國立成功大學 |
2013-04 |
Natural language letter based visual cryptography scheme
|
Lin, Hsiao-Ching; Yang, Ching-Nung; Laih, Chi-Sung; Lin, Hui-Tang |
國立成功大學 |
2013-03 |
A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication
|
Lu, Chia-Yu; Jen, Shang-Ming; Laih, Chi-Sung |
國立成功大學 |
2012-09 |
MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia
|
Lin, Ching-Huang; Ma, Jian-Yuan; Laih, Chi-Sung; Li, Jung-Shian |
國立成功大學 |
2012-06 |
On the security of several Gen2-based protocols without modifying the standards
|
Lee, Chin-Feng; Chien, Hung-Yu; Laih, Chi-Sung; Chen, Chi-Sheng |
國立成功大學 |
2012-03 |
Server-less RFID authentication and searching protocol with enhanced security
|
Lee, Chin-Feng; Chien, Hung-Yu; Laih, Chi-Sung |
國立成功大學 |
2012-01 |
Long-Term Confidentiality of PKI
|
Laih, Chi-Sung; Jen, Shang-Ming; Lu, Chia-Yu |
國立成功大學 |
2011-01 |
A challenge-based trust establishment protocol for peer-to-peer networks
|
Chen, Pei-Te; Laih, Chi-Sung |
國立成功大學 |
2010-01 |
Malicious web content detection by machine learning
|
Hou, Yung-Tsung; Chang, Yimeng; Chen, Tsuhan; Laih, Chi-Sung; Chen, Chia-Mei |
國立成功大學 |
2009-06 |
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
|
Jen, Shang-Ming; Laih, Chi-Sung; Kuo, Wen-Chung |
國立成功大學 |
2009-05 |
Adaptive key pre-distribution model for distributed sensor networks
|
Laih, Chi-Sung; Sun, M. K.; Chang, Chen-Chung; Han, Y. S. |
國立成功大學 |
2009-04 |
A collaborative anti-spam system
|
Lai, Gu-Hsin; Chen, Chia-Mei; Laih, Chi-Sung; Chen, Tsuhan |
國立成功大學 |
2009-02 |
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network
|
Cheng, Jiin-Chiou; Laih, Chi-Sung |
國立成功大學 |
2008-06 |
IDSIC: an intrusion detection system with identification capability
|
Chen, Pei-Te; Laih, Chi-Sung |
國立成功大學 |
2008-04 |
Efficient key distribution for access control in pay-TV systems
|
Wang, Shyh-Yih; Laih, Chi-Sung |
國立成功大學 |
2007-02 |
Fast multicomputation with asynchronous strategy
|
Laih, Chi-Sung; Yang, Wu-Chuan; Guan, D. J.; Laih, Chi-Sung |
國立成功大學 |
2006-01 |
Merging: An efficient solution for a time-bound hierarchical key assignment scheme
|
Wang, Shyh-Yih; Laih, Chi-Sung |
國立成功大學 |
2006 |
Authorized tracking and tracing for RFID tags
|
Chen, Ming-Yang; Yang, Ching-Nung; Laih, Chi-Sung |
國立成功大學 |
2005-08-05 |
Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation
|
Yang, Wu-Chuan; Guan, D. J.; Laih, Chi-Sung |
國立成功大學 |
2005-03 |
Cryptanalyses of two key assignment schemes based on polynomial interpolations
|
Wang, Shyh-Yih; Laih, Chi-Sung |
國立成功大學 |
2005-02-17 |
Password-only authenticated key establishment protocol without public key cryptography
|
Laih, Chi-Sung; Ding, L.; Huang, Y. M. |
國立成功大學 |
2005 |
Fast multi-computations with integer similarity strategy
|
Yang, Wu-Chuan; Guan, Dah-Jyh; Laih, Chi-Sung |
國立成功大學 |
2004-07 |
Correction on "A scalar multiplication algorithm with recovery of the y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystems''
|
Cheng, Jiin-Chiou; Kuo, Wen-Chung; Laih, Chi-Sung |
國立成功大學 |
2004-05 |
Efficient squaring of large integers
|
Yang, Wu-Chuan; Hseih, Peng-Yueh; Laih, Chi-Sung |
國立成功大學 |
2004-02-15 |
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
|
Wang, Shyh-Yih; Laih, Chi-Sung |
國立成功大學 |
2004 |
Design of AES based on dual cipher and composite field
|
Wu, Shee-Yau; Lu, Shih-Chuan; Laih, Chi-Sung |
國立成功大學 |
2003-10-15 |
The GPKI developing status of Taiwan and some major Asia countries
|
Lin, Chen-Chi; Laih, Chi-Sung |
國立成功大學 |
2003-08 |
A tempo-based t-out-of-n audio cryptography scheme
|
Chiou, Shin-Yan; Laih, Chi-Sung |
國立成功大學 |
2003-07 |
New Audio Secret Sharing schemes with time division technique
|
Lin, Chen-Chi; Laih, Chi-Sung; Yang, Ching-Nung |
國立成功大學 |
2003-03-31 |
Cryptanalysis of an optimized protocol for mobile network authentication and security
|
Laih, Chi-Sung; Chiou, S. Y. |
國立成功大學 |
2002-01 |
On the design of RSA with short secret exponent
|
Sun, Hung-Min; Yang, Wu-Chuan; Laih, Chi-Sung |
國立成功大學 |
2001-11 |
Special issue on cryptology and information security - Foreword
|
Laih, Chi-Sung; Okamoto, E |
國立成功大學 |
2000-07 |
An efficient algorithm for computing the Luc chain
|
Chiou, S. Y.; Laih, Chi-Sung |
國立成功大學 |
2000-07 |
Cryptanalysis of Nyberg-Rueppel's message recovery scheme
|
Lin, Chen-Chi; Laih, Chi-Sung |
國立成功大學 |
2000-07 |
New colored visual secret sharing schemes
|
Yang, Ching-Nung; Laih, Chi-Sung |
國立成功大學 |
1999-06 |
On the implementation of public key cryptosystems against fault-based attacks
|
Laih, Chi-Sung; Tu, Fu-Kuan; Lee, Yung-Cheng |
南台科技大學 |
1999-05 |
On the Protection of DES Cipher in Tamper Resistant Devices Against Differential Fault Analysis
|
蔡杭耿; 王立洋; 賴溪松; Tsai, Hang-Geng; Wang, Lih-Yang; Laih, Chi-Sung; H. G. Tsai; L. Y. Wang; C. S. Laih |
國立成功大學 |
1999-02 |
On key distribution management for conditional access system on Pay-TV System
|
Tu, Fu-Kuan; Laih, Chi-Sung; Tung, Hsu-Hung |
國立成功大學 |
1999 |
On the design of RSA with short secret exponent
|
Sun, Hung-Min; Yang, Wu-Chuan; Laih, Chi-Sung |
國立成功大學 |
1997-07 |
A V-fairness (t,n) secret sharing scheme
|
Laih, Chi-Sung; Lee, Y. C. |