Chou-Chen YANG


Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
Chou-Chen YANG Ren-Chiun WANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/11/01
Vol. E88-B  No. 11  pp. 4370-4372
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysisguessing attackkey agreementpasswordwireless networks
 Summary | Full Text:PDF

Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines
Ting-Yi CHANG Chou-Chen YANG Chia-Meng CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/06/01
Vol. E88-B  No. 6  pp. 2557-2565
Type of Manuscript:  PAPER
Category: Terrestrial Radio Communications
Keyword: 
authenticationgeometric properties of linesmalicious behaviorsMobile IProuting securitywireless ad hoc networks
 Summary | Full Text:PDF

Cryptanalysis of Simple Authenticated Key Agreement Protocols
Chou-Chen YANG Ting-Yi CHANG Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8  pp. 2174-2176
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyinformation securitykey agreementkey exchange
 Summary | Full Text:PDF

Cryptanalysis of Publicly Verifiable Authenticated Encryption
Ting-Yi CHANG Chou-Chen YANG Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/06/01
Vol. E87-A  No. 6  pp. 1645-1646
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
authenticated encryption schemediscrete logarithmssigncryption
 Summary | Full Text:PDF

Security Enhancement for Protecting Password Transmission
Chou-Chen YANG Ting-Yi CHANG Jian-Wei LI Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/07/01
Vol. E86-B  No. 7  pp. 2178-2181
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationcryptographypasswordsecurity
 Summary | Full Text:PDF