Search results for: Sung-Ming Yen
IET Information Security > 2017 > 11 > 6 > 338 - 344
International Journal of Information Security > 2018 > 17 > 2 > 183-191
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Information Systems and Information Technologies (ISIT) Workshop, Security Session > 150-158
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Attacks on Public Key Systems > 53-61
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Provable Security and Primitives > 117-128
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 154-167
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Side-Channel Attacks > 374-388
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Finite Field and Modular Arithmetic II > 291-302
Lecture Notes in Computer Science > High Performance Computing and Communications > Track 10: Reliability, Fault-Tolerance, and Security > 549-554
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Implementation Issues > 183-195