Citation: Sm. Yen, IMPROVED COMMON-MULTIPLICAND MULTIPLICATION AND FAST EXPONENTIATION BY EXPONENT DECOMPOSITION, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(6), 1997, pp. 1160-1163
Citation: Sm. Yen et Mt. Liu, HIGH-PERFORMANCE NONCE-BASED AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS AGAINST PASSWORD GUESSING ATTACKS, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(11), 1997, pp. 2209-2217
Citation: Sm. Yen et Kh. Liao, SHARED AUTHENTICATION TOKEN SECURE AGAINST REPLAY AND WEAK KEY ATTACKS, Information processing letters, 62(2), 1997, pp. 77-80
Authors:
HUANG TH
HSU CC
WEI TH
CHANG S
YEN SM
TSAI CP
LIU RT
KUO CT
TSE WS
CHIA C
Citation: Th. Huang et al., THE TRANSIENT OPTICAL KERR-EFFECT OF SIMPLE LIQUIDS STUDIED WITH AN ULTRASHORT LASER WITH VARIABLE PULSEWIDTH, IEEE journal of selected topics in quantum electronics, 2(3), 1996, pp. 756-768
Citation: Sm. Yen, CRYPTANALYSIS AND REPAIR OF THE MULTI-VERIFIER SIGNATURE WITH VERIFIER SPECIFICATION, Computers & security, 15(6), 1996, pp. 537-544
Citation: Sm. Yen et P. Suvannapattanan, IMPROVED DIGITAL SIGNATURE ALGORITHM (VOL 44, PG 729, 1995), I.E.E.E. transactions on computers, 45(7), 1996, pp. 864-864
Citation: Sm. Yen et Cs. Laih, FAST ALGORITHMS FOR LUC DIGITAL SIGNATURE COMPUTATION, IEE proceedings. Computers and digital techniques, 142(2), 1995, pp. 165-169
Citation: Sm. Yen et Cs. Laih, IMPROVED DIGITAL SIGNATURE SUITABLE FOR BATCH VERIFICATION, I.E.E.E. transactions on computers, 44(7), 1995, pp. 957-959
Citation: Sm. Yen et Cs. Laih, ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION, IEE proceedings. Computers and digital techniques, 141(5), 1994, pp. 271-273
Citation: Cs. Laih et Sm. Yen, SECURE ADDITION SEQUENCE AND ITS APPLICATION ON THE SERVER-AIDED SECRET COMPUTATION PROTOCOLS, IEICE transactions on fundamentals of electronics, communications and computer science, E77A(1), 1994, pp. 81-88
Citation: Sm. Yen et Cs. Laih, SERVER-AIDED HONEST COMPUTATION FOR CRYPTOGRAPHIC APPLICATIONS, Computers & mathematics with applications, 26(12), 1993, pp. 61-64
Citation: Sm. Yen et Cs. Laih, COMMON-MULTIPLICAND MULTIPLICATION AND ITS APPLICATIONS TO PUBLIC-KEYCRYPTOGRAPHY, Electronics Letters, 29(17), 1993, pp. 1583-1584