Sung-Ming Yen
According to our database1,
Sung-Ming Yen
authored at least 54 papers
between 1991 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
2017
SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017
IET Inf. Secur., 2017
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure.
J. Cryptogr. Eng., 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
2010
Trans. Comput. Sci., 2010
On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2008
2007
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements.
Appl. Math. Comput., 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2005
Design and implementation of computer- and network-assisted system for selecting priorities in the Joint College Entrance Examinations.
Int. J. Internet Protoc. Technol., 2005
IACR Cryptol. ePrint Arch., 2005
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the High Performance Computing and Communications, 2005
2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
IEEE Trans. Computers, 2000
Proceedings of the Information Security, Third International Workshop, 2000
1999
IEEE Commun. Lett., 1999
1998
1997
Inf. Process. Lett., 1997
1996
Cryptanalysis and repair of the multi-verifier signature with verifier specification.
Comput. Secur., 1996
1995
IEEE Trans. Computers, 1995
1993
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993
1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
Proceedings of the Advances in Cryptology, 1992
1991
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Proceedings of the Advances in Cryptology, 1991