The following pages link to Hung-Min Sun (Q596316):
Displaying 33 items.
- On the design of time-stamped signatures (Q596319) (← links)
- Improved authenticated multiple-key agreement protocol (Q597218) (← links)
- A communication-efficient private matching scheme in client-server model (Q726566) (← links)
- A novel mutual authentication scheme based on quadratic residues for RFID systems (Q936558) (← links)
- Secret sharing schemes for graph-based prohibited structures (Q1125037) (← links)
- Key generation of algebraic-code cryptosystems (Q1324386) (← links)
- On dynamic threshold schemes (Q1341683) (← links)
- Weighted decomposition construction for perfect secret sharing schemes (Q1609153) (← links)
- An efficient solution for hierarchical access control problem in cloud environment (Q1718671) (← links)
- A provable authenticated group key agreement protocol for mobile environment (Q1750007) (← links)
- An efficient construction of perfect secret sharing schemes for graph-based structures (Q1912864) (← links)
- Recursive constructions for perfect secret sharing schemes (Q1962965) (← links)
- On private-key encryption using product codes (Q1964004) (← links)
- Password-based authentication and key distribution protocols with perfect forward secrecy (Q2507696) (← links)
- Password authenticated key exchange protocols among diverse network domains (Q2567273) (← links)
- On the Improvement of the BDF Attack on LSBS-RSA (Q3511153) (← links)
- Dual RSA and Its Security Analysis (Q3548950) (← links)
- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack (Q3612375) (← links)
- (Q3839159) (← links)
- On double-one matrices and double-zero matrices (Q4013300) (← links)
- (Q4249267) (← links)
- (Q4373611) (← links)
- (Q4457760) (← links)
- (Q4460706) (← links)
- (Q4502495) (← links)
- (Q4551115) (← links)
- ON THE DEALER'S RANDOMNESS REQUIRED IN PERFECT SECRET SHARING SCHEMES WITH ACCESS STRUCTURES OF CONSTANT RANK (Q5249040) (← links)
- A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code (Q5280572) (← links)
- Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time (Q5392916) (← links)
- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits (Q5502751) (← links)
- Public Key Cryptography - PKC 2005 (Q5711568) (← links)
- API Monitoring System for Defeating Worms and Exploits in MS-Windows System (Q5757704) (← links)
- On the security of some variants of the RSA signature scheme (Q5862294) (← links)