Technical Reports
¡@
[2001][2000] [1999] [1998]
(PDF viewer) to read the reports.
You are welcome to visit this page.
HOWEVER, PLEASE LEAVE YOUR NAME AND E-MAIL ADDRESS! We will send you
the requested report via e-mail BUT you are asked to give COMMENTS
and SUGGESTIONS. Push "Guest Book" to sign!
- Sung-Ming Yen, Side-channel Resistance Based on Randomized Euclidean Chain
and Randomized Vector Division Chain (under developed).
LCIS Tech. Report TR-2K1-12, National Central University, May 25, 2001. (The report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen and Shau-Yin Tseng, Differential Power Cryptanalysis of A Rijndael Implementation.
LCIS Tech. Report TR-2K1-9, National Central University, May 3, 2001.
[Abstract]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon, A
Countermeasure Against One Physical Cryptanalysis May Benefit Another Attack.
LCIS Tech. Report TR-2K1-8, National Central University, May 2, 2001.
[Abstract]
- Sung-Ming Yen and Ming-Shen Chang, Brief Review of Key Recovery Systems
(under developed).
LCIS Tech. Report TR-2K1-7, National Central University, March, 2001. (The report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen and Chung-Kai Huang, Comments on the UPayWord Micropayment Scheme
(under developed).
LCIS Tech. Report TR-2K1-6, National Central University, April, 2001. (The report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen, Seung-Joo Kim, Seon-Gan Lim, and Sang-Jae Moon, RSA Speedup with Residue Number System Immune
against Hardware Fault Cryptanalysis
(under developed).
LCIS Tech. Report TR-2K1-5, National Central University, April 5, 2001. (The report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen and Shun-Ming Yang, Differential Fault Cryptanalysis on the IDEA Cipher.
LCIS Tech. Report TR-2K1-3, National Central University, February, 2001.
(The abstract and report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen, On the Resistance of Physical Cryptanalysis over Exponentiation Using Division Chain
(under developed).
LCIS Tech. Report TR-2K1-1, National Central University, January, 2001.
(The abstract and report cannot be accessible at present time)
[Abstract]
¡@
- Sung-Ming Yen and Chien-Ning Chen, Address and Data Scrambling.
LCIS Tech. Report TR-2K-8, National Central University, November 13, 2000.
(The article is an internal report for a research project and becomes a
classified file which cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen, Simultaneous Signed-Digits Recoding and Multi-Computation Algorithms for the Applications on Elliptic Curve Cryptography.
LCIS Tech. Report TR-2K-7, National Central University, April 20, 2000. (The report cannot be accessible at present time))
[Abstract]
- Sung-Ming Yen, Ming-Shen Chang, and Seung-Joo Kim, Improved Key Escrow
with Limited Time Span (under developed).
LCIS Tech. Report TR-2K-6, National Central University, March 31, 2000.
(The report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen, Adaptive Exponentiation Computation by Functionally
Equivalent Recoding and Its Cryptographic Impact (under developed).
LCIS Tech. Report TR-2K-5, National Central University, February 28, 2000.
(The abstract and report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen and Chung-Pei Hung, Remarks on Some Proxy Signature Schemes
(under developed).
LCIS Tech. Report TR-2K-4, National Central University, February 23, 2000.
(The abstract and report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen, Blind Decryption for Link-by-Link
Encryption Mode (under developed).
LCIS Tech. Report TR-2K-3, National Central University, February 22, 2000.
(The abstract and report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen, Yuliang Zheng, Weighted One-Way
Hash Chain and Its Application (under developed).
LCIS Tech. Report TR-2K-2, National Central University, January 8, 2000.
[Abstract]
- Sung-Ming Yen and Tan-Chi Li, Simple and Efficient Batch Evaluation of
Exponentiations (under developed).
LCIS Tech. Report TR-2K-1, National Central University, January 1, 2000.
(Patent application will be delivered on this technique.
The abstract and report cannot be accessible at present time)
[Abstract]
1999
- Sung-Ming Yen, Practical Key Recovery Scheme.
LCIS Tech. Report TR-99-14, National Central University, October 1999.
[Abstract]
- Sung-Ming Yen and Ray-Lin Oyan, Improved Private Key Download Protocol.
LCIS Tech. Report TR-99-13, National Central University, October 1999.
(This technique has been transfered and patent application filed.
The report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen and Ray-Lin Oyan, Remarks on the SRP Password-based Key
Exchange Protocol.
LCIS Tech. Report TR-99-12, National Central University, October 1999.
[Abstract]
- Sung-Ming Yen, Memory Efficient High Performance
Multi-Exponentiation Algorithm Based on Euclidean Chain (under developed).
LCIS Tech. Report TR-99-11, National Central University, September 1999.
(Patent application has been filed on this technique.
The abstract and report cannot be accessible at present time)
[Abstract]
- Sung-Ming Yen and Tan-Chi Li, Efficient Multi-Exponentiation Algorithm
Based on Vector Division Chain (under developed).
LCIS Tech. Report TR-99-10, National Central University, August 1999.
[Abstract]
- Sung-Ming Yen and Ray-Lin Oyan, Cryptanalysis of Kwon-Kang-Song Authentication
Protocol.
LCIS Tech. Report TR-99-8, National Central University, September 1999.
[Abstract]
- Sung-Ming Yen, Meng-Tzung Liu, and Ray-Lin Oyan,
On-Line Password Refreshment (under developed).
LCIS Tech. Report TR-99-5, Tamkang University, April 1999.
- Sung-Ming Yen, Liang-Tai Ho, and Chiung-Ying Huang,
Internet Micropayment Based on Unbalanced One-way Binary Tree.
LCIS Tech. Report TR-99-3, Tamkang University, February 1999.
- Sung-Ming Yen, Vulnerability of the SVP Micropayment Scheme.
LCIS Tech. Report TR-99-2, Tamkang University, January 1999.
- Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, and Moti Yung,
Security Paradoxes: How Improving a Cryptosystem May Weaken It.
LCIS Tech. Report TR-99-1, Tamkang University, 1999.
1998
- Sung-Ming Yen, Cryptanalysis of Batch Verifying Multiple RSA
Digital Signatures. LCIS Tech. Report TR-98-16, Tamkang
University, September 1998.
[Abstract]
- Sung-Ming Yen, Chung-Ming Lee, and Liang-Tai Ho, A Prepaid
Micropayment System with Customer Fairness. LCIS
Tech. Report TR-98-15, Tamkang University,
September 1998.
[Abstract]
- Marc Joye and Sung-Ming Yen, New Minimal Modified Radix-r
Representation with Applications to Fast Cryptography. LCIS
Tech. Report TR-98-14, Tamkang University, September 1998.
[Abstract]
- Sung-Ming Yen, Comparisons of PayWord and Millicent
Micropayment Systems. LCIS Tech. Report TR-98-13, Tamkang
University, July 1998.
[Abstract]
- Sung-Ming Yen and Marc Joye, Checking Before Output May Not Be
Enough Against Fault-Based Cryptanalysis.
LCIS Tech. Report TR-98-12, Tamkang University, August 1998.
[Abstract]
- Sung-Ming Yen, Cryptanalysis of an Authentication
and Key Distribution Protocol. LCIS Tech. Report TR-98-10, Tamkang
University, July 1998.
[Abstract]
- Marc Joye, Jean-Jacques Quisquater, and Sung-Ming Yen,
Two Protocol Attacks on Okamoto and Uchiyama's
Cryptosystem. LCIS Tech. Report TR-98-8B, Tamkang
University, July 1998.
[Abstract] [PDF file] [Gzip'ed Postscript file]
- Marc Joye and Sung-Ming Yen, Binary Signed-Digit Exponent
Recoding and Fast Exponentiation. LCIS Tech. Report TR-98-7,
Tamkang University, April 1998.
[Abstract]
- Sung-Ming Yen, Minimum Weight Signed-Digit for Fast
Exponentiation. LCIS Tech. Report TR-97-?ID, Tamkang
University, 1997.
- Marc Joye and Sung-Ming Yen, Generation and Release of Secrets
Using One-way Cross-trees. LCIS Tech. Report TR-98-6,
Tamkang University, May 1998.
[Abstract]
- Sung-Ming Yen and Marc Joye, Key Sequence Generation and
Release Using Cryptographic Hash Chains. LCIS Tech. Report
TR-98-6ID, Tamkang University, March 1998.
[Abstract]
- Sung-Ming Yen and Marc Joye, An Improved Authenticated
Multiple-Key Agreement Protocol. LCIS Tech. Report TR-98-5B,
Tamkang University, May 1998.
[Abstract] [PDF file] [Gzip'ed Postscript file]
- Marc Joye and Sung-Ming Yen, ID-based Secret-Key
Cryptography. LCIS Tech. Report TR-98-4, Tamkang University,
April 1998.
[Abstract]
- Marc Joye and Sung-Ming Yen, Secure Evaluation of Modular
Functions. LCIS Tech. Report TR-98-3, Tamkang University,
March 1998.
[Abstract] [PDF file] [Gzip'ed Postscript file]
- Sung-Ming Yen and Pao-Yu Ku, Improved Micro-payment
Scheme. LCIS Tech. Report TR-98-2, Tamkang University,
February 1998.
[Abstract] [PDF file] [Gzip'ed Postscript file]
- Sung-Ming Yen, Marc Joye, and Pao-Yu Ku, An Improved
Cryptographic Checksum Algorithm Based on Stream Ciphers. LCIS
Tech. Report TR-98-1, Tamkang University, February 1998.
Documentation. The easiest way to write a technical report for LCIS
is to use the LaTeX2e class lcistech-ncu.cls
(version 1.8). The corresponding documentation can be found here.
It can be found here the document class llncs-2-8.cls
(version 2.8) to prepare a paper for Lecture Notes in Computer
Science published by Springer-Verlag.
The corresponding "instructions for authors" can be found here.
Back to LCIS homepage
Last modified: Thu Apr 5 19:00:48 CST 2000
WebMaster <yensm@csie.ncu.edu.tw>