The SCEAS System
Navigation Menu

Search the dblp DataBase


Sung-Ming Yen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chien-Ning Chen, Sung-Ming Yen
    Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:118-129 [Conf]
  2. Sung-Ming Yen
    Practical Key Recovery Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:104-114 [Conf]
  3. Sung-Ming Yen
    Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:106-117 [Conf]
  4. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Permanent Fault Attack on the Parameters of RSA with CRT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:285-296 [Conf]
  5. Chi-Sung Laih, Sung-Ming Yen
    Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:219-230 [Conf]
  6. Chi-Sung Laih, Sung-Ming Yen, Lein Harn
    Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:450-459 [Conf]
  7. Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
    On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:296-307 [Conf]
  8. Sung-Ming Yen, Chi-Sung Laih
    The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:447-456 [Conf]
  9. Raphael C.-W. Phan, Sung-Ming Yen
    Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:135-150 [Conf]
  10. Marc Joye, Sung-Ming Yen
    The Montgomery Powering Ladder. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:291-302 [Conf]
  11. Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung
    Observability Analysis - Detecting When Improved Cryptosystems Fail. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:17-29 [Conf]
  12. Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon
    Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:53-61 [Conf]
  13. ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim
    A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:549-554 [Conf]
  14. ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon
    A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:150-158 [Conf]
  15. Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
    Adaptive-CCA on OpenPGP Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:452-464 [Conf]
  16. Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha
    Improvement on Ha-Moon Randomized Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:154-167 [Conf]
  17. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:397-413 [Conf]
  18. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:414-427 [Conf]
  19. Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha
    Relative Doubling Attack Against Montgomery Ladder. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:117-128 [Conf]
  20. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Hardware Fault Attackon RSA with CRT Revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:374-388 [Conf]
  21. Chi-Sung Laih, Sung-Ming Yen
    On the Design of Conference Key Distribution Systems for the Broadcasting Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1993, pp:1406-1413 [Conf]
  22. Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
    Radix-r Non-Adjacent Form. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:99-110 [Conf]
  23. Sung-Ming Yen, Yuliang Zheng
    Weighted One-Way Hash Chain and Its Applications. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:135-148 [Conf]
  24. Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha
    Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:183-195 [Conf]
  25. Marc Joye, Sung-Ming Yen
    One-Way Cross-Trees and Their Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:346-356 [Conf]
  26. Marc Joye, Sung-Ming Yen
    New Minimal Modified Radix-r Representation with Applications to Smart Cards. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:375-384 [Conf]
  27. Sung-Ming Yen
    Cryptanalysis and repair of the multi-verifier signature with verifier specification. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:6, pp:537-544 [Journal]
  28. Sung-Ming Yen, Kuo-Hong Liao
    Shared Authentication Token Secure Against Replay and Weak Key Attacks. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:62, n:2, pp:77-80 [Journal]
  29. Chi-Sung Laih, Sung-Ming Yen
    Multi-Signature for Specified Group of Verifiers. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:1, pp:143-152 [Journal]
  30. Marc Joye, Sung-Ming Yen
    ID-based Secret-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:4, pp:33-39 [Journal]
  31. Marc Joye, Sung-Ming Yen
    Optimal Left-to-Right Binary Signed-Digit Recoding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:7, pp:740-748 [Journal]
  32. Sung-Ming Yen, Marc Joye
    Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:9, pp:967-970 [Journal]
  33. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal]
  34. Sung-Ming Yen, Chi-Sung Laih
    Improved Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:5, pp:729-730 [Journal]
  35. Sung-Ming Yen, Chi-Sung Laih
    Improved Digital Signature Suitable for Batch Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:7, pp:957-959 [Journal]

  36. PAYSTAR: A Denomination Flexible Micropayment Scheme. [Citation Graph (, )][DBLP]

  37. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. [Citation Graph (, )][DBLP]

Search in 0.115secs, Finished in 0.118secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002