What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sung-Ming Yen
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2007
conf/wisa
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.
JaeCheol Ha
JeaHoon Park
Sang-Jae Moon
Sung-Ming Yen
2006
conf/fdtc
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection.
Sung-Ming Yen
Dongryeol Kim
Sang-Jae Moon
2005
conf/icisc
Relative Doubling Attack Against Montgomery Ladder.
Sung-Ming Yen
Lee-Chun Ko
Sang-Jae Moon
JaeCheol Ha
2004
conf/icisc
Improvement on Ha-Moon Randomized Exponentiation Algorithm.
Sung-Ming Yen
Chien-Ning Chen
Sang-Jae Moon
JaeCheol Ha
2004
conf/icics
Adaptive-CCA on OpenPGP Revisited.
Hsi-Chung Lin
Sung-Ming Yen
Guan-Ting Chen
2003
conf/acisp
Permanent Fault Attack on the Parameters of RSA with CRT.
Sung-Ming Yen
Sang-Jae Moon
JaeCheol Ha
2003
conf/acisp
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.
Sung-Ming Yen
2003
conf/acisp
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures.
Chien-Ning Chen
Sung-Ming Yen
2002
conf/icisc
Hardware Fault Attackon RSA with CRT Revisited.
Sung-Ming Yen
Sang-Jae Moon
JaeCheol Ha
2002
conf/ches
The Montgomery Powering Ladder.
Marc Joye
Sung-Ming Yen
2002
conf/pkc
New Minimal Modified Radix-r Representation with Applications to Smart Cards.
Marc Joye
Sung-Ming Yen
2002
conf/pkc
One-Way Cross-Trees and Their Applications.
Marc Joye
Sung-Ming Yen
2002
conf/ctrsa
Observability Analysis - Detecting When Improved Cryptosystems Fail.
Marc Joye
Jean-Jacques Quisquater
Sung-Ming Yen
Moti Yung
2001
conf/acisp
Practical Key Recovery Schemes.
Sung-Ming Yen
2001
conf/icisc
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
Sung-Ming Yen
Seungjoo Kim
Seongan Lim
Sang-Jae Moon
2001
conf/icisc
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.
Sung-Ming Yen
Seungjoo Kim
Seongan Lim
Sang-Jae Moon
1996
journals/compsec
Cryptanalysis and repair of the multi-verifier signature with verifier specification.
Sung-Ming Yen
1992
conf/asiacrypt
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
Chi-Sung Laih
Sung-Ming Yen
1992
conf/asiacrypt
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.
Sung-Ming Yen
Chi-Sung Laih
1992
conf/asiacrypt
On Verifiable Implicit Asking Protocols for RSA Computation.
Tsutomu Matsumoto
Hideki Imai
Chi-Sung Laih
Sung-Ming Yen
1991
conf/asiacrypt
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Chi-Sung Laih
Sung-Ming Yen
Lein Harn
Coauthors
Chi-Sung Laih
(4)
Chien-Ning Chen
(2)
Dongryeol Kim
(1)
Guan-Ting Chen
(1)
Hideki Imai
(1)
Hsi-Chung Lin
(1)
JaeCheol Ha
(5)
JeaHoon Park
(1)
Jean-Jacques Quisquater
(1)
Lee-Chun Ko
(1)
Lein Harn
(1)
Marc Joye
(4)
Moti Yung
(1)
Sang-Jae Moon
(8)
Seongan Lim
(2)
Seungjoo Kim
(2)
Sung-Ming Yen
(21)
Tsutomu Matsumoto
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to