2007 |
11 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Chien-Yuan Chen:
A Conference Key Distribution Scheme Using Interpolating Polynomials.
MUE 2007: 963-967 |
2006 |
10 | EE | Chien-Yuan Chen:
An efficient parity detection technique using the two-moduli set {2h - 1, 2h + 1}.
Inf. Sci. 176(22): 3426-3430 (2006) |
2005 |
9 | | Chien-Yuan Chen,
Chih-Cheng Hsueh:
Multiplication Algorithm on Quantum Computation.
FCS 2005: 38-45 |
8 | EE | Chien-Yuan Chen,
Cheng-Yuan Ku,
David C. Yen:
Cryptanalysis of large RSA exponent by using the LLL algorithm.
Applied Mathematics and Computation 169(1): 516-525 (2005) |
2004 |
7 | EE | Chien-Yuan Chen,
Cheng-Yuan Ku,
David C. Yen:
Cryptanalysis of short secret exponents modulo RSA primes.
Inf. Sci. 160(1-4): 225-233 (2004) |
6 | EE | Cheng-Yuan Ku,
Chang-Jinn Tsao,
Yi-Hsien Lin,
Chien-Yuan Chen:
An escrow electronic cash system with limited traceability.
Inf. Sci. 164(1-4): 17-30 (2004) |
5 | EE | Jen-Ho Yang,
Chin-Chen Chang,
Chien-Yuan Chen:
A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math. 81(6): 775-780 (2004) |
1999 |
4 | EE | Chien-Yuan Chen,
T.-C. Liu:
A fast modular multiplication method based on the Lempel-Ziv binary tree.
Computer Communications 22(9): 871-874 (1999) |
3 | EE | Chien-Yuan Chen,
Chin-Chen Chang:
A fast modular multiplication algorithm for calculating the product AB modulo N.
Inf. Process. Lett. 72(3-4): 77-81 (1999) |
1996 |
2 | EE | Chien-Yuan Chen,
Chin-Chen Chang,
Wei-Pang Yang:
Cryptanalysis of the Secret Exponent of the RSA Scheme.
J. Inf. Sci. Eng. 12(2): 277-290 (1996) |
1995 |
1 | EE | Chin-Chen Chang,
Sun-Min Tsu,
Chien-Yuan Chen:
Remote scheme for password authentication based on theory of quadratic residues.
Computer Communications 18(12): 936-942 (1995) |