Jiun-Ming Chen

According to our database1, Jiun-Ming Chen authored at least 15 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t -out-of- n Oblivious Signature.
J. Inf. Sci. Eng., 2018

2017
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature.
Secur. Commun. Networks, 2017

2014
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2007
Analysis of QUAD
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Note on Design Criteria for Rainbow-Type Multivariates.
IACR Cryptol. ePrint Arch., 2006

Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

2005
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
TTS: Rank Attacks in Tame-Like Multivariate PKCs.
IACR Cryptol. ePrint Arch., 2004

Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack.
IACR Cryptol. ePrint Arch., 2004

All in the XL Family: Theory and Practice.
Proceedings of the Information Security and Cryptology, 2004

On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

TTS: High-Speed Signatures on a Low-Cost Smart Card.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

Theoretical Analysis of XL over Small Fields.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A More Secure and Efficacious TTS Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

2001
On the Goubin-Courtois Attack on TTM.
IACR Cryptol. ePrint Arch., 2001


  Loading...