypto}'14. {SAC, ProvSec}'15. {PQCrypto, SAC}'16. {ACNS, PQCrypto}'17
Conference Organization:
PQCrypto Steering Comm since 2008, PQCrypto 2011 PC Chair,
Asiacrypt 2014 organizer, PKC 2016 PC co-Chair, CHES 2017, General co-Chair.

Invited Talks:
Dec'05, Beijing, Chinese Acad. Sci.; Oct'08, Cincinnati, PQCrypto; Apr'09, TU Eindhoven; Oct'09, Berlin, SPEED-CC; Jan'10, San Francisco, AMS Joint Mathematics Meetings; Apr'10, Guangzhou, South China U. of Technology. Aug'10, CyLab, Carnegie-Mellon U.; Sep'11, CS UMinn; Nov'12, CyLab and Lorentz Center, Leiden, NL; Mar'13, System-Solving in Crypto, Fukuoka; Aug'13, SIAM AG'13, Ft. Collins, US.; Oct'13, CS UMinn; Dec'13, Kyushu U; Mar'14, NIST; Feb'15, Quantum-Resilient Crypto, Fukuoka; Aug'15: SIAM AG'15, Daejeon, KR.

Professional Visits:
  • 2007.9-2007.12: Winter'07 Taft Visiting Lecturer, U. of Cincinnati.
  • 2001.8-2002.7: Visiting Scholar, Department of Mathematics, MIT.

Jointly Supervised Students
 
with C.-M. Cheng:
 
  • UROPs (Undergraduate Research Opportunities): Michael Feng-Hao Liu (04-05); Chia-Hsin Chen (05-07); Anna Inn-Tung Chen and Frost Yu-Shuang Li (06-08).
  • M.S.: Kevin Hsieh-Chung Chen, Ming-Yang Chih and Tung Chou (08-10); Jarron Jie-Ren Shih (09-11); Yun-An Chang, Jong-Shian Wu (11-13); Wen-Ding Li (13-15); Will Wei-Cheng Wang (14--).
  • Ph.D.: Ming-Shing Chen (09-), Po-Chun Kuo (10-), Shang-Yi Yang (14-)
with T. Lange:
Ruben F. Niederhagen (09-12, Ph.D.).


Here is a list of my research papers in a PDF file. Questions to b y @ m o s c i t o . o r g.

Journal or Formally Refereed Conference Articles
LNCS is the series of Lecture Notes in Computer Science by Springer-Verlag, EI.
  1. S.-Y. Yang, P.-C. Kuo, B.-Y. Yang and C.-M. Cheng, Gauss Sieve Algorithm on GPUs, CT-RSA 2017 (San Francisco, Feb. 14-17), LNCS 10159, pp. 39-57.

  2. B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, C.-M. Cheng, B.-Y. Yang, Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation, CANS 2016, (Milan, Italy, Nov. 14-16), LNCS 10052, pp. 637–647.

  3. A. Petzoldt, M.-S. Chen, B.-Y. Yang, C. Tao, J. Ding: Design Principles for HFEv- Based Multivariate Signature Schemes, Asiacrypt 2015 (Auckland, New Zealand, Nov. 29-Dec. 3), LNCS 9452, pp. 311-334.

  4. Y.-A. Chang, M.-S. Chen, J.-S. Wu and B.-Y. Yang, Postquantum SSL/TLS for Embedded Systems, IoTS workshop at IEEE SOCA 2014 (Matsue, Japan, Nov. 17-19).

  5. R. Fitzpatrick, C. Bischof, J. Buchmann, Ö. Dagdelen, F. Göpfert, A. Mariano, B.-Y. Yang, Tuning Gauss Sieve for Speed, Latincrypt 2014 (3rd Latin American Conference on Cryptography and Information Security, Florianopolis, Brazil, Sept. 17-19), LNCS 8895, pp. 288-305.

  6. Y.-F. Chen, C.-H. Hsu, H.-H. Lin, P. Schwabe, M.-H. Tsai, B.-Y. Wang, B.-Y. Yang, and S.-Y. Yang, Verifying Curve25519 Software, presented at ACM CCS 2014 (21st ACM Conference on Computer and Communications Security, Scottsdale, Arizona, USA, Nov. 3-7, 2014).

  7. Y.-A. Chang, W.-C. Hong, M.-C. Hsiao, B.-Y. Yang, A.-Y. Wu and C.-M. Cheng, Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics, IWSEC 2014 (The 9th International Workshop on Security, Hirosaki, Japan, Aug. 27-29, 2014), LNCS 8639, pp. 174-186.

  8. J. Y.-C. Yeh, C.-M. Cheng, B.-Y. Yang, Operating Degrees for XL vs. \ensuremath{\mathbf{F_4/F_5}} for Generic \ensuremath{\cal
MQ} with Number of Equations Linear in That of Variables, Number Theory and Cryptography Workshop 2013 (November 21-22, TU Darmstadt, Germany), LNCS 8260, pp. 19-33.

  9. C. Bouillaguet, C.-M. Cheng, T. Chou, R. Niederhagen and B.-Y. Yang, Fast Exhaustive Search for Quadratic Systems in F 2 on FPGAs, SAC 2013 (20th workshop on Selected Areas in Cryptography, Aug. 14-16, Simon Fraser University, Burnaby, BC, Canada); LNCS 8282, pp. 205-222. Current version at ePrint 2014/436.

  10. M.-S. Chen, C.-M. Cheng, B.-Y. Yang, RAIDq: A software-friendly, multiple-parity RAID, USENIX HotStorage 2013 (USENIX Federated Workshops, June 27-28, San Jose, CA, USA).

  11. J. Ding, B.-Y. Yang, Degree of Regularity for HFEv and HFEv-, PQCrypto 2013 (5th Post-Quantum Cryptography Workshop, June 4-6, Limoges, France), LNCS 7932, pp. 52-66.

  12. J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-T. Shen, B.-Y. Yang, and C.-M. Cheng, Securing M2M with Post-Quantum Public-Key Cryptography, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 3:1(2013), pp. 106-116.

  13. T. Chou, C.-M. Cheng, R. Niederhagen, and B.-Y. Yang, Solving Quadratic Equations with XL on Parallel Architectures, CHES 2012 (14th workshop on Cryptographic Hardware and Embedded Systems, September 9-12, Leuven, Belgium), LNCS 7428, pp. 356-373.

  14. C.-H. Yu and B.-Y. Yang, Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation, to appear at SCN 2012 (8th Conference on Security and Cryptography for Networks, September 5-7, Amalfi, Italy), LNCS 7485, pp. 426-444.

  15. S. Tanaka, T. Chou, B.-Y. Yang, C.-M. Cheng, K. Sakurai: Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs, WISA 2012 (13th Workshop on Information Security Applications, August 16-18, Jeju Island, Korea), LNCS 7690, pp. 28-42.

  16. D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang, High-speed high-security signatures, Journal of Cryptographic Engineering 2:2(2012), pp. 77-89. Earlier version presented at CHES 2011 (13th Workshop on Cryptographic Hardware and Embedded Systems, September 28 - October 1, Nara, Japan), LNCS 6917, pp. 124-142. Also ePrint 2011/368.

  17. P. Schwabe, S.-Y. Yang, and B.-Y. Yang, SHA-3 on ARM11 processors, Africacrypt 2012 (July 10-12, Ifrane, Morocco), LNCS 7374, pp. 324-341.

  18. F.-H. Liu, Y.-J. Huang, and B.-Y. Yang, Public-Key Cryptography from New Multivariate Quadratic Assumptions, PKC 2012 (15th International Workshop for Public Key Cryptography, IACR, May 21-23, Darmstadt, Germany), and LNCS 7293, pp. 190-205.

  19. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buchmann, C.-M. Cheng, and B.-Y. Yang, Extreme Enumeration on GPU and in Clouds, CHES 2011 (ibid.), pp. 176-191.

  20. D. J. Bernstein, H.-C. Chen, C.-M. Cheng, T. Lange, R. Niederhagen, P. Schwabe, and B.-Y. Yang, ECC2K-130 on NVIDIA GPUs, Indocrypt 2010 (December 13-15, Hyperabad, India) LNCS 6498, pp. 328-344.

  21. K.-M. Chung, F.-H. Liu, C.-J. Lu, and B.-Y. Yang, Efficient String-Commitment from Weak Bit-Commitment, Asiacrypt 2010 (December 5-9, Singapore), LNCS 6477, pp. 268-282.

  22. C. Bouillaguet, H.-C. K. Chen, C.-M. Cheng, T. Chou, R. Niederhagen, A. Shamir, and B.-Y. Yang, Fast Exhaustive Search for Polynomial Systems in F 2 , CHES 2010 (12th Workshop on Cryptographic Hardware and Embedded Systems, August 17-20, UC Santa Barbara), LNCS 6225, pp. 203-218.

  23. Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y. Yang, H.-M. Sun, and P.-L. Lin, SPATE: Small-group PKI-less Authenticated Trust Establishment, IEEE Trans on Mobile Computing 9:12(2010), pp. 1666-1681 (SCI). [Note: Extended from #27 as invited paper of IEEE Trans. TMC.]

  24. C.-I Lee, T.-C. Wu, B.-Y. Yang and W.-G. Tzeng, New Secure Broadcasting Scheme Realizing Information Granularity, J. of Info. Sci. and Eng., 26:4(2010) pp. 1509-1523.

  25. H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, H. Kikuchi, A. Perrig, H.-M. Sun, B.-Y. Yang, A Study of User-Friendly Hash Comparison Schemes, pp. 105-114, Proc. ACSAC 2009 (December 7-11, Honolulu).

  26. A. I.-T. Chen, M.-S. Chen, T.-R. Chen, C.-M. Cheng, J. Ding, E. L.-H. Kuo, F. Y.-S. Lee, and B.-Y. Yang, SSE Implementation of Multivariate PKCs on Modern x86 CPUs, CHES 2009 (11th Workshop on Cryptographic Hardware and Embedded Systems, Sept. 6-9, Lausanne, Switzerland), pp. 33-48, LNCS 5747.

  27. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, SPATE: Small-group PKI-less Authenticated Trust Establishment, Proc. MobiSys 2009 (7th Int'l Conference on Mobile Systems, Applications, and Services, June 22-25, Wroclaw, Poland), pp. 1-14 (best paper).

  28. D. J. Bernstein, T.-R. Chen, C.-M. Cheng, T. Lange, and B.-Y. Yang, ECM on Graphics Cards, Eurocrypt 2009 (April 25-29, Köln, Germany) LNCS 5479, pp. 483-501.

  29. J. Baena, M.-S. Chen, C. Clough, J. Ding, and B.-Y. Yang, Square, a New Multivariate Encryption Scheme, CT-RSA 2009 (10th Cryptographer's Track RSA Conference, April 20-24, San Francisco), LNCS 5473, pp. 252-264.

  30. A. I.-T. Chen, C.-H. Chen, M.-S. Chen, C.-M. Cheng and B.-Y. Yang, Practical-Sized Instances of Multivariate PKCs: Rainbow, and $\ell$IC-derivatives, PQCrypto 2008 (Second Post-Quantum Cryptography Workshop, Oct. 17-19, Cincinnati, USA) and LNCS 5299, pp. 95-106.

  31. F.-H. Liu, C.-J. Lu, and B.-Y. Yang, Secure PRNGs from Specialized Polynomial Maps over Any F q , PQCrypto'08 and LNCS 5299 (ibid.), pp. 181-202.

  32. C.-H. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, A. Perrig, A. Studer, and B.-Y. Yang, GAnGS: Gather, Authenticate 'n Group Securely, Proc. MobiCom 2008 (14th Annual International Conference on Mobile Computing and Networking, ACM SigMobile, September 14-19, San Francisco), pp. 92-103.

  33. J. Ding, V. Dubois, B.-Y. Yang, C.-H. Chen, and C.-M. Cheng. Can SFLASH be Repaired?, ICALP 2008 (35th International Colloquium on Automata, Languages and Programming, July 6-13, Reykjavik, Iceland), LNCS 5126, pp. 691-701.

  34. J. Ding, B.-Y. Yang, C.-H. Chen, M.-S. Chen, and C.-M. Cheng, New Differential-Algebraic Attacks and Reparametrization of Rainbow, ACNS 2008 (6th Applied Cryptography and Network Security Conference, June 3-6, New York, USA), LNCS 5037, pp. 242-257. Updates at ePrint 2008/108.

  35. J. Ding and B.-Y. Yang, Multivariate Polynomials for Hashing, Inscrypt 2007, Aug. 31-Sep. 5, Xining, China, LNCS 4990, pp. 358-371.

  36. B.-Y. Yang, C.-H. Chen, D. J. Bernstein, and J.-M. Chen, Analysis of QUAD, FSE 2007 (14th International Workshop for Fast Software Encryption, IACR, Mar. 26-28, Luxemberg City, Luxemberg), LNCS 4593, pp. 290-307.

  37. J. Ding, C. Wolf, and B.-Y. Yang, $\ell$-Invertible Cycles for Multivariate Quadratic Public Key Cryptography, PKC 2007 (10th International Workshop for Public Key Cryptography, IACR, Apr. 21-24, Beijing, China), LNCS 4450, pp. 266-281. [Prior version at Post-Quantum Crypto Workshop '06, KU Leuven, Belgium.]

  38. W. Yan, B.-Y. Yang, and Y.-N. Yeh, The Behavior of Wiener Indices and Polynomials of Graphs under Five Graph Operators, Appl. Math. Lett. 20(2007) pp. 290-295.

  39. I. Gutman, W. Yan, B.-Y. Yang, and Y.-N. Yeh, Generalized Wiener Indices of Zigzagging Pentachains, J. Math. Chem. 42:2(2007) pp. 103-117.

  40. B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen, Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems, SPC 2006 (3rd Security of Pervasive Computing Conference, Apr. 18-21, York, UK) LNCS 3934, pp. 73-88.

  41. L.-C. Wang, B.-Y. Yang, Y.-H. Hu, and F.-P. Lai, A ``Medium-Field'' Multivariate Public-Key Encryption Scheme, CT-RSA 2006 (7th Cryptographer's Track RSA Conference, Feb. 13-17, San Jose CA), LNCS 3860, pp. 132-149.

  42. S.-P. Eu, B.-Y. Yang, and Y. Yeh, Computing the Generalized Wiener Indices of Hex Chains, Int'l J. of Quant. Chem. 106(2006), pp. 426-435 .

  43. B.-Y. Yang and J.-M. Chen, Building Secure Tame-Like Multivariate Public-Key Cryptosystems: the New TTS, ACISP 2005 (10th Australasian Conference on Info. Sec. and Privacy, July 4-6, Brisbane), LNCS 3574, pp. 518-531.

  44. B.-Y. Yang and J.-M. Chen, All in the XL Family: Theory and Practice, ICISC 2004 (7th International Conference on Information Security and Cryptology, Dec. 2-3, Seoul, Korea), LNCS 3506, pp. 67-86.

  45. L.-C. Wang, Y.-H. Hu, F.-P. Lai, C.-Y. Chou, and B.-Y. Yang, Tractable Rational Map Signature, PKC 2005 (8th Int'l Workshop for Public-Key Cryptography, IACR, Jan. 26-28, Diablerets, Switzerland), LNCS 3386, pp. 244-257.

  46. B.-Y. Yang, J.-M. Chen, and N. Courtois, On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis, ICICS 2004 (6th International Conference on Information and Communications Security, Oct. 27-29, Malaga, Spain), LNCS 3269, pp. 401-413.

  47. B.-Y. Yang, J.-M. Chen, and Y.-H. Chen, TTS: High-Speed Signatures on a Low-Cost Smart Card, CHES 2004 (6th Workshop on Cryptographic Hardware and Embedded Systems, IACR, Aug. 11-13, Boston MA); LNCS 3156, pp. 371-385.

  48. B.-Y. Yang and J.-M. Chen, Theoretical Analysis of XL over Small Fields, ACISP 2004 (9th Australasian Conference on Info. Sec. and Privacy, July 13-15, Sydney); LNCS 3108, pp. 277-288.

  49. B.-Y. Yang and Y. Yeh, Wiener Polynomials of some Chemically Interesting Graphs, International J. of Quantum Chem. 99:2(2004), pp. 80-91.

  50. B.-Y. Yang and Y. Yeh, A Crowning Moment for Wiener Indices, Studies in Applied Mathematics, 112(2004), pp. 333-340.

  51. J.-M. Chen and B.-Y. Yang, A More Secure and Efficacious TTS Signature Scheme, ICISC 2003 ( 6th Int'l Conference on Info. Sec. & Cryptology, Nov. 27-28, Seoul, Korea), LNCS 2971, pp. 320-338.

  52. H.-K. Hwang, B.-Y. Yang, and Y. Yeh, Presorting algorithms: an average-case point of view, Theo. Comp. Sci. 242(2000), no. 1-2, pp. 29-40.

  53. W.-C. Huang, B.-Y. Yang, and Y. Yeh, From Ternary Strings to Wiener indices of Benzenoid Chains, Discrete Appl. Math. 73(1997), pp. 113-131. (SCI)

  54. I-W. Huang, B.-Y. Yang, and Y. Yeh, Wiener Indices of Hex Carpets-- from Hexagon Models to Square Grids, SE Asia Bull. of Math. 20(1996), pp. 81-102.

  55. B.-Y. Yang, and Y. Yeh, Zigging and Zagging in Pentachains, Adv. in Appl. Math. 16(1995) pp. 72-94. (SCI)

Conference Articles without Journal Proceedings, Books/Book Chapters, Tech Reports
  1. M.-S. Chen, B.-Y. Yang, and D. Smith-Tone, PFLASH - secure asymmetric signatures on smart cards. NIST Lightweight Cryptography Workshop 2015
    http://csrc.nist.gov/groups/ST/lwc-workshop2015/papers/session3-smith- tone-paper.pdf.
  2. D. J. Bernstein, S. Josefsson, T. Lange, P. Schwabe and B.-Y. Yang, EdDSA for more curves, IACR e-Print Archive, http://eprint.iacr.org/2015/677.

  3. B.-Y. Yang, ed., Post-Quantum Cryptography, Proc. 4th Post-Quantum Cryptography Workshop, Nov. 29-Dec. 2, 2011, Taipei, Taiwan, LNCS 7071, Springer, ISBN 978-3-642-25404-8.

  4. L. Goubin, J. Patarin, and B.-Y. Yang, Multivariate Cryptosystems, pp. 824-828, in Encyclopedia of Cryptography and Security, H. van Tillborg and S. Jajodia, eds., Springer 2011, ISBN 978-1-4419-5905-8.

  5. D. J. Bernstein, H.-C. Chen, M.-S. Chen, C.-M. Cheng, C.-H. Hsiao, Z.-C. Lin, T. Lange, and B.-Y. Yang, The 1 Billion-Mulmod Personal Computer, Presented at SHARCS 2009 (Sept. 9-10, Lausanne, Switzerland).

  6. J. Ding, B.-Y. Yang, F. Werner, C.-H. Chen, M.-S. Chen, Odd-Field Multivariate Hidden Field Equations, poster at Eurocrypt 2009, ePrint 2008/543.

  7. J. Ding and B.-Y. Yang, Multivariate Public-Key Cryptography, chapter in Post-Quantum Cryptography, pp. 193-241, D. J. Bernstein, J. Buchmann and E. Dahmen, eds., Springer 2009, ISBN: 978-3-540-88701-0.

  8. C.-H. Chen, B.-Y. Yang, and J.-M. Chen, Exploring the Limits of Lazard-Faugère Gröbner Bases Methods, PQCrypto'06 (First Post-Quantum Crypto Workshop), KU Leuven, Belgium.

  9. S.-Y. Wang, C.-S. Laih, and B.-Y. Yang, Partially Ordered Signature Schemes, TFIT'06 (third Taiwan-France Info Tech Conference, Mar. 28-30, Nancy, France).

  10. M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations, MEGA '05 (8th Conférence des Méthodes Effectives en Géométrie Algebrique, May 27- June 1, Porto Conte, Sardinia, Italy); being re-edited for journal submission.

  11. B.-Y. Yang and J.-M. Chen, Cryptanalysis Today, Chap. 6 in Book 19 of the third Information and Communications Security Series, W.-G. Tzeng, ed., C-S. Laih, series editor, published by the National Science of Council of Taiwan, 2004.

  12. B.-Y. Yang and J.-M. Chen, XL: A Brief on the State of the Art, Best Paper Award, Chinese (Taipei) Cryptology and Info. Sec. Assoc. (CCISA) 2004 conference.

  13. J.-M. Chen, B.-Y. Yang, and B.-Y. Peng, Tame Transformation Signatures and Topsy-Turvy Hashes IWAP '02 (11/29-12/01, Taipei), pp. 93-100.

  14. B.-Y. Yang, and Y. Yeh, About Wiener Numbers and Polynomials, Sec. 5 in Lie Algebras, Rings and Related Topics: Proc. of Second International Tainan-Moscow Algebra Workshop (Tainan, 1997), pp. 203-226, Y. Fong, A. Mikhalev, and E. Zelmanov, eds., Springer-Verlag (Berlin) 2000.

  15. B.-Y. Yang, and Y. Yeh, Chains of Motley Gems and their Wiener Indices, in Proc. of First International Tainan-Moscow Algebra Workshop (Tainan, 1994), pp. 329-349, de Gruyter (Berlin), Y. Fong et al ed., De Gruyter (Berlin) 1996.





B.Y., b y @ m o s c i t o . o r g, b y y a n g @ i i s . s i n i c a . e d u . t w