dblp.uni-trier.dewww.uni-trier.de

Der-Chyuan Lou

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
26EEChia-Long Wu, Der-Chyuan Lou, Te-Jen Chang: An efficient Montgomery exponentiation algorithm for public-key cryptosystems. ISI 2008: 284-285
2007
25EEDer-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, Te-Jen Chang: An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques. Applied Mathematics and Computation 185(1): 31-44 (2007)
24EEChia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang: Fast modular multi-exponentiation using modified complex arithmetic. Applied Mathematics and Computation 186(2): 1065-1074 (2007)
23EEChia-Long Wu, Der-Chyuan Lou, Te-Jen Chang: Fast binary multiplication by performing dot counting and complement recoding. Applied Mathematics and Computation 191(1): 132-139 (2007)
22EEMing-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang: Dual-wrapped digital watermarking scheme for image copyright protection. Computers & Security 26(4): 319-330 (2007)
2006
21EEDer-Chyuan Lou, Jieh-Ming Shieh, Hao-Kuan Tso: A robust buyer-seller watermarking scheme based on DWT. IJPRAI 20(1): 79-90 (2006)
20EEChia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang: Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem. Informatica, Lith. Acad. Sci. 17(3): 445-462 (2006)
19EEChengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang: Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. Journal of Systems and Software 79(12): 1789 (2006)
18EEChengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang: On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). Journal of Systems and Software 79(2): 253-258 (2006)
2005
17EEJieh-Ming Shieh, Der-Chyuan Lou, Hao-Kuan Tso: A robust watermarking scheme for digital image using self similarity. ITRE 2005: 115-119
16EEChengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang: On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) CoRR abs/cs/0501013: (2005)
15EEChia-Long Wu, Der-Chyuan Lou, Te-Jen Chang: An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications. Informatica, Lith. Acad. Sci. 16(3): 449-468 (2005)
2004
14EEDer-Chyuan Lou, Chia-Hung Sung: A steganographic scheme for secure communications based on the chaos and euler Theorem. IEEE Transactions on Multimedia 6(3): 501-509 (2004)
13EEDer-Chyuan Lou, Chia-Long Wu: Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques. Int. J. Comput. Math. 81(10): 1187-1202 (2004)
2003
12EEDer-Chyuan Lou, Chia-Long Wu, Chin-Yin Chen: Fast exponentiation by folding the signed-digit exponent in half. Int. J. Comput. Math. 80(10): 1251-1259 (2003)
11EEKuang-Bor Wang, Tsorng-Lin Chia, Zen Chen, Der-Chyuan Lou: Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture. J. Inf. Sci. Eng. 19(2): 353-370 (2003)
2002
10 Der-Chyuan Lou, Te-Lung Yin, Ming-Chang Chang: An efficient steganographic approach. Comput. Syst. Sci. Eng. 17(4/5): 281-291 (2002)
9 Der-Chyuan Lou, Jiang-Lung Liu: Steganographic Method for Secure Communications. Computers & Security 21(5): 449-460 (2002)
8EETsorng-Lin Chia, Kuang-Bor Wang, Zen Chen, Der-Chyuan Lou: Parallel distance transforms on a linear array architecture. Inf. Process. Lett. 82(2): 73-81 (2002)
7EEDer-Chyuan Lou, Chia-Long Wu, Rong-yi Ou: Application of Parallel Virtual Machine Framework to the Strong Prime Problem. Int. J. Comput. Math. 79(7): 797-806 (2002)
2001
6EEDer-Chyuan Lou, Te-Lung Yin: Spatial database with each picture self-contained multiscape and access control in a hierarchy. Journal of Systems and Software 56(2): 153-163 (2001)
2000
5 Chang-Tsun Li, Der-Chyuan Lou, Tsung-Hsu Chen: Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. ICIP 2000
1998
4EEDer-Chyuan Lou, Chin-Chen Chang: An adaptive exponentiation method. Journal of Systems and Software 42(1): 59-69 (1998)
1997
3 Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu: A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997)
2EEDer-Chyuan Lou, Chin-Chen Chang: A Cost Optimal Search Technique for the Knapsack Problem. International Journal of High Speed Computing 9(1): 1-12 (1997)
1 Der-Chyuan Lou, Chin-Chen Chang: A Parallel Two-List Algorithm for the Knapsack Problem. Parallel Computing 22(14): 1985-1996 (1997)

Coauthor Index

1Chin-Chen Chang [1] [2] [3] [4]
2Ming-Chang Chang [10] [22]
3Te-Jen Chang [15] [20] [23] [24] [25] [26]
4Chin-Yin Chen [12]
5Tsung-Hsu Chen [5]
6Zen Chen [8] [11]
7Tsorng-Lin Chia [8] [11]
8Ming-Chiang Hu [22]
9Jui-Chang Lai [20] [24] [25]
10Chang-Tsun Li [5]
11Chengqing Li [16] [18] [19]
12Shujun Li [16] [18] [19]
13Jiang-Lung Liu [9]
14Rong-yi Ou [7]
15Jieh-Ming Shieh [17] [21]
16Chia-Hung Sung [14]
17Hao-Kuan Tso [17] [21]
18Kuang-Bor Wang [8] [11]
19Chia-Long Wu [7] [12] [13] [15] [20] [23] [24] [25] [26]
20Tzong-Chen Wu [3]
21Te-Lung Yin [6] [10]
22Dan Zhang [16] [18] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)