Search the dblp DataBase
Sung-Ming Yen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chien-Ning Chen , Sung-Ming Yen Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:118-129 [Conf ] Sung-Ming Yen Practical Key Recovery Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:104-114 [Conf ] Sung-Ming Yen Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:106-117 [Conf ] Sung-Ming Yen , Sang-Jae Moon , JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:285-296 [Conf ] Chi-Sung Laih , Sung-Ming Yen Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:219-230 [Conf ] Chi-Sung Laih , Sung-Ming Yen , Lein Harn Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:450-459 [Conf ] Tsutomu Matsumoto , Hideki Imai , Chi-Sung Laih , Sung-Ming Yen On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:296-307 [Conf ] Sung-Ming Yen , Chi-Sung Laih The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:447-456 [Conf ] Raphael C.-W. Phan , Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CARDIS, 2006, pp:135-150 [Conf ] Marc Joye , Sung-Ming Yen The Montgomery Powering Ladder. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:291-302 [Conf ] Marc Joye , Jean-Jacques Quisquater , Sung-Ming Yen , Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:17-29 [Conf ] Sung-Ming Yen , Dongryeol Kim , Sang-Jae Moon Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:53-61 [Conf ] ChangKyun Kim , JaeCheol Ha , Sang-Jae Moon , Sung-Ming Yen , Sung-Hyun Kim A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. [Citation Graph (0, 0)][DBLP ] HPCC, 2005, pp:549-554 [Conf ] ChangKyun Kim , JaeCheol Ha , Sung-Hyun Kim , Seokyu Kim , Sung-Ming Yen , Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:150-158 [Conf ] Hsi-Chung Lin , Sung-Ming Yen , Guan-Ting Chen Adaptive-CCA on OpenPGP Revisited. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:452-464 [Conf ] Sung-Ming Yen , Chien-Ning Chen , Sang-Jae Moon , JaeCheol Ha Improvement on Ha-Moon Randomized Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:154-167 [Conf ] Sung-Ming Yen , Seungjoo Kim , Seongan Lim , Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:397-413 [Conf ] Sung-Ming Yen , Seungjoo Kim , Seongan Lim , Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:414-427 [Conf ] Sung-Ming Yen , Lee-Chun Ko , Sang-Jae Moon , JaeCheol Ha Relative Doubling Attack Against Montgomery Ladder. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:117-128 [Conf ] Sung-Ming Yen , Sang-Jae Moon , JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:374-388 [Conf ] Chi-Sung Laih , Sung-Ming Yen On the Design of Conference Key Distribution Systems for the Broadcasting Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1993, pp:1406-1413 [Conf ] Tsuyoshi Takagi , Sung-Ming Yen , Bo-Ching Wu Radix-r Non-Adjacent Form. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:99-110 [Conf ] Sung-Ming Yen , Yuliang Zheng Weighted One-Way Hash Chain and Its Applications. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:135-148 [Conf ] Sung-Ming Yen , Wei-Chih Lien , Sang-Jae Moon , JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:183-195 [Conf ] Marc Joye , Sung-Ming Yen One-Way Cross-Trees and Their Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:346-356 [Conf ] Marc Joye , Sung-Ming Yen New Minimal Modified Radix-r Representation with Applications to Smart Cards. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:375-384 [Conf ] Sung-Ming Yen Cryptanalysis and repair of the multi-verifier signature with verifier specification. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:6, pp:537-544 [Journal ] Sung-Ming Yen , Kuo-Hong Liao Shared Authentication Token Secure Against Replay and Weak Key Attacks. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:62, n:2, pp:77-80 [Journal ] Chi-Sung Laih , Sung-Ming Yen Multi-Signature for Specified Group of Verifiers. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1996, v:12, n:1, pp:143-152 [Journal ] Marc Joye , Sung-Ming Yen ID-based Secret-Key Cryptography. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:33-39 [Journal ] Marc Joye , Sung-Ming Yen Optimal Left-to-Right Binary Signed-Digit Recoding. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2000, v:49, n:7, pp:740-748 [Journal ] Sung-Ming Yen , Marc Joye Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2000, v:49, n:9, pp:967-970 [Journal ] Sung-Ming Yen , Seungjoo Kim , Seongan Lim , Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal ] Sung-Ming Yen , Chi-Sung Laih Improved Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:5, pp:729-730 [Journal ] Sung-Ming Yen , Chi-Sung Laih Improved Digital Signature Suitable for Batch Verification. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:7, pp:957-959 [Journal ] PAYSTAR: A Denomination Flexible Micropayment Scheme. [Citation Graph (, )][DBLP ] Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.305secs