Wen-Chung KUO


A Steganographic Scheme Based on Formula Fully Exploiting Modification Directions
Wen-Chung KUO Ming-Chih KAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/11/01
Vol. E96-A  No. 11  pp. 2235-2243
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
data hidingextracting functionstego-imagemodulus operation
 Summary | Full Text:PDF(1.8MB)

Correction on "A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems"
Jiin-Chiou CHENG Wen-Chung KUO Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/07/01
Vol. E87-A  No. 7  pp. 1827-1829
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
elliptic curve cryptosystemMontgomery-form elliptic cuvremultiplication
 Summary | Full Text:PDF(85.2KB)

On the Number of Messages Which Cannot be Concealed in LUC
Wen-Chung KUO Chi-Sung LAIH Min Jea GAU Chin Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2218-2224
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
LUCRSAcryptosystemscryptanalysis
 Summary | Full Text:PDF(562.3KB)

New Signature Schemes Based on Factoring and Discrete Logarithms
Chi-Sung LAIH Wen-Chung KUO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 46-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
OSS schemeElGamal's cryptosystemDH cryptosystemSchnorr's scheme
 Summary | Full Text:PDF(641KB)