Sung-Ming YEN


A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction
Wei-Chih LIEN Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 354-364
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
differential power analysismessage blindingmontgomery reductionRSA-CRTside-channel analysis
 Summary | Full Text:PDF(1.8MB)

Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order
Sung-Ming YEN Wei-Chih LIEN Chien-Ning CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/10/01
Vol. E94-A  No. 10  pp. 1981-1990
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
doubling attackelliptic curve cryptosystempower analysisRSAside-channel analysissmart cards
 Summary | Full Text:PDF(337.4KB)

On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique
Chien-Ning CHEN Sung-Ming YEN SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/10/01
Vol. E93-A  No. 10  pp. 1806-1812
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
elliptic curve scalar multiplicationexponentiation algorithmnon-adjacent formsimple power analysissliding window recoding
 Summary | Full Text:PDF(490.1KB)

Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem
Tsuyoshi TAKAGI David REIS, Jr. Sung-Ming YEN Bo-Ching WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 115-123
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
non-adjacent formradix-r representationsigned window methodelliptic curve cryptosystempairing based cryptosystem
 Summary | Full Text:PDF(209.6KB)

High Performance Nonce-Based Authentication and Key Distribution Protocols against Password Guessing Attacks
Sung-Ming YEN Meng-Tzung LIU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2209-2217
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
authenticationchallenge-responsecryptographykey distributionnonceoff-line dictionary attackon-line attackpasswordtrusted third-partyverifiable text attack
 Summary | Full Text:PDF(782.7KB)

Improved Common-Multiplicand Multiplication and Fast Exponentiation by Exponent Decomposition
Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/06/25
Vol. E80-A  No. 6  pp. 1160-1163
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
arithmetic algorithmexponentiationmultiplicationpublic key cryptography
 Summary | Full Text:PDF(284.3KB)

Secure Addition Sequence and Its Application on the Server-Aided Secret Computation Protocols
Chi-Sung LAIH Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 81-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
addition sequencecryptographyRSASASCprotocolssecure computations
 Summary | Full Text:PDF(675.2KB)