Chi-Sung LAIH


A Trust Distributed DRM System Using Smart Cards
Ming-Kung SUN Michael CHANG Hsiao-Ching LIN Chi-Sung LAIH Hui-Tang LIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12  pp. 2991-3000
Type of Manuscript:  PAPER
Category: Data Engineering, Web Information Systems
Keyword: 
anonymous consumptiondigital rights managementprivacypublic key infrastructuresmart cardticket card
 Summary | Full Text:PDF

Correction on "A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems"
Jiin-Chiou CHENG Wen-Chung KUO Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/07/01
Vol. E87-A  No. 7  pp. 1827-1829
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
elliptic curve cryptosystemMontgomery-form elliptic cuvremultiplication
 Summary | Full Text:PDF

Efficient Squaring of Large Integers
Wu-Chuan YANG Peng-Yueh HSEIH Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1189-1192
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key cryptographyalgorithmbig integersquaringmultiplication
 Summary | Full Text:PDF

A Tempo-Based t-out-of-n Audio Cryptography Scheme
Shin-Yan CHIOU Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8  pp. 2091-2098
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingaudio cryptographydata hiding
 Summary | Full Text:PDF

On the Implementation of Public Key Cryptosystems against Fault-Based Attacks
Chi-Sung LAIH Fu-Kuan TU Yung-Cheng LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/06/25
Vol. E82-A  No. 6  pp. 1082-1089
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
fault-based cryptanalysiserror detectionmodular multiplicationtamperfree devicesarithmetic codescryptosystems
 Summary | Full Text:PDF

A Systematic Construction of Inner Codes in Generalized Concatenated Codes for Correcting Unidirectional Byte Errors
Ching-Nung YANG Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/02/25
Vol. E81-A  No. 2  pp. 351-354
Type of Manuscript:  LETTER
Category: Information Theory and Coding Theory
Keyword: 
byte errorsunidirectional byte errorsunidirectional errorsunordered codes
 Summary | Full Text:PDF

On the Number of Messages Which Cannot be Concealed in LUC
Wen-Chung KUO Chi-Sung LAIH Min Jea GAU Chin Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2218-2224
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
LUCRSAcryptosystemscryptanalysis
 Summary | Full Text:PDF

Generating Functions for Asymmetric/Unidirectional Error Correcting and Detecting Codes
Ching-Nung YANG Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/06/25
Vol. E80-A  No. 6  pp. 1135-1142
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
asymmetric errorsunidirectional errorsgroup theoretic codeserror correctionerror detection
 Summary | Full Text:PDF

New Signature Schemes Based on Factoring and Discrete Logarithms
Chi-Sung LAIH Wen-Chung KUO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 46-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
OSS schemeElGamal's cryptosystemDH cryptosystemSchnorr's scheme
 Summary | Full Text:PDF

Secure Addition Sequence and Its Application on the Server-Aided Secret Computation Protocols
Chi-Sung LAIH Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 81-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
addition sequencecryptographyRSASASCprotocolssecure computations
 Summary | Full Text:PDF