顏嵩銘 教授 E-mail: yensm + at sign + csie.ncu.edu.tw
|
IC卡安全之研究 (IC卡物理攻擊法)
公開金鑰密碼系統
資訊與通訊安全
快速計算機算術 (特別是針對密碼學的應用)
計算機演算法
數位電路設計
曾經擔任下列國內外研究機構與企業之技術顧問:
擔任下列國際密碼會議議程委員(program committee member):
ISPEC 2013 (The 9th International Conference on Information Security Practice and Experience), Lanzhou, China, May 12-14, 2013.
ICISC 2012 (The 15th Annual International Conference on Information Security and Cryptology), Seoul, Korea, November 28-30, 2012.
SECURWARE 2012 (The 6th International Conference on Emerging Security Information, Systems and Technologies), Rome, Italy, August 19-24, 2012.
ISPEC 2012 (The 8th International Conference on Information Security Practice and Experience), Hangzhou, China, April 9-12, 2012.
IWSEC 2011 (The 6th International Workshop on Security), Tokyo, Japan, November 8-10, 2011.
Chinacrypt 2011, Weihai, Shandong, China, June 20-23, 2011. (canceled)
2010 ICONI Workshop on Network Security, Mactan Island Resort, Philippines, December 16-20, 2010.
APSIPA ASC 2010 (The Information and Network Security Track of the Annual Summit and Conference of Asia-Pacific Signal and Information Processing Association 2010), Singapore, December 14-17, 2010.
Pairing 2010 (The 4th International Conference on Pairing-based Cryptography), Japan, December 13-15, 2010.
CANS 2010 (9th International Conference on Cryptology and Network Security), Kuala Lumpur, Malaysia, December 12-14, 2010.
ICISC 2010 (The 13th Annual International Conference on Information Security and Cryptology), Seoul, Korea, December 1-3, 2010.
IWSEC 2010 (The 5th International Workshop on Security), Kobe, Japan, November 22-24, 2010.
ICISC 2009 (The 12th Annual International Conference on Information Security and Cryptology), Seoul, Korea, December 2-4, 2009.
CANS 2009 (8th International Conference on Cryptology and Network Security), Kanazawa, Ishikawa, Japan, December 12-14, 2009.
IWSEC 2009 (The 4th International Workshop on Security), Toyama, Japan, October 28-30, 2009.
CHES 2009 (The 11th Workshop on Cryptographic Hardware and Embedded Systems), Lausanne, Switzerland, September 6-9, 2009.
WOC 2009 (The 9th IASTED International Conference on Wireless and Optical Communications), Banff, Alberta, Canada, July 6-8, 2009.
SECRYPT 2009 (The 4th International Conference on Security and Cryptography), Milan, Italy, July 7-10, 2009.
ICISC 2008 (The 11th Annual International Conference on Information Security and Cryptology), Seoul, Korea, December 4-5, 2008.
IWSEC 2008 (The third International Workshop on Security), Kagawa, Japan, November 25-27, 2008.
SECRYPT 2008 (The 3rd International Conference on Security and Cryptography), Porto, Portugal, July 26-29, 2008.
WEBIST 2008 (4th International Conference on Web Information Systems and Technologies), Funchal, Madeira, Portugal, May 4-7, 2008.
AReS 2008 (The Third International Conference on Availability, Reliability and Security), Barcelona, Spain, March 4-7, 2008.
CANS 2007 (6th International Conference on Cryptology and Network Security), Singapore, December 8-10, 2007.
ICISC 2007 (The 10th Annual International Conference on Information Security and Cryptology), Seoul, Korea, November 29-30, 2007.
IWSEC 2007 (The second International Workshop on Security), Nara, Japan, October, 2007.
CNIS 2007 (The 4th IASTED International Conference on Communication, Network and Information Security), UC Berkeley, California, USA, Sept 24–26, 2007.
UASS 2007 (The 2nd International Workshop on Ubiquitous Application and Security Service), Kuala Lumpur, Malaysia, Sept 2-5, 2007.
IMSA 2007 (11th IASTED International Conference on Internet and Multimedia Systems and Applications), Honolulu, Hawaii, USA, August 20-22, 2007.
SECRYPT 2007 (The 2nd International Conference on Security and Cryptography), Barcelona, Spain, July 28-31, 2007.
ACNS 2007 (5th International Conference on Applied Cryptography and Network Security), Zhuhai, China, June 5-8, 2007.
NTMS 2007 (The first International Conference on New Technologies, Mobility and Security), Paris, France, May 2-4, 2007.
ISPEC 2007 (The 3rd Information Security Practice and Experience Conference), Hong Kong, China, May 7-10, 2007.
AReS 2007 (The Second International Conference on Availability, Reliability and Security), Vienna, Austria, April 10-13, 2007.
WEBIST 2007 (3rd International Conference on Web Information Systems and Technologies), Barcelona, Spain, March 3-6, 2007.
ICISC 2006 (The 9th Annual International Conference on Information Security and Cryptology), Busan, Korea, November 30-December 1, 2006.
CANS 2006 (5th International Workshop on Cryptology and Network Security), Shuzhou, China, November 29-December 1, 2006.
IWSEC 2006 (The first International Workshop on Security), Kyoto Japan, October 23-24, 2006.
CHES 2006 (The Eighth International Workshop on Cryptographic Hardware and Embedded Systems), Yokohama, Japan, October 10-13, 2006, 2006.
CNIS 2006 (IASTED International Conference on Communication, Network and Information Security), MIT, Cambridge, Massachusetts, USA, October 9-11, 2006.
CCN 2006 (IASTED International Conference on Communications and Computer Networks), Lima, Peru, October 4-6, 2006.
IMSA 2006 (10th IASTED International Conference on Internet and Multimedia Systems and Applications), Honolulu, Hawaii, USA, August 14-16, 2006.
SECRYPT 2006 (The International Conference on Security and Cryptography), Setubal, Portugal, August 7-10, 2006.
AReS 2006 (The First International Conference on Availability, Reliability and Security), Vienna, Austria, April 20-22, 2006.
WEBIST 2006 (2nd International Conference on Web Information Systems and Technologies), Setubal, Portugal, April 10-13, 2006.
ET-WBC 2006 (Emerging Technologies for Web-based Communities Workshop 2006), City of San Sebastian, Spain, Feb 25, 2006.
CANS 2005 (4th International Workshop on Cryptology and Network Security), Fujian, China, December 14-16, 2005.
ICISC 2005 (The 8th Annual International Conference on Information Security and Cryptology), Seoul, Korea, December 1-2, 2005.
CNIS 2005 (IASTED International Conference on Communication, Network and Information Security), Phoenix, USA, November 14-16, 2005.
CCN 2005 (IASTED International Conference on Communications and Computer Networks), Marina Del Rey, USA, October 24-26, 2005.
Mycrypt 2005 (International Conference on Cryptology in Malaysia), Kuala Lumpur, Malaysia, September 28-October 2, 2005.
IWAP 2005 (The 4th International Workshop for Applied PKI), Singapore, September 21-23, 2005.
WEBIST 2005 (International Conference on Web Information Systems and Technologies), Miami, USA, May 26-28, 2005.
ICOIN 2005 (The 20th International Conference on Information Networking), Jeju Island, Korea, Jan 31-Feb 2, 2005.
Asiacrypt 2004, Jeju Island, Korea, December 5-9, 2004.
ICISC 2004 (The 7th Annual International Conference on Information Security and Cryptology), Seoul, Korea, December 2-3, 2004.
CHES 2004 (The Sixth International Workshop on Cryptographic Hardware and Embedded Systems), Boston (or Cambridge), USA, Sept. 11-13, 2004.
PKC 2004, Singapore, March 1-4, 2004.
CNIS 2003 (IASTED International Conference on Communication, Networks and Information Security), New York, USA, December 10-12, 2003.
ICISC 2003 (The 6th Annual International Conference on Information Security and Cryptology), Seoul, Korea, November 27-28, 2003.
CHES 2003 (The Fifth International Workshop on Cryptographic Hardware and Embedded Systems), Cologne, Germany, Sept. 8-10, 2003.
WISA 2003 (The 4th International Workshop on Information Security Applications), Jeju Island, Korea, August 25-27, 2003.
ACISP 2003 (The Eighth Australasian Conference on Security and Privacy), Wollongong, Australia, July 10-12, 2003.
CT-RSA 2003 (RSA Conference 2003, Cryptographers’ Track), Moscone Center, San Francisco, USA, April 13-17, 2003.
Asiacrypt 2002, Queenstown, New Zealand, December 1-5, 2002.
ICISC 2002 (The 5th Annual International Conference on Information Security and Cryptology), Seoul, Korea, November 28-29, 2002.
WISA 2002 (The 3rd International Workshop on Information Security Applications), Jeju Island, Korea, August 28-30, 2002.
WISA 2001 (The 2nd International Workshop on Information Security Applications), Seoul, Korea, Sept 13-14, 2001.
WISA 2000 (The 1st International Workshop on Information Security Applications), Korea.
擔任下列國內密碼會議議程委員:
86年至101年全國資訊安全研討會 (ISC 1997 to 2012)
2000年國際計算機會議(ICS 2000)
1999, 2001, 2007年全國計算機會議 (NCS 1999, 2001, 2007)
擔任國外研究計畫主持人; 大學博士班論文口試(審查); 研究計畫審查
國外研究計畫主持人 8 次
國外大學博士班論文口試(審查) 2 次
國外研究計畫審查 2 次
擔任下列國際期刊 編輯 (Editor)
Communications and Computer Security (CCS)
Information Security Letter
擔任下列國際期刊論文審查委員 (Reviewer)
Journal of Cryptology 1 次
IEEE Transactions on Computers 12 次 (+退回邀請 4 次)
IEEE Transactions on Information Theory 1 次
IEEE Transactions on Knowledge and Data Engineering 1 次
IEEE Communications Letters 11 次
IEE Proceeding (包括: Proc. Computers and Digital Techniques; Proc. Communications; Proc. Information Security) 7 次
IEE Electronics Letters 61 次
ACM Transactions on Information and System Security 1 次
IEICE Transactions 1 次
Information Processing Letters 4 次
The Computer Journal (UK) 2 次
Information Sciences 2 次
Journal of Systems and Software 1 次
Journal Computer Standards & Interfaces 4 次
Journal of Communications and Networks 1 次
Cyberscape Journal, published by Multimedia University (MMU) 2 次
擔任下列國內期刊論文審查委員
Journal of Information Science and Engineering 22 次
Journal of the Chinese Institute of Electrical Engineering 10 次
Tamkang Journal of Science and Engineering 2 次
CCISA Communications 2 次
國外研究訪問, 受邀演講 及 參觀訪問記錄
Oct 19, 2005
Electronics and Telecommunications Research Institute (ETRI), Korea
* provided an invited talk on physical attack (受邀演講題目: Side Channel Cryptanalysis: State-of-the-Art)
* hosted by Dr. HoWon Kim
Oct 18, 2005
National Security Research Institute (NSRI), Korea
* provided an invited talk on physical attack (受邀演講題目: Possibility of Fault Cryptanalysis on Real Cryptosystem and Its Methods)
* hosted by Dr. ChangKyun Kim
July 14 to 16, 2003
Centre for Advanced Computing -- Algorithms and Cryptography, Division of Information and Communication Sciences, Macquarie University, Australia
* hosted by Prof. Huaxiong Wang
Nov. 26 to 27, 2002
Mobile Network Security Technology Research Center (MSRC), School of Electronic & Electrical Eng., Kyungpook National University, Daegu, Korea
* provided an invited talk on physical attack (受邀演講題目: Security Engineering for IC Card Implementation)
* hosted by Prof. SangJae Moon
Nov. 25 to 26, 2002
Korea Information Security Agency -- KISA, Korea
* provided consultation on authentication schemes
* hosted by Dr. Seungjoo Kim & Dr. Seongan Lim
Sept. 2 to 5, 2002
Korea Information Security Agency -- KISA, Korea
* provided consultation on authentication schemes
* hosted by Dr. Seungjoo Kim & Dr. Seongan Lim
Dec 17, 2001 (after Asiacrypt 2001)
Information Security Research Centre, Queensland University of Technology, Brisbane, Australia
* hosted by Prof. Ed Dawson
Dec. 5, 2001
Korea Information Security Agency -- KISA, Korea
* provided consultation on physical attack (受邀演講題目: Fast Implementation Method of Public Key Cryptography Secure against Fault Cryptanalysis)
* hosted by Dr. Seungjoo Kim & Dr. Seongan Lim
Dec 4, 2001
Dept of Mathematics, Inha University, Korea
* provided an invited talk on computer arithmetic (受邀演講題目: Exponentiation Algorithm for Public Key Cryptography Implementation)
* hosted by Prof. Ikkwon Yie
Dec. 14 to 15, 2000
School of Network Computing, Peninsula Campus, Monash University, Victoria, Australia
* provided an invited talk on physical attack (受邀演講題目: Hardware Physical Cryptanalysis)
* hosted by Prof. Yulian Zheng
其他產業技術提昇相關服務
(協助國內資訊安全研究機構及廠商進行技術研發或者技術轉移)
協助韓國 Korea Information Security Agency (KISA)機構進行 IC卡安全、身份認證安全之研究 (90/6~91/1; 91/4)
協助凌航科技公司進行 IC卡安全之深入研究與技術諮詢 (89/8~91/7)
協助網安科技公司進行 網路與資訊安全相關技術、IC卡安全、電子付款系統安全之研究(87/5~88/6; 91/5)
協助工研院電通所進行 NII安全之研究、IC卡安全之研究 (85年, 87年, 90年及91年)
協助資策會技術研究處進行 網際網路小額電子付款技術、網路安全技術之開發(86/9~88/8)
協助懷海科技公司進行 IC卡安全之研究、電子付款系統安全之研究 (89/6~90/12)
協助億兆科技公司進行 資訊與網路安全系統之研究 (90/1~90/6)
協助智邦科技公司進行 網路安全相關技術之諮詢、授課與開發 (84/7~84/9)
協助宏碁電腦公司進行 網路與資訊安全相關技術之諮詢、授課與開發 (85/7~85/9)
顏嵩銘教授發表之工業導向的論文列舉 (此份文件列舉出顏嵩銘教授所發表已經被某些機構、公司或標準組織採用或考慮的技術和系統)
國際共同作者與協同研究人員 (in alphabetical order):
Prof. Jaecheol Ha (Division of Information Science, Korea Nazarene University, Korea);
Dr. Marc Joye (Card Security Group, Gemplus Card International, France);
Dr. Dongryeol Kim (Korea Information Security Agency--KISA, Korea);
Prof. Seungjoo Kim (School of Information and Communication Eng., Sungkyunkwan University, Korea; previously with Korea Information Security Agency--KISA, Korea);
Prof. Arjen K. Lenstra;
Dr. Seongan Lim (previously with Korea Information Security Agency--KISA, Korea);
Prof. Sangjae Moon (Previous president of KIISC, Communication & Information Security Lab., School of Electronic and Electrical Engineering, Kyungpook National University, Korea);
Prof. Raphael C.W. Phan (Information Security Research Lab, Swinburne University of Technology, Sarawak Campus, Malaysia);
Prof. Tsuyoshi Takagi (School of Systems Information Science, Future University--Hakodate, Hokkaido, Japan);
Prof. Yulian Zheng (Department of Software and Information Systems, University of North Carolina at Charlotte, USA), etc.
專利發明 (包括已通過及申請中之專利):
專利名稱 | 國別 | 專利號碼 | 發明人 | 專利權人 | 專利期間 |
密碼通信之和核對裝置 | 日本 | 平成11年 實用新案第2943號 | 顏嵩銘 | 資策會 |
1999/8/18 ~
|
Cryptographic Checksum Apparatus | 美國 | 第 6477652 號 | 顏嵩銘 | 顏嵩銘 | 2002/11/5 ~ |
Electronic Payment Device Using Unbalanced Binary Tree and the Method of the Same | 美國 | 第 6499019 號 | 顏嵩銘 | 資策會 | 2002/12/24 ~ |
Electronic Payment Device Using Balanced Binary Tree and the Method of the Same | 美國 | 第 6546376 號 | 顏嵩銘 | 資策會 | 2003/4/8 ~ |
Method for Converting the Binary Representation of a Number in a Signed Binary Representation | 美國 | 第 6903663 號 | Marc Joye 顏嵩銘 | 法國 Gemplus Card International | 2004/10/28 ~ |
Method for Protecting Public Key Schemes from Timing, Power and Fault Attacks | 美國 | 第 20040125950 號 | Sung-Ming Yen, Chih-Chung Lu, Shau-Yin Tseng | 工研院 電通所 | 2004/7/1 ~ |
Minimal Arithmetic Representation of a Number n in Relative Base r for Breaking Down Computing Operations in Particular Cryptographic | 美國 | 第 20040162868 號 | Marc Joye 顏嵩銘 | 法國 Gemplus Card International | 2004/8/19 ~ |
Private Information Download Protocol | 美國 | (已通過) | 顏嵩銘 等人 | 資策會 | 2004/6/ ~ |
Method for Preventing the CRT-based Fault Attack of and Apparatus Thereof | 美國 | (已登錄申請中) US Patent Appl. No.10/260,169, Jan 9, 2003. | S.M. Yen, S. Kim, S. Lim, S.J. Moon等人 | 韓國 Korea Information Security Agency (KISA), Korea | |
Digital Signature Method using RSA Public-key Cryptographic based on CRT and Apparatus Thereof | 美國 | 已登錄申請中 (2002/2) | KNU研究員, 顏嵩銘 等人 | 韓國Kyungpook National University (KNU), Korea | |
Conversion Process of a Number from a Binary Representation to a Signed Binary Representation | 法國/歐洲 | 法國專利號碼2811168 | 顏嵩銘 | 法國 | 2002/1 ~ |
New Minimal Modified Radix-r Representation and Its Applications | 法國/歐洲 | (已登錄申請中) 01978522.9-2212-FR0103122 | Marc Joye 顏嵩銘 | 法國 Gemplus Card International | |
Digital Signature Methods and Apparatus | 歐洲 | 專利號碼 02102713.1-2415 | KNU研究員, 顏嵩銘 等人 | 韓國Kyungpook National University (KNU), Korea | 2003/3 ~ |
Method for Preventing the CRT-based Fault Attack of and Apparatus Thereof | 韓國 | No. 2002-0002017, Jan 14, 2002. | S.M. Yen (顏嵩銘), S. Kim, S. Lim, S.J. Moon等人 | 韓國 Korea Information Security Agency (KISA), Korea | |
Digital Signature Method using RSA Public-key Cryptographic based on CRT and Apparatus Thereof | 韓國 | (已登錄申請中) Korea Patent Appl. No.10-2002-0010256, Feb 26, 2002. | KNU研究員, 顏嵩銘 等人 | 韓國Kyungpook National University (KNU), Korea | |
密碼通信之和核對裝置 | 中華民國 | 發明第 155329 號 | 顏嵩銘 等人 | 資策會 | 2002/4/21 ~ 2018/6/18 |
不平衡二元樹電子支付演算裝置及其方法,及用於該裝置之載有軟體程式物品 | 中華民國 | 發明第 147555 號 | 顏嵩銘 | 資策會 | 2001/10/11 ~ |
平衡二元樹電子支付演算裝置及其方法 | 中華民國 | 發明第 147554 號 | 顏嵩銘 | 資策會 | 2001/10/11 ~ |
私密資料下載協定 | 中華民國 | 發明第 155301 號 | 顏嵩銘 | 資策會 | 2002/4/21 ~ |
保護公開金鑰系統以防止時間、電力與錯誤攻擊之方法與裝置 | 中華民國 | 發明第 202032 號 | 顏嵩銘 呂志忠 曾紹崟 | 工研院 電通所 | 2004/5/1 ~ 2022/12/26 |
驗證使用者身份的方法 | 中國大陸 | 第 153182 號 | 顏嵩銘 等人 | 資策會 | 2000/6/21 ~ 2020/6/20 |
Memory Efficient High Performance Multi-exponentiation Algorithm Based on Euclidean Chain | 中華民國 | 顏嵩銘 | 未定 | ||
Adaptive Exponentiation by Functionally Equivalent Recoding | 中華民國 | 顏嵩銘 | 未定 | ||
實用金匙恢復架構及系統 Practical Key Recovery Scheme | 中華民國 | 顏嵩銘 | 未定 |
近幾年內(2000 to 2005)曾主持之研究計畫
計畫名稱 | 擔任工作 | 起迄年月 | 補助機構 |
高效能多指數與整批指數運算方法設計與相關硬體架構之前瞻性研究(1/2) NSC 89-2213-E-008-052 | 主持人 | 89年8月~90年7月 | 國科會 |
金鑰恢復服務與金鑰託管機制之前瞻性研究 NSC 89-2213-E-008-055 | 主持人 | 89年8月~90年7月 | 國科會 |
IC卡安全之研究 | 主持人 | 89年10月~90年9月 | 凌航科技股份有限公司 |
攻擊smart card方法的設計與研究 T1-90018號 | 主持人 | 90年1月~90年12月 | 工研院 電通所 |
A Fast Implementation Method of Public Key Cryptography Secure Against Fault Analysis | 共同主持人 國際研究計畫:(韓國) | 90年6月~91年1月 | 韓國 Korea Information Security Agency (KISA), Korea |
高效能多指數與整批指數運算方法設計與相關硬體架構之前瞻性研究(2/2) NSC 90-2213-E-008-014 | 主持人 | 90年8月~91年7月 | 國科會 |
IC卡安全之研究 | 主持人 | 90年10月~91年9月 | 凌航科技股份有限公司 |
攻擊加解密模組方法的設計與研究 T2-91031-6號 | 主持人 | 91年1月~91年12月 | 工研院 電通所 |
新一代加密器Rijndael實現之整體安全研究分析 | 主持人 | 91年1月~91年12月 | 國立中央大學 |
(教育部第二期 卓越計畫) 尖端智慧型代理人技術–安全代理人技術之研究 (1/4) 甲-91-E-FA06-4-4 | 分項計畫 子計畫主持人 | 91年4月~92年3月 | 教育部 |
Consulting for Developing Evaluation Criteria for User Authentication Protocol | 主持人 (顧問) | 91年5月~91年12月 | 韓國 Korea Information Security Agency (KISA), Korea |
Consulting for Application of Attack Potential to Smartcards | 主持人 (顧問) | 91年8月~91年12月 | 韓國 Mobile Network Security Research Center (MSRC), Kyungpook National University, Korea |
EMV II IC卡安全與付款機製之研究 | 主持人 | 91年5月~ | 網安科技股份有限公司 |
IC卡物理特性攻擊法之深入研究與其驗證實驗工具之建立(1/3) NSC 91-2213-E-008-032 | 主持人 | 91年8月~92年7月 | 國科會 |
公平電子交易協定之深入研究與實作 NSC 91-2213-E-008-044 | 主持人 | 91年8月~92年7月 | 國科會 |
Efficient Countermeasures against SPA, DPA, and Timing Cryptanalysis for Public Key Cryptography | 主持人 | 91年10月~92年6月 | 韓國 Mobile Network Security Research Center (MSRC), Kyungpook National University, Korea |
具防攻擊之安全計算機架構研究與設計 T1-92016-3號 | 主持人 | 92年1月~92年12月 | 工研院 電通所 |
(教育部第二期 卓越計畫) 尖端智慧型代理人技術–安全代理人技術之研究 (2/4) 甲-91-E-FA06-4-4 | 分項計畫 子計畫主持人 | 92年4月~93年3月 | 教育部 |
非線性函數研究方法 | 主持人 | 92年5月~92年12月 | |
IC卡物理特性攻擊法之深入研究與其驗證實驗工具之建立(2/3) NSC 92-2213-E-008-007 | 主持人 | 92年8月~93年7月 | 國科會 |
Efficient Countermeasures against SPA, DPA, and Timing Cryptanalysis for Public Key Cryptography | 主持人 | 92年9月~93年5月 | 韓國 Mobile Network Security Research Center (MSRC), Kyungpook National University, Korea |
具防攻擊之智慧型安全機制研究 | 主持人 | 93年1月~93年12月 | 工研院 電通所 |
使用Weil Pairing及Tate Pairing之橢圓曲線密碼系統研究 | 主持人 | 93年1月~93年11月 | 中科院 |
(教育部第二期 卓越計畫) 91-H-FA08-1-4 | 分項計畫 子計畫主持人 | 93年4月~94年3月 | 教育部 |
IC卡物理特性攻擊法之深入研究與其驗證實驗工具之建立(3/3) NSC 93-2213-E-008-002 | 主持人 | 93年8月~94年 7月 | 國科會 |
針對近代三種數位簽章系統之可證明安全研究: Ring Signature, Committed Signature,及Chameleon Signature (1/2) NSC 93-2213-E-008-039 | 主持人 | 93年8月~94年 7月 | 國科會 |
Further Refinement on the Research of Side-channel Attack and Its Countermeasure | 主持人 | 93年9月~94年5月 | 韓國 Mobile Network Security Research Center (MSRC), Kyungpook National University, Korea |
智慧型多重認證系統及IC晶片通訊安全之研究 | 主持人 | 94年1月~94年12月 | 資策會 |
針對近代三種數位簽章系統之可證明安全研究: Ring Signature, Committed Signature,及Chameleon Signature (2/2) NSC 94-2213-E-008-009 | 主持人 | 94年8月~95年 7月 | 國科會 |
Enhanced Countermeasures against Hardware Fault Attack and Side-Channel Attack | 主持人 | 94年9月~95年5月 | 韓國 Mobile Network Security Research Center (MSRC), Kyungpook National University, Korea |
個人行程表 - 包括開授課程、實驗室討論與其他相關人員協同合作討論 (注意:隨時會有變動)
Monday | Tuesday | Wednesday | Thursday | Friday | |
9:00~12:00 am | | | Introduction to data security | ||
1:00~4:00 pm | Advanced topics in network security | ||||
4:00~5:00 pm | |
| |||
7:30~10:00 pm | | | | Lab group meeting | |
10:00 pm ~ ? | | | | | |
住址: | 桃園縣(32001) 中壢市 五權里2鄰 中大路300號 |
電話: | +886-3-4227151 (ext. 35316) |
傳真: | +886-3-4222681 |
電子郵件: | yensm + at sign + csie.ncu.edu.tw |