Chi-Sung Laih
According to our database1,
Chi-Sung Laih
authored at least 70 papers
between 1989 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication.
IEEE Trans. Computers, 2013
J. Vis. Commun. Image Represent., 2013
2012
Int. J. Commun. Syst., 2012
2011
Secur. Commun. Networks, 2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
2010
Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
J. Parallel Distributed Comput., 2009
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network.
Int. J. Inf. Sec., 2009
IET Commun., 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
IEEE Trans. Multim., 2008
Int. J. Inf. Sec., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Advances in Web Based Learning, 2008
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
Design a Secure and Practical Metering Scheme.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies.
J. Syst. Softw., 2005
Comput. Secur., 2005
Appl. Math. Comput., 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the Public Key Cryptography, 2005
2004
Proceedings of the Topics in Cryptology, 2004
2003
J. Inf. Sci. Eng., 2003
Cryptanalysis of an optimized protocol for mobile network authentication and security.
Inf. Process. Lett., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Comput. Commun., 2003
2002
2000
New Colored Visual Secret Sharing Schemes.
Des. Codes Cryptogr., 2000
On the hardware design for DES cipher in tamper resistant devices against differential fault analysis.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000
1999
IEEE Trans. Consumer Electron., 1999
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.
J. Inf. Sci. Eng., 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
IEEE Trans. Computers, 1998
1997
IEEE Trans. Computers, 1997
Inf. Process. Lett., 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
IEEE Trans. Computers, 1996
1995
IEEE Trans. Computers, 1995
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
1993
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993
1992
J. Inf. Sci. Eng., 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
Proceedings of the Advances in Cryptology, 1992
1991
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Proceedings of the Advances in Cryptology, 1991
1989
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng., 1989
A new threshold scheme and its application in designing the conference key distribution cryptosystem.
Inf. Process. Lett., 1989
Proceedings of the Proceedings IEEE INFOCOM '89, 1989
Proceedings of the Fifth International Conference on Data Engineering, 1989
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
Proceedings of the Advances in Cryptology, 1989