Publications
[Journal and Book Papers] [Proceedings Papers] [Others]
Journal and Book Papers
- Marc Joye and Sung-Ming Yen. Optimal left-to-right binary
signed-digit recoding. To appear in IEEE Transactions on
Computers (special issue of computer arithmetic).
- Sung-Ming Yen and Marc Joye. Checking
before output may not be enough against fault-based
cryptanalysis. To appear in IEEE Transactions on
Computers.
- Sung-Ming Yen. Cryptanalysis of an authentication and key
distribution protocol. IEEE Communications Letters,
3(1):7-8, January 1999.
- Marc Joye and Sung-Ming Yen. ID-based secret key cryptography.
ACM Operating Systems Review, 32(4):33-39,
1998.
- Sung-Ming Yen and Marc Joye. Improved authenticated
multiple-key agreement protocol. Electronics Letters,
34(18):1738-1739, 1998.
Proceedings Papers
- Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, and
Moti Yung. Security paradoxes: How improving a cryptosystem may
weaken it. In Proc. of the Ninth National Conference on
Information Security, Taichung, Taiwan, R.O.C., 14-15th May
1999, pp. 27-32.
- Sung-Ming Yen, Liang-Tai Ho, and Chiung-Ying
Huang. Internet micropayment based on unbalanced one-way binary
tree. In Proc. of the Ninth National Conference on
Information Security, Taichung, Taiwan, R.O.C., 14-15th May
1999, pp. 66-73.
- Sung-Ming Yen, Jong-Ming Lee, Liang-Tai Ho, and Jack
G. Lee. PayFair: A prepaid Internet micropayment scheme promising
customer fairness. In Proc. of the Ninth National Conference on
Information Security, Taichung, Taiwan, R.O.C., 14-15th May
1999, pp. 74-82.
- Sung-Ming Yen, Meng-Tzung Liu, and Ray-Lin Oyan.
Cryptographically strong on-line renewal protocol. In Proc. of
the Ninth National Conference on
Information Security, Taichung, Taiwan, R.O.C., 14-15th May
1999, pp. 316-323.
- Marc Joye and Richard Pinch. Cheating in split-knowledge RSA
parameter generation. In D. Augot and C. Carlet, eds, Proc. of
the Workshop on Coding and
Cryptography, Paris, France, 11-14th January 1999, pp. 157-163.
- Marc Joye and Sung-Ming Yen. Generation/Release of secrets using
one-way cross-trees. In T.L. Hwang and A.K. Lenstra, eds,
Proc. of the 1998 International Computer Symposium, Workshop
and Cryptography and Information Security, Tainan, Taiwan,
R.O.C., 17-19th December 1998, pp. 23-28.
- Sung-Ming Yen and Hoi-Kwong Lo. Further cryptanalysis of the
multi-verifier signature with verifier specification. In
D.J. Guan, ed., Proc. of the Eighth National Symposium on
Information Security, Kaohsiung, Taiwan, R.O.C., 15-16th May
1998, pp. 17-37.
- Sung-Ming Yen and Pao-Yu Kuo. Security consideration of using
cryptographic hash chains. In D.J. Guan, ed., Proc. of the
Eighth National Symposium on Information Security, Kaohsiung,
Taiwan, R.O.C., 15-16th May 1998, pp. 59-69.
- Sung-Ming Yen and Pao-Yu Kuo. Improved micro-payment
system. In D.J. Guan, ed., Proc. of the Eighth National Symposium on
Information Security, Kaohsiung, Taiwan, R.O.C., 15-16th May
1998, pp. 175-186.
- Marc Joye, Jean-Jacques Quisquater, and T. Takagi. Are strong
primes really stronger? In D.J. Guan, ed., Proc. of the
Eighth National Symposium on Information Security, Kaohsiung,
Taiwan, R.O.C., 15-16th May 1998, pp. 355-367.
Others
- Marc Joye and Sung-Ming Yen. Overall Study and
Countermeasure Developments of the Hardware-Oriented
Cryptanalysis, Final Report, National Science Council of the
Republic of China, NSC87-2213-E-032-012 and NSC87-2811-E-032-0001,
August 1998.
See also our Technical Reports page.
Back to LCIS homepage
Last modified: Wed Feb 23 23:38:52 CST 2000
WebMaster <yensm@csie.ncu.edu.tw>