2008 |
26 | EE | Chia-Long Wu,
Der-Chyuan Lou,
Te-Jen Chang:
An efficient Montgomery exponentiation algorithm for public-key cryptosystems.
ISI 2008: 284-285 |
2007 |
25 | EE | Der-Chyuan Lou,
Jui-Chang Lai,
Chia-Long Wu,
Te-Jen Chang:
An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques.
Applied Mathematics and Computation 185(1): 31-44 (2007) |
24 | EE | Chia-Long Wu,
Der-Chyuan Lou,
Jui-Chang Lai,
Te-Jen Chang:
Fast modular multi-exponentiation using modified complex arithmetic.
Applied Mathematics and Computation 186(2): 1065-1074 (2007) |
23 | EE | Chia-Long Wu,
Der-Chyuan Lou,
Te-Jen Chang:
Fast binary multiplication by performing dot counting and complement recoding.
Applied Mathematics and Computation 191(1): 132-139 (2007) |
22 | EE | Ming-Chiang Hu,
Der-Chyuan Lou,
Ming-Chang Chang:
Dual-wrapped digital watermarking scheme for image copyright protection.
Computers & Security 26(4): 319-330 (2007) |
2006 |
21 | EE | Der-Chyuan Lou,
Jieh-Ming Shieh,
Hao-Kuan Tso:
A robust buyer-seller watermarking scheme based on DWT.
IJPRAI 20(1): 79-90 (2006) |
20 | EE | Chia-Long Wu,
Der-Chyuan Lou,
Jui-Chang Lai,
Te-Jen Chang:
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem.
Informatica, Lith. Acad. Sci. 17(3): 445-462 (2006) |
19 | EE | Chengqing Li,
Shujun Li,
Der-Chyuan Lou,
Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
Journal of Systems and Software 79(12): 1789 (2006) |
18 | EE | Chengqing Li,
Shujun Li,
Der-Chyuan Lou,
Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
Journal of Systems and Software 79(2): 253-258 (2006) |
2005 |
17 | EE | Jieh-Ming Shieh,
Der-Chyuan Lou,
Hao-Kuan Tso:
A robust watermarking scheme for digital image using self similarity.
ITRE 2005: 115-119 |
16 | EE | Chengqing Li,
Shujun Li,
Der-Chyuan Lou,
Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
CoRR abs/cs/0501013: (2005) |
15 | EE | Chia-Long Wu,
Der-Chyuan Lou,
Te-Jen Chang:
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications.
Informatica, Lith. Acad. Sci. 16(3): 449-468 (2005) |
2004 |
14 | EE | Der-Chyuan Lou,
Chia-Hung Sung:
A steganographic scheme for secure communications based on the chaos and euler Theorem.
IEEE Transactions on Multimedia 6(3): 501-509 (2004) |
13 | EE | Der-Chyuan Lou,
Chia-Long Wu:
Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques.
Int. J. Comput. Math. 81(10): 1187-1202 (2004) |
2003 |
12 | EE | Der-Chyuan Lou,
Chia-Long Wu,
Chin-Yin Chen:
Fast exponentiation by folding the signed-digit exponent in half.
Int. J. Comput. Math. 80(10): 1251-1259 (2003) |
11 | EE | Kuang-Bor Wang,
Tsorng-Lin Chia,
Zen Chen,
Der-Chyuan Lou:
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture.
J. Inf. Sci. Eng. 19(2): 353-370 (2003) |
2002 |
10 | | Der-Chyuan Lou,
Te-Lung Yin,
Ming-Chang Chang:
An efficient steganographic approach.
Comput. Syst. Sci. Eng. 17(4/5): 281-291 (2002) |
9 | | Der-Chyuan Lou,
Jiang-Lung Liu:
Steganographic Method for Secure Communications.
Computers & Security 21(5): 449-460 (2002) |
8 | EE | Tsorng-Lin Chia,
Kuang-Bor Wang,
Zen Chen,
Der-Chyuan Lou:
Parallel distance transforms on a linear array architecture.
Inf. Process. Lett. 82(2): 73-81 (2002) |
7 | EE | Der-Chyuan Lou,
Chia-Long Wu,
Rong-yi Ou:
Application of Parallel Virtual Machine Framework to the Strong Prime Problem.
Int. J. Comput. Math. 79(7): 797-806 (2002) |
2001 |
6 | EE | Der-Chyuan Lou,
Te-Lung Yin:
Spatial database with each picture self-contained multiscape and access control in a hierarchy.
Journal of Systems and Software 56(2): 153-163 (2001) |
2000 |
5 | | Chang-Tsun Li,
Der-Chyuan Lou,
Tsung-Hsu Chen:
Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem.
ICIP 2000 |
1998 |
4 | EE | Der-Chyuan Lou,
Chin-Chen Chang:
An adaptive exponentiation method.
Journal of Systems and Software 42(1): 59-69 (1998) |
1997 |
3 | | Chin-Chen Chang,
Der-Chyuan Lou,
Tzong-Chen Wu:
A Binary Access Control Method Using Prime Factorization.
Inf. Sci. 96(1&2): 15-26 (1997) |
2 | EE | Der-Chyuan Lou,
Chin-Chen Chang:
A Cost Optimal Search Technique for the Knapsack Problem.
International Journal of High Speed Computing 9(1): 1-12 (1997) |
1 | | Der-Chyuan Lou,
Chin-Chen Chang:
A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Computing 22(14): 1985-1996 (1997) |