2009 |
48 | EE | Hung-Min Sun,
King-Hang Wang,
Chien-Ming Chen:
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme.
IEEE Trans. Dependable Sec. Comput. 6(2): 159-160 (2009) |
2008 |
47 | EE | Hung-Min Sun,
Mu-En Wu,
Huaxiong Wang,
Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA.
ACISP 2008: 84-97 |
46 | EE | Hung-Min Sun,
Mu-En Wu,
Ron Steinfeld,
Jian Guo,
Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
CANS 2008: 49-63 |
45 | EE | Hung-Min Sun,
Chi-Yao Weng,
Shiuh-Jeng Wang:
Histogram-based undetectable fidelity image in steganography as MSB controller.
ICUIMC 2008: 566-569 |
44 | EE | Hung-Min Sun,
King-Hang Wang:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
ISECS 2008: 385-389 |
43 | EE | Yalin Chen,
Jue-Sam Chou,
Hung-Min Sun:
A novel mutual authentication scheme based on quadratic residues for RFID systems.
Computer Networks 52(12): 2373-2380 (2008) |
42 | EE | Cheng-Hsing Yang,
Chi-Yao Weng,
Shiuh-Jeng Wang,
Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Transactions on Information Forensics and Security 3(3): 488-497 (2008) |
2007 |
41 | EE | Hung-Min Sun,
Mu-En Wu,
Yao-Hsin Chen:
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
ACNS 2007: 116-128 |
40 | EE | Hung-Min Sun,
Shih-Pu Hsu,
Chien-Ming Chen:
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks.
AINA Workshops (1) 2007: 457-462 |
39 | EE | Hung-Min Sun,
Chien-Ming Chen,
Feng-Ying Chu:
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks.
ISCC 2007: 495-500 |
38 | EE | Hung-Min Sun,
Mu-En Wu,
Wei-Chi Ting,
M. Jason Hinek:
Dual RSA and Its Security Analysis.
IEEE Transactions on Information Theory 53(8): 2922-2933 (2007) |
2006 |
37 | EE | Hung-Min Sun,
Yue-Hsun Lin,
Ming-Fung Wu:
API Monitoring System for Defeating Worms and Exploits in MS-Windows System.
ACISP 2006: 159-170 |
36 | EE | Hung-Min Sun,
Her-Tyan Yeh:
Password-based authentication and key distribution protocols with perfect forward secrecy.
J. Comput. Syst. Sci. 72(6): 1002-1011 (2006) |
2005 |
35 | EE | Hung-Min Sun,
Chen-Jung Hong,
Chiung-Hsun Chen:
A new approach to feature-based copyright protection of images.
ITRE 2005: 233-237 |
34 | EE | Hung-Min Sun,
Cheng-Ta Yang:
RSA with Balanced Short Exponents and Its Application to Entity Authentication.
Public Key Cryptography 2005: 199-215 |
33 | EE | Her-Tyan Yeh,
Hung-Min Sun:
Password authenticated key exchange protocols among diverse network domains.
Computers & Electrical Engineering 31(3): 175-189 (2005) |
32 | EE | Hung-Min Sun,
Bin-Tsan Hsieh,
Shin-Mu Tseng:
On the security of some proxy blind signature schemes.
Journal of Systems and Software 74(3): 297-302 (2005) |
31 | EE | Hung-Min Sun,
Bing-Chang Chen,
Tzonelih Hwang:
Secure key agreement protocols for three-party against guessing attacks.
Journal of Systems and Software 75(1-2): 63-68 (2005) |
2004 |
30 | EE | Hung-Min Sun,
Bin-Tsan Hsieh:
On the Security of Some Proxy Blind Signature Schemes.
ACSW Frontiers 2004: 75-78 |
29 | EE | Hung-Min Sun,
Bin-Tsan Hsieh,
Shin-Mu Tseng:
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol.
EEE 2004: 565-568 |
28 | EE | Hung-Min Sun,
Bing-Chang Chen,
Her-Tyan Yeh:
On the design of time-stamped signatures.
J. Comput. Syst. Sci. 68(3): 598-610 (2004) |
27 | EE | Her-Tyan Yeh,
Hung-Min Sun:
Password-based user authentication and key distribution protocols for client-server applications.
Journal of Systems and Software 72(1): 97-103 (2004) |
2003 |
26 | EE | Hung-Min Sun,
Her-Tyan Yeh,
Tzonelih Hwang:
On the Linkability of Some Group Signature Schemes.
Informatica, Lith. Acad. Sci. 14(1): 85-94 (2003) |
25 | EE | Bin-Tsan Hsieh,
Hung-Min Sun,
Tzonelih Hwang:
On the Security of Some Password Authentication Protocols.
Informatica, Lith. Acad. Sci. 14(2): 195-204 (2003) |
24 | EE | Her-Tyan Yeh,
Hung-Min Sun,
Tzonelih Hwang:
Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng. 19(6): 1059-1070 (2003) |
2002 |
23 | EE | Hung-Min Sun:
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes.
Informatica, Lith. Acad. Sci. 13(1): 105-110 (2002) |
22 | EE | Hung-Min Sun,
Wu-Chuan Yang,
Chi-Sung Laih:
On the Design of RSA With Short Secret Exponent.
J. Inf. Sci. Eng. 18(1): 1-18 (2002) |
21 | EE | Hung-Min Sun:
On the Security of a Variation of Cramer-Shoup's Public Key Scheme.
J. Inf. Sci. Eng. 18(1): 19-22 (2002) |
20 | EE | Her-Tyan Yeh,
Hung-Min Sun:
Simple authenticated key agreement protocol resistant to password guessing attacks.
Operating Systems Review 36(4): 14-22 (2002) |
2001 |
19 | | Chun-Li Lin,
Hung-Min Sun,
Tzonelih Hwang:
Efficient and Practical DHEKE Protocols.
Operating Systems Review 35(1): 41-47 (2001) |
2000 |
18 | | Hung-Min Sun:
On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank.
Int. J. Found. Comput. Sci. 11(2): 263-281 (2000) |
17 | EE | Hung-Min Sun:
Enhancing the Security of the McEliece Public-Key Cryptosystem.
J. Inf. Sci. Eng. 16(6): 799-812 (2000) |
16 | | Chun-Li Lin,
Hung-Min Sun,
Tzonelih Hwang:
Three-party Encrypted Key Exchange: Attacks and A Solution.
Operating Systems Review 34(4): 12-20 (2000) |
1999 |
15 | | Hung-Min Sun,
Wu-Chuan Yang,
Chi-Sung Laih:
On the Design of RSA with Short Secret Exponent.
ASIACRYPT 1999: 150-164 |
14 | | Hung-Min Sun,
Shiuh-Pyng Shieh,
Hsin-Min Sun:
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks.
Computer Communications 22(2): 193-194 (1999) |
13 | EE | Hung-Min Sun:
An efficient nonrepudiable threshold proxy signature scheme with known signers.
Computer Communications 22(8): 717-722 (1999) |
12 | EE | Hung-Min Sun:
On-line multiple secret sharing based on a one-way function.
Computer Communications 22(8): 745-748 (1999) |
11 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures.
J. Inf. Sci. Eng. 15(5): 679-689 (1999) |
1998 |
10 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
On Private-Key Cryptosystems Based on Product Codes.
ACISP 1998: 68-79 |
9 | EE | Hung-Min Sun:
Improving the Security of the McEliece Public-Key Cryptosystem.
ASIACRYPT 1998: 200-213 |
8 | EE | Markus Michels,
Markus Stadler,
Hung-Min Sun:
On the Security of Some Variants of the RSA Signature Scheme.
ESORICS 1998: 85-96 |
7 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
Secure broadcasting in large networks.
Computer Communications 21(3): 279-283 (1998) |
1997 |
6 | | Hung-Min Sun,
Bor-Liang Chen:
On the decomposition constructions for perfect secret sharing schemes.
ICICS 1997: 50-60 |
5 | | Hung-Min Sun,
Shiuh-Pyng Shieh:
Secret Sharing in Graph-Based Prohibited Structures.
INFOCOM 1997: 718-724 |
1996 |
4 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
ACM Conference on Computer and Communications Security 1996: 153-156 |
1994 |
3 | | Hung-Min Sun,
Shiuh-Pyng Shieh:
Optimal Information Dispersal for Reliable Communication in Computer Networks.
ICPADS 1994: 460-465 |
2 | | Shiuh-Pyng Shieh,
Hung-Min Sun:
On Constructing Secret Sharing Schemes.
INFOCOM 1994: 1288-1292 |
1 | | Hung-Min Sun,
Shiuh-Pyng Shieh:
On Dynamic Threshold Schemes.
Inf. Process. Lett. 52(4): 201-206 (1994) |