The SCEAS System
| |||||||

## Search the dblp DataBase
Sung-Ming Yen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Chien-Ning Chen, Sung-Ming Yen
**Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:118-129 [Conf] - Sung-Ming Yen
**Practical Key Recovery Schemes.**[Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:104-114 [Conf] - Sung-Ming Yen
**Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:106-117 [Conf] - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
**Permanent Fault Attack on the Parameters of RSA with CRT.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:285-296 [Conf] - Chi-Sung Laih, Sung-Ming Yen
**Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:219-230 [Conf] - Chi-Sung Laih, Sung-Ming Yen, Lein Harn
**Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1991, pp:450-459 [Conf] - Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
**On Verifiable Implicit Asking Protocols for RSA Computation.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:296-307 [Conf] - Sung-Ming Yen, Chi-Sung Laih
**The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:447-456 [Conf] - Raphael C.-W. Phan, Sung-Ming Yen
**Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis.**[Citation Graph (0, 0)][DBLP] CARDIS, 2006, pp:135-150 [Conf] - Marc Joye, Sung-Ming Yen
**The Montgomery Powering Ladder.**[Citation Graph (0, 0)][DBLP] CHES, 2002, pp:291-302 [Conf] - Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung
**Observability Analysis - Detecting When Improved Cryptosystems Fail.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2002, pp:17-29 [Conf] - Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon
**Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection.**[Citation Graph (0, 0)][DBLP] FDTC, 2006, pp:53-61 [Conf] - ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim
**A CRT-Based RSA Countermeasure Against Physical Cryptanalysis.**[Citation Graph (0, 0)][DBLP] HPCC, 2005, pp:549-554 [Conf] - ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon
**A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:150-158 [Conf] - Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
**Adaptive-CCA on OpenPGP Revisited.**[Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:452-464 [Conf] - Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha
**Improvement on Ha-Moon Randomized Exponentiation Algorithm.**[Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:154-167 [Conf] - Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
**RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.**[Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:397-413 [Conf] - Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
**A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.**[Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:414-427 [Conf] - Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha
**Relative Doubling Attack Against Montgomery Ladder.**[Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:117-128 [Conf] - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
**Hardware Fault Attackon RSA with CRT Revisited.**[Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:374-388 [Conf] - Chi-Sung Laih, Sung-Ming Yen
**On the Design of Conference Key Distribution Systems for the Broadcasting Networks.**[Citation Graph (0, 0)][DBLP] INFOCOM, 1993, pp:1406-1413 [Conf] - Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
**Radix-r Non-Adjacent Form.**[Citation Graph (0, 0)][DBLP] ISC, 2004, pp:99-110 [Conf] - Sung-Ming Yen, Yuliang Zheng
**Weighted One-Way Hash Chain and Its Applications.**[Citation Graph (0, 0)][DBLP] ISW, 2000, pp:135-148 [Conf] - Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha
**Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.**[Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:183-195 [Conf] - Marc Joye, Sung-Ming Yen
**One-Way Cross-Trees and Their Applications.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:346-356 [Conf] - Marc Joye, Sung-Ming Yen
**New Minimal Modified Radix-r Representation with Applications to Smart Cards.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:375-384 [Conf] - Sung-Ming Yen
**Cryptanalysis and repair of the multi-verifier signature with verifier specification.**[Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:6, pp:537-544 [Journal] - Sung-Ming Yen, Kuo-Hong Liao
**Shared Authentication Token Secure Against Replay and Weak Key Attacks.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1997, v:62, n:2, pp:77-80 [Journal] - Chi-Sung Laih, Sung-Ming Yen
**Multi-Signature for Specified Group of Verifiers.**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 1996, v:12, n:1, pp:143-152 [Journal] - Marc Joye, Sung-Ming Yen
**ID-based Secret-Key Cryptography.**[Citation Graph (0, 0)][DBLP] Operating Systems Review, 1998, v:32, n:4, pp:33-39 [Journal] - Marc Joye, Sung-Ming Yen
**Optimal Left-to-Right Binary Signed-Digit Recoding.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2000, v:49, n:7, pp:740-748 [Journal] - Sung-Ming Yen, Marc Joye
**Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2000, v:49, n:9, pp:967-970 [Journal] - Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
**RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal] - Sung-Ming Yen, Chi-Sung Laih
**Improved Digital Signature Algorithm.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:5, pp:729-730 [Journal] - Sung-Ming Yen, Chi-Sung Laih
**Improved Digital Signature Suitable for Batch Verification.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:7, pp:957-959 [Journal] **PAYSTAR: A Denomination Flexible Micropayment Scheme.**[Citation Graph (, )][DBLP]**Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.**[Citation Graph (, )][DBLP]
Search in 0.115secs, Finished in 0.118secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |