Publications


[Journal and Book Papers] [Proceedings Papers] [Others]


Journal and Book Papers

  1. Marc Joye and Sung-Ming Yen. Optimal left-to-right binary signed-digit recoding. To appear in IEEE Transactions on Computers (special issue of computer arithmetic).
  2. Sung-Ming Yen and Marc Joye. Checking before output may not be enough against fault-based cryptanalysis. To appear in IEEE Transactions on Computers.
  3. Sung-Ming Yen. Cryptanalysis of an authentication and key distribution protocol. IEEE Communications Letters, 3(1):7-8, January 1999.
  4. Marc Joye and Sung-Ming Yen. ID-based secret key cryptography. ACM Operating Systems Review, 32(4):33-39, 1998.
  5. Sung-Ming Yen and Marc Joye. Improved authenticated multiple-key agreement protocol. Electronics Letters, 34(18):1738-1739, 1998.

Proceedings Papers

  1. Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, and Moti Yung. Security paradoxes: How improving a cryptosystem may weaken it. In Proc. of the Ninth National Conference on Information Security, Taichung, Taiwan, R.O.C., 14-15th May 1999, pp. 27-32.
  2. Sung-Ming Yen, Liang-Tai Ho, and Chiung-Ying Huang. Internet micropayment based on unbalanced one-way binary tree. In Proc. of the Ninth National Conference on Information Security, Taichung, Taiwan, R.O.C., 14-15th May 1999, pp. 66-73.
  3. Sung-Ming Yen, Jong-Ming Lee, Liang-Tai Ho, and Jack G. Lee. PayFair: A prepaid Internet micropayment scheme promising customer fairness. In Proc. of the Ninth National Conference on Information Security, Taichung, Taiwan, R.O.C., 14-15th May 1999, pp. 74-82.
  4. Sung-Ming Yen, Meng-Tzung Liu, and Ray-Lin Oyan. Cryptographically strong on-line renewal protocol. In Proc. of the Ninth National Conference on Information Security, Taichung, Taiwan, R.O.C., 14-15th May 1999, pp. 316-323.
  5. Marc Joye and Richard Pinch. Cheating in split-knowledge RSA parameter generation. In D. Augot and C. Carlet, eds, Proc. of the Workshop on Coding and Cryptography, Paris, France, 11-14th January 1999, pp. 157-163.
  6. Marc Joye and Sung-Ming Yen. Generation/Release of secrets using one-way cross-trees. In T.L. Hwang and A.K. Lenstra, eds, Proc. of the 1998 International Computer Symposium, Workshop and Cryptography and Information Security, Tainan, Taiwan, R.O.C., 17-19th December 1998, pp. 23-28.
  7. Sung-Ming Yen and Hoi-Kwong Lo. Further cryptanalysis of the multi-verifier signature with verifier specification. In D.J. Guan, ed., Proc. of the Eighth National Symposium on Information Security, Kaohsiung, Taiwan, R.O.C., 15-16th May 1998, pp. 17-37.
  8. Sung-Ming Yen and Pao-Yu Kuo. Security consideration of using cryptographic hash chains. In D.J. Guan, ed., Proc. of the Eighth National Symposium on Information Security, Kaohsiung, Taiwan, R.O.C., 15-16th May 1998, pp. 59-69.
  9. Sung-Ming Yen and Pao-Yu Kuo. Improved micro-payment system. In D.J. Guan, ed., Proc. of the Eighth National Symposium on Information Security, Kaohsiung, Taiwan, R.O.C., 15-16th May 1998, pp. 175-186.
  10. Marc Joye, Jean-Jacques Quisquater, and T. Takagi. Are strong primes really stronger? In D.J. Guan, ed., Proc. of the Eighth National Symposium on Information Security, Kaohsiung, Taiwan, R.O.C., 15-16th May 1998, pp. 355-367.

Others

  1. Marc Joye and Sung-Ming Yen. Overall Study and Countermeasure Developments of the Hardware-Oriented Cryptanalysis, Final Report, National Science Council of the Republic of China, NSC87-2213-E-032-012 and NSC87-2811-E-032-0001, August 1998.

See also our Technical Reports page.


Back to LCIS homepage
Last modified: Wed Feb 23 23:38:52 CST 2000
WebMaster <yensm@csie.ncu.edu.tw>