The SCEAS System
Navigation Menu

Search the dblp DataBase


Chien-Yuan Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chien-Yuan Chen, Chih-Cheng Hsueh
    Multiplication Algorithm on Quantum Computation. [Citation Graph (0, 0)][DBLP]
    FCS, 2005, pp:38-45 [Conf]
  2. Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
    A Conference Key Distribution Scheme Using Interpolating Polynomials. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:963-967 [Conf]
  3. Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen
    Remote scheme for password authentication based on theory of quadratic residues. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:12, pp:936-942 [Journal]
  4. Chien-Yuan Chen, T.-C. Liu
    A fast modular multiplication method based on the Lempel-Ziv binary tree. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:9, pp:871-874 [Journal]
  5. Jen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen
    A high-speed division algorithm in residue number system using parity. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2004, v:81, n:6, pp:775-780 [Journal]
  6. Chien-Yuan Chen, Chin-Chen Chang
    A fast modular multiplication algorithm for calculating the product AB modulo N. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:72, n:3-4, pp:77-81 [Journal]
  7. Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen
    Cryptanalysis of short secret exponents modulo RSA primes. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2004, v:160, n:1-4, pp:225-233 [Journal]
  8. Cheng-Yuan Ku, Chang-Jinn Tsao, Yi-Hsien Lin, Chien-Yuan Chen
    An escrow electronic cash system with limited traceability. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2004, v:164, n:1-4, pp:17-30 [Journal]
  9. Chien-Yuan Chen
    An efficient parity detection technique using the two-moduli set {2h - 1, 2h + 1}. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:22, pp:3426-3430 [Journal]
  10. Chien-Yuan Chen, Chin-Chen Chang, Wei-Pang Yang
    Cryptanalysis of the Secret Exponent of the RSA Scheme. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:2, pp:277-290 [Journal]

  11. A Generalization of de Weger's Method. [Citation Graph (, )][DBLP]

  12. The micropatterns of glutaraldehyde-crosslinked gelatin as ECM for attachment of tumor cells. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002