2008 |
41 | | Sung-Ming Yen,
Hsi-Chung Lin,
Yen-Chang Chen,
Jia-Jun Hung,
Jui-Ming Wu:
PAYSTAR: A Denomination Flexible Micropayment Scheme.
WEBIST (2) 2008: 387-393 |
40 | EE | Hsi-Chung Lin,
Sung-Ming Yen,
Yi-Hsiung Huang:
Security reconsideration of the Huang-Wang nominative signature.
Inf. Sci. 178(5): 1407-1417 (2008) |
2007 |
39 | EE | JaeCheol Ha,
JeaHoon Park,
Sang-Jae Moon,
Sung-Ming Yen:
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.
WISA 2007: 333-344 |
38 | EE | Sung-Ming Yen,
Wei-Chih Lien,
Sang-Jae Moon:
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements.
Applied Mathematics and Computation 189(1): 285-290 (2007) |
2006 |
37 | EE | Raphael C.-W. Phan,
Sung-Ming Yen:
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis.
CARDIS 2006: 135-150 |
36 | EE | Sung-Ming Yen,
Dongryeol Kim,
Sang-Jae Moon:
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection.
FDTC 2006: 53-61 |
35 | EE | Tsuyoshi Takagi,
David Reis Jr.,
Sung-Ming Yen,
Bo-Ching Wu:
Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem.
IEICE Transactions 89-A(1): 115-123 (2006) |
2005 |
34 | EE | ChangKyun Kim,
JaeCheol Ha,
Sang-Jae Moon,
Sung-Ming Yen,
Sung-Hyun Kim:
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis.
HPCC 2005: 549-554 |
33 | EE | Sung-Ming Yen,
Lee-Chun Ko,
Sang-Jae Moon,
JaeCheol Ha:
Relative Doubling Attack Against Montgomery Ladder.
ICISC 2005: 117-128 |
32 | EE | Sung-Ming Yen,
Wei-Chih Lien,
Sang-Jae Moon,
JaeCheol Ha:
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Mycrypt 2005: 183-195 |
31 | EE | Li-Der Chou,
Sung-Ming Yen,
Bo-Ching Wu,
Chi-Hau Chung,
Kuo-Chih Hung,
Shang-Jie Chen,
Wei-Cheng Lai:
Design and implementation of computer- and network-assisted system for selecting priorities in the Joint College Entrance Examinations.
IJIPT 1(1): 50-60 (2005) |
2004 |
30 | EE | ChangKyun Kim,
JaeCheol Ha,
Sung-Hyun Kim,
Seokyu Kim,
Sung-Ming Yen,
Sang-Jae Moon:
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks.
ICCSA (1) 2004: 150-158 |
29 | EE | Hsi-Chung Lin,
Sung-Ming Yen,
Guan-Ting Chen:
Adaptive-CCA on OpenPGP Revisited.
ICICS 2004: 452-464 |
28 | EE | Sung-Ming Yen,
Chien-Ning Chen,
Sang-Jae Moon,
JaeCheol Ha:
Improvement on Ha-Moon Randomized Exponentiation Algorithm.
ICISC 2004: 154-167 |
27 | EE | Tsuyoshi Takagi,
Sung-Ming Yen,
Bo-Ching Wu:
Radix-r Non-Adjacent Form.
ISC 2004: 99-110 |
2003 |
26 | EE | Sung-Ming Yen:
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.
ACISP 2003: 106-117 |
25 | EE | Chien-Ning Chen,
Sung-Ming Yen:
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures.
ACISP 2003: 118-129 |
24 | EE | Sung-Ming Yen,
Sang-Jae Moon,
JaeCheol Ha:
Permanent Fault Attack on the Parameters of RSA with CRT.
ACISP 2003: 285-296 |
23 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers 52(4): 461-472 (2003) |
2002 |
22 | EE | Marc Joye,
Sung-Ming Yen:
The Montgomery Powering Ladder.
CHES 2002: 291-302 |
21 | EE | Marc Joye,
Jean-Jacques Quisquater,
Sung-Ming Yen,
Moti Yung:
Observability Analysis - Detecting When Improved Cryptosystems Fail.
CT-RSA 2002: 17-29 |
20 | EE | Sung-Ming Yen,
Sang-Jae Moon,
JaeCheol Ha:
Hardware Fault Attackon RSA with CRT Revisited.
ICISC 2002: 374-388 |
19 | EE | Marc Joye,
Sung-Ming Yen:
One-Way Cross-Trees and Their Applications.
Public Key Cryptography 2002: 346-356 |
18 | EE | Marc Joye,
Sung-Ming Yen:
New Minimal Modified Radix-r Representation with Applications to Smart Cards.
Public Key Cryptography 2002: 375-384 |
2001 |
17 | EE | Sung-Ming Yen:
Practical Key Recovery Schemes.
ACISP 2001: 104-114 |
16 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.
ICISC 2001: 397-413 |
15 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
ICISC 2001: 414-427 |
2000 |
14 | EE | Sung-Ming Yen,
Yuliang Zheng:
Weighted One-Way Hash Chain and Its Applications.
ISW 2000: 135-148 |
13 | EE | Marc Joye,
Sung-Ming Yen:
Optimal Left-to-Right Binary Signed-Digit Recoding.
IEEE Trans. Computers 49(7): 740-748 (2000) |
12 | EE | Sung-Ming Yen,
Marc Joye:
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis.
IEEE Trans. Computers 49(9): 967-970 (2000) |
1998 |
11 | | Marc Joye,
Sung-Ming Yen:
ID-based Secret-Key Cryptography.
Operating Systems Review 32(4): 33-39 (1998) |
1997 |
10 | EE | Sung-Ming Yen,
Kuo-Hong Liao:
Shared Authentication Token Secure Against Replay and Weak Key Attacks.
Inf. Process. Lett. 62(2): 77-80 (1997) |
1996 |
9 | EE | Sung-Ming Yen:
Cryptanalysis and repair of the multi-verifier signature with verifier specification.
Computers & Security 15(6): 537-544 (1996) |
8 | EE | Chi-Sung Laih,
Sung-Ming Yen:
Multi-Signature for Specified Group of Verifiers.
J. Inf. Sci. Eng. 12(1): 143-152 (1996) |
1995 |
7 | | Sung-Ming Yen,
Chi-Sung Laih:
Improved Digital Signature Algorithm.
IEEE Trans. Computers 44(5): 729-730 (1995) |
6 | | Sung-Ming Yen,
Chi-Sung Laih:
Improved Digital Signature Suitable for Batch Verification.
IEEE Trans. Computers 44(7): 957-959 (1995) |
1993 |
5 | | Chi-Sung Laih,
Sung-Ming Yen:
On the Design of Conference Key Distribution Systems for the Broadcasting Networks.
INFOCOM 1993: 1406-1413 |
1992 |
4 | | Chi-Sung Laih,
Sung-Ming Yen:
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
AUSCRYPT 1992: 219-230 |
3 | | Tsutomu Matsumoto,
Hideki Imai,
Chi-Sung Laih,
Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation.
AUSCRYPT 1992: 296-307 |
2 | | Sung-Ming Yen,
Chi-Sung Laih:
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.
AUSCRYPT 1992: 447-456 |
1991 |
1 | | Chi-Sung Laih,
Sung-Ming Yen,
Lein Harn:
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
ASIACRYPT 1991: 450-459 |