Citation: Cn. Yang et Cs. Laih, A SYSTEMATIC CONSTRUCTION OF INNER CODES IN GENERALIZED CONCATENATED CODES FOR CORRECTING UNIDIRECTIONAL BYTE ERRORS, IEICE transactions on fundamentals of electronics, communications and computer science, E81A(2), 1998, pp. 351-354
Citation: Cn. Yang et Cs. Laih, GENERATING-FUNCTIONS FOR ASYMMETRIC UNIDIRECTIONAL ERROR-CORRECTING AND DETECTING CODES/, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(6), 1997, pp. 1135-1142
Citation: Wc. Kuo et al., ON THE NUMBER OF MESSAGES WHICH CANNOT BE CONCEALED IN LUC, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(11), 1997, pp. 2218-2224
Citation: Cs. Laih et Wc. Kuo, NEW SIGNATURE SCHEMES BASED ON FACTORING AND DISCRETE LOGARITHMS, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(1), 1997, pp. 46-53
Citation: Cs. Laih et Wc. Kuo, SPEEDING-UP THE COMPUTATIONS OF ELLIPTIC-CURVES CRYPTOSCHEMES, Computers & mathematics with applications, 33(5), 1997, pp. 29-36
Citation: Cn. Yang et Cs. Laih, A NOTE ON ERROR-CORRECTING CODES FOR AUTHENTICATION AND SUBLIMINAL CHANNELS, Information processing letters, 62(3), 1997, pp. 141-143
Citation: Cs. Laih et Mj. Gau, CRYPTANALYSIS OF A DIOPHANTINE EQUATION ORIENTED PUBLIC-KEY CRYPTOSYSTEM, I.E.E.E. transactions on computers, 46(4), 1997, pp. 511-512
Citation: Cs. Laih et Cn. Yang, ON THE ANALYSIS AND DESIGN OF GROUP THEORETICAL T-SYEC AUED CODES/, I.E.E.E. transactions on computers, 45(1), 1996, pp. 103-108
Citation: Sm. Yen et Cs. Laih, FAST ALGORITHMS FOR LUC DIGITAL SIGNATURE COMPUTATION, IEE proceedings. Computers and digital techniques, 142(2), 1995, pp. 165-169
Citation: Cc. Chang et al., CRYPTANALYSIS OF A PASSWORD AUTHENTICATION SCHEME USING QUADRATIC RESIDUES, Computer communications, 18(1), 1995, pp. 45-47
Citation: Sm. Yen et Cs. Laih, IMPROVED DIGITAL SIGNATURE SUITABLE FOR BATCH VERIFICATION, I.E.E.E. transactions on computers, 44(7), 1995, pp. 957-959
Citation: Sm. Yen et Cs. Laih, ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION, IEE proceedings. Computers and digital techniques, 141(5), 1994, pp. 271-273
Citation: Cs. Laih et Sm. Yen, SECURE ADDITION SEQUENCE AND ITS APPLICATION ON THE SERVER-AIDED SECRET COMPUTATION PROTOCOLS, IEICE transactions on fundamentals of electronics, communications and computer science, E77A(1), 1994, pp. 81-88
Citation: Cs. Laih et Wc. Kuo, IMPROVED IDENTITY-BASED KEY SHARING SYSTEM FOR MULTIADDRESS COMMUNICATION - COMMENT, Electronics Letters, 30(6), 1994, pp. 478-479
Citation: Sm. Yen et Cs. Laih, SERVER-AIDED HONEST COMPUTATION FOR CRYPTOGRAPHIC APPLICATIONS, Computers & mathematics with applications, 26(12), 1993, pp. 61-64
Citation: Sm. Yen et Cs. Laih, COMMON-MULTIPLICAND MULTIPLICATION AND ITS APPLICATIONS TO PUBLIC-KEYCRYPTOGRAPHY, Electronics Letters, 29(17), 1993, pp. 1583-1584