陳建源研究成果 - 國立高雄大學資訊工程學系

advertisement
陳 建
源 研 究 成 果
Oct, 2007
Journal
1.
Chang, C. C., Lin, C. H. and Chen, C. Y., "A Conference Key Distribution Scheme
Using Interpolating Polynomials," International Journal of Security & Its Applications,
Vol. 1, No. 2, pp. 9-20, Oct. 2007.
2.
Chien-Yuan Chen, Chih-Cheng Hsueh, and Chih-Chieh Hsu, “Two-to-one Quantum
Teleportation Protocol and Its Application,” Chaos, Solitons and Fractals, Volume 36,
Issue 5, June 2008, Pages 1399-1404.(SCI)
3.
Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptographic Relational
Algebra for Databases Using the Field Authenticator,” Computers & Mathematics with
applications, Volume 54, Issue 1, pp. 38-44, July 2007,
4.
(SCI)
Chien-Yuan Chen and Chih-Cheng Hsueh, “A Collusion Attack on Ghodosi and
Saeednia’s Scheme,” Journal of I-Shou University(義守大學學報), vol.12, pp.29-34,
Aug. 2006.
5.
Chih-Cheng Hsueh and Chien-Yuan Chen, “Constant-time Solution to Database
Searching by NMR Ensemble Computing,” Fortschritte der Physik, Vol. 54, No. 7, pp.
519-524, July 2006. (SCI)
6.
Chien-Yuan Chen, “An Efficient Parity Detection Technique Using the Two-Moduli Set
{2h – 1, 2h + 1},” Information Sciences , Vol. 176, No. 22, pp. 3426-3430, 2006. (SCI)
7.
Chien-Yuan Chen, Chin-Chen Chang and Chih-Cheng Hsueh, “A Fast Modular
Multiplication Algorithm with the Fixed Window Size”, Journal of I-Shou University
(義守大學學報), vol.12, pp.35-52, Aug. 2006 .
8.
Chien-Yuan Chen and Chih-Cheng Hsueh, “Quantum Factorization Algorithm by NMR
Ensemble Computers,” Applied Mathematics and Computation, Vol. 174, Issue 2, pp.
1363-1369, 15 March 2006. (SCI)
9.
Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptanalysis of Large RSA
Exponent by Using the LLL Algorithm,” Applied Mathematics and Computation, Vol.
169, Issue 1, pp. 516-525, October 2005.
(SCI)
10. Jen-Ho Yang, Chin-Chen Chang, and Chien-Yuan Chen, “A High-Speed Division
Algorithm
in
Residue
Number
System
Using
Parity-Checking
Technique,” International Journal of Computer Mathematics, Vol. 81, No. 6, pp.
775-780, June 2004. (SCI)
11. Cheng-Yuan Ku, Chang-Jinn Tsao, Yi-Hsien Lin, and Chien-Yuan Chen, “An Escrow
Electronic Cash System with Limited Traceability,” Information Sciences, Vol. 164/1-4,
pp 17-30, Aug. 2004. (NSC89-2213-E-214-009) (SCI)
12. Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptanalysis of Short Secret
Exponents Modulo RSA Primes,” Information Sciences, Vol. 160/1-4, pp. 225-233,
March 2004. (NSC-89-2213-E-214-002) (SCI)
13. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “Improved Lee and Kim's Message
Recovery Fair Blind Signature Scheme,” 義守大學學報第八期, pp. 215-225, 2001.
14. Chien-Yuan Chen, Yi-Hsien Lin, and Jr-Chen Shiue, “Fair Exchange Based on
Continued Fractions, “ 義守大學學報第八期, pp. 207-214, 2001.
15. Chang-Jinn Tsao, Chien-Yuan Chen, and Cheng-Yuan Ku, “An Electronic Bearer
Check System,” IEICE Transactions on Communications, Vol.E85-B, No.1 pp.325-331,
2002. (SCI)
16. Chien-Yuan Chen and Chin-Chen Chang, “A Fast Modular Multiplication Algorithm for
Calculating the Product AB Modulo N,” Information Processing Letters, Vol. 72, pp.
77-81, 1999.(EI)
17. Chang-Jinn Tsao, Yi-Hsien Lin, and Chien-Yuan Chen, “Optimal Cache Points of the
PayWord Chain in Micro-payment Systems,” 義守大學學報第六期, pp. 153-160,
1999.
18. Chien-Yuan Chen and Tung-Chun Liu, “A Fast Modular Multiplication Method Based
on the Lempel-Ziv Binary Tree,” Computer Communication, Vol. 22, No.9, pp. 871-874,
1999.( NSC87-2213-E-214-006)(EI)
19. Shin-Jia
Hwang,
Chien-Yuan
Chen,
and
Chin-Chen
Chang,
“An
Encryption/Multisignature Scheme with Specified Receiving Groups,” Computer
System Science & Engineering, Vol. 13, pp. 125-133, Jan. 1998. (EI)
20. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Hybrid Method for
Modular Exponentiation with Precomputation,” Electronics Letters, Vol. 32, pp.
540-541, 1996. (EI, SCI)
21. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of the Secret
Exponent of the RSA Scheme,” Journal of Information Science and Engineering, Vol.
12, pp. 277-290, 1996. (EI)
22. Chin-Chen Chang, Sun-Min Tsu, and Chien-Yuan Chen, “A Remote Scheme for
Password Authentication Based on the Theory of Quadratic Residues,” Computer
Communications , Vol. 18, No. 12, pp. 936-942, Dec. 1995. (EI)
23. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “A New Subliminal
,
Channel Based on Fiat-Shamir s Signature Scheme,” Journal of the Chinese Institute of
Engineers, Vol. 18, No. 6, pp.867-872, 1995.
24. Chin-Chen Chang and Chien-Yuan Chen, “A Dynamic Access Control Scheme Based
,
upon Ziegler s Row Displacement Method,” Journal of Electrical Engineering, Vol. 35,
No. 1, pp.59-68, Feb. 1992. 張真誠和陳建源,植基於 Ziegler 列向量位移的動態存
取控制法,民國 81 年電工雙月刊二月。
25. Chin-Chen Chang and Chien-Yuan Chen, “A Look-Ahead Digital Signature Scheme
Based upon Linked Lists,” Journal of Electrical Engineering, Vol. 35, No. 2, pp.59-68,
April, 1992. 張真誠和陳建源,一個植基於串列結構的向前看數值簽章法,民國 81
年電工雙月刊四月。
26. Chin-Chen Chang and Chien-Yuan Chen, “A Fast Accessing Scheme to Retrieve
Multi-Character Words,” Journal of Computers, 1993. 張真誠和陳建源,一種中文多
字詞的快速擷取法,民國 81 年電腦學刊。
Conference
1.
吳永春、張書豪和陳建源, ”基於列默概念之右移 k-ary 演算法”, UHC 2007 . U-Home
Conference Copyright c 2007 Kun Shan University (2007 UHC 優質家庭生活科技之
關鍵技術研討會) , P.58, 崑山科技大學, 台南, 2007.
2.
張書豪、吳永春和陳建源, ”改良式列默演算法”, CSIM2007 . Information Security &
Computer Science
(第十三屆資訊管理暨實務研討會), P.158, 樹德科技大學, 高雄,
2007.
3.
Chien-Yuan Chen and Chih-Cheng Hsueh, “Constant-time Solution to Simon’s
Decision Problem with the Known Subgroup Range in Quantum Computer,”
Proceedings of Third IASTED International Conference: Computational Intelligence,
Banff, Canada, pp. 19-22, July 2-4, 2007. (accepted rate 46.85)
4.
田錦燕、張圻毓、陳建源和王振仲, ”在 L1 範數下二維模格最短向量問題之研究,”
Proceedings of 2006 Multimedia and networking Systems Conference (2006 多媒體及
通訊系統研討會) , 光碟論文集, 義守大學, 高雄, Dec. 16, 2006.
5.
張圻毓、林儀逢和陳建源, “二階層列默演算法,” Proceedings of 2006 Multimedia and
networking Systems Conference (2006 多媒體及通訊系統研討會) , 光碟論文集, 義
守大學, 高雄, Dec. 16, 2006.
6.
張書豪、王振仲、陳建源和吳永春, “基於 k 進位之列默演算法,” Proceedings of 2006
Multimedia and networking Systems Conference (2006 多媒體及通訊系統研討會) , 光
碟論文集, 義守大學, 高雄, Dec. 16, 2006.
7.
尚惠芳和陳建源, “多媒體英語教學環境的個人學習資料庫之研究,” Proceedings
of 2006 Multimedia and networking Systems Conference (2006 多媒體及通訊系統研
討會) , 光碟論文集, 義守大學, 高雄, Dec. 16, 2006.
8.
Chih-Cheng Hsueh, Chien-Yuan Chen and Jeng-Jung Wang, “A Novel Ensemble
Sorting Algorithm in NMR Ensemble Quantum Computers”, 2006 Conference on
Information Technology and Applications in Outlying Islands (ITAOI2006 第五屆離島
資訊技術與應用研討會 ), 光碟論文集, National Kinmen Institute of Technology,
Kinmen, Taiwan, R.O.C, Jun. 2-3, 2006.
9.
Chih-Cheng Hsueh and Chien-Yuan Chen, “One to n quantum secret key encryption
protocol based on quantum discrete logarithm problem”, 2006 Conference on
Information Technology and Applications in Outlying Islands (ITAOI2006 第五屆離島
資訊技術與應用研討會 ), 光碟論文集, National Kinmen Institute of Technology,
Kinmen, Taiwan, R.O.C, Jun. 2-3, 2006.
10. Chih-Cheng Hsueh(薛智誠) and Chien-Yuan Chen(陳建源), “量子機率式模糊傳送協
定”, Proceedings of 2006 National Information Security Conference (第 16 屆全國資訊
安全會議), 光碟論文集, Feng Chia University, Taichung, Taiwan, R.O.C, Jun. 8-9,
2006.
11. Chih-Cheng Hsueh, Chien-Yuan Chen and and Yu-Chin Dai, “Quantum Identification
Protocol with Trusted Author”, National Computer Symposium (2005 年全國計算機會
議), Kun-Shan University, Tainan, Taiwan, R.O.C, Dec. 15-16, 2005.
12. Chien-Yuan Chen and Chih-Cheng Hsueh, “Multiplication Algorithm on Quantum
Computation,” Proceeding of the 2005 International Conference on Foundations of
Computer Science, pp. 38-45, Las Vegas, Nevada, U.S.A., June 27-29, 2005.
13. Chih-Cheng Hsueh, Chien-Yuan Chen, and Yu-Chin Dai, “Quantum Identification
Protocol with Maximally Entangled States,” 15th National Information Security
Conference, pp.1-8, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, Jun.
6-10, 2005.
14. Chih-Chieh Hsu, Chih-Cheng Hsueh, and Chien-Yuan Chen, “Two-to-one Quantum
Teleportation Protocol and Its Application,” 15th National Information Security
Conference, pp.389-396 , National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C,
Jun. 6-10, 2005.
15. Chih-Cheng Hsueh and Chien-Yuan Chen, “Quantum Secret Key Encryption Based on
Quantum Discrete Logarithm Problem,” Int. computer Symposium (ICS’04), pp.297-301,
The Grand Hotel, Taipei, Taiwan, R.O.C, Dec. 15-17, 2004.
16. 陳建源, 夏顥, “以加權布爾條件式量子搜尋法查詢資料庫之研究,” 陸軍軍官學校
綜合學術論文研討會, 資訊組, 陸軍官校, 高雄, 台灣, May 28, 2004.
17. Chien-Yuan Chen and Chih-Cheng Hsueh, “Quantum Factorization Algorithm by NMR
Ensemble Computers,” 14th National Information Security Conference, pp. 480-484,
National Taipei University of Technology, Taipei, Taiwan, R.O.C, Jun. 10-11, 2004.
18. Chih-Cheng Hsueh and Chien-Yuan Chen, “Quantum Key Agreement with Maximally
Entangled States,”
14th National Information Security Conference, pp. 236-242,
National Taipei University of Technology, Taipei, Taiwan, R.O.C, Jun. 10-11, 2004.
19. Chien-Yuan Chen, Cheng-Yuan Ku, and Haw Shiah, “The Montgomery Inverse in
Ternary Number System,” 2003 International Conference on Informatics, Cybernetics,
and Systems (ICICS’03), pp. 415-419, I-Shou University, Kaohsiung, Taiwan, R.O.C,
Dec. 14-16, 2003.
20. Chih-Cheng Hsueh and Chien-Yuan Chen, “Quantum Key Agreement Protocol Based
on Password Authentication,” 2003 International Conference on Informatics,
Cybernetics, and Systems (ICICS’03), pp. 349-355, I-Shou University, Kaohsiung,
Taiwan, R.O.C, Dec. 14-16, 2003.
21. 鄭勝文, 陳建源, 夏顥, “可代理公證之電子現金,” 2003 年海峽兩岸大學校長會議
暨科學技術學術研討會, pp. 120, 中正大學, 嘉義, 台灣, Oct. 27-28, 2003.
22. Chih-Cheng Hsueh, Chien-Yuan Chen, and Po-Wen Ko, “A Partially Blind Verification
Scheme,” 13th National Information Security Conference, pp. 391-397, Chang-Gung
University, Tao-Yuan, Taiwan, R.O.C, Aug. 28-29, 2003.
23. Wen-Rong Wu, Chien-Yuan Chen, and Chih-Cheng Hsueh, “無串謀之網路秘密競標
系統,” Symposium on Application and Development of Information Technologies, pp.
89-93, National Pingtung Institute of Commerce, Ping-Tung, Taiwan, R.O.C, Jun. 28,
2003.
24. Sheng-Wen Zheng and Chien-Yuan Chen, “A Secure and Untraceable off-line
Electronic Cash Based on the Discrete Logarithm Problem,” Symposium on Application
and Development of Information Technologies, pp. 99-104, National Pingtung Institute
of Commerce, Ping-Tung, Taiwan, R.O.C, Jun. 28, 2003.
25. Wen-Rong Wu, Chien-Yuan Chen, Chin-Yu Liu, and Ming-Ho Wu, “基於方程式之多
次 代 理 簽 章 法 ,” 12th National Information Security Conference, pp. 171-174,
Taichung Healthcare and Management University, Taichung, Taiwan, R.O.C, May
16-17, 2002.
26. Chien-Yuan Chen, and Chih-Cheng Hsueh, “基於方程式因數分解 Takagi 密碼系統之
模 數 ,”
12th
National
Information
Security
Conference,
pp.
355-358,
Taichung Healthcare and Management University, Taichung, Taiwan, R.O.C, May
16-17, 2002.
27. Jen-Ho Yang, Chien-Yuan Chen, and C. H. Wang, “An Improvement of the High-Speed
Division Algorithm for Residue Number System,” 12th National Information Security
Conference, pp. 273-276, Taichung Healthcare and Management University, Taichung,
Taiwan, R.O.C, May 16-17, 2002.
28. Chien-Yuan Chen and Chih-Cheng Hsueh, “A Collusion Attack on Ghodosi and
Saeednia’s Scheme,” Proceedings of National Computer Symposium: Information
Security, Vol. F, pp. F064-F066, Chinese-Culture University, Taipei, Taiwan, R.O.C,
Dec. 20-21, 2001.
29. Chien-Yuan Chen and Chih-Cheng Hsueh, “Cryptanalyzing Gong and Harn's RSA-type
Scheme by Using the Continued Fraction Method,” Proceedings of the tenth national
conference on science and technology of national defense (第十屆國防科技學術研討
會), pp. 1-91~1-93, Chung-Cheng Institute of Technology, National Defense University,
Tao-Yuan, Taiwan, R.O.C, Nov. 23-24, 2001.
30. Chien-Yuan Chen, Chin-Chen Chang, and Chih-Cheng Hsueh, “A Fast Modular
Multiplication Algorithm with the Fixed Window Size,” Proceedings of the tenth
national conference on science and technology of national defense (第十屆國防科技學
術研討會), pp. 1-94~1-97, Chung-Cheng Institute of Technology, National Defense
University, Tao-Yuan, Taiwan, R.O.C, Nov. 23-24, 2001. ( NSC89-2745-P-214-004)
31. 尚惠芳、陳建源, “多媒體電腦輔助英語閱讀教學軟體之製作,” 第三屆大專院校應
用外語實務成果發表研討會論文集 。斗六市:雲林科技大學,pp.171-180, 2001
( NSC 89-2411-H-214-002)。
32. Chang-Chin Tsao, Chien-Yuan Chen, and Chih-Cheng Hsueh, “A New Proxy Signature
Scheme Based on the Factorization Problem,” 2001 Conference on Theory and Practice
for Electronic Commerce, pp. 94-97, Chang-Jung University, Tainan, Taiwan, R.O.C,
Oct. 26, 2001.
33. Jong-E Hsien, Chih-Cheng Hsueh, and Chien-Yuan Chen, “An Electronic Traveler’s
Check System,” 2001 Conference on Theory and Practice for Electronic Commerce,
Tainan, pp. 164-169, Chang-Jung University, Tainan, Taiwan, R.O.C, Oct. 26, 2001.
34. Po-Wen Ko, Chien-Yuan Chen, and Chih-Cheng Hsueh, “An Electronic Gift Certificate
System,” 2001 Workshop on Consumer Electronics, 光碟論文集, Taipei World Trade
Center, Taipei, Taiwan, R.O.C, Oct. 17-19, 2001.
35. Chien-Yuan Chen and Chin-Cheng Hsueh, “ 基 於 三 次 方 程 式 之 因 數 分 解 模 數
2
N=p q,” 11th National Information Security Conference, pp. 249-252, National
Cheng-Kung
University,
Tainan,
Taiwan,
R.O.C,
May
3-4,
2001.
(NSC89-2213-E-214-055)
36. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “New Signcryption Scheme Based
on the Factoring Problem,” 2000 Asia Pacific Conference on Multimedia Technology
and Applications, pp.409-412, I-Shou University, Kaohsiung, Taiwan, R.O.C, Dec.
18-19, 2000.
37. Jen-Ho Yang, Chih-Cheng Hsueh, and Chien-Yuan Chen, “Partially Blind
Multisignature Scheme Based on RSA Modulus,” 2000 Asia Pacific Conference on
Multimedia Technology and Applications, pp. 420-424, I-Shou University, Kaohsiung,
Taiwan, R.O.C, Dec. 18-19, 2000.
38. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “Publicly Verifiable Batch
Encryption,” Proceedings of the 2000 International Computer Symposium, Workshop on
Cryptology and Information Security, pp.131-136, National Chung Cheng University,
Chiayi, Taiwan, R.O.C, Dec. 6-8, 2000.
39. Chih-Cheng Hsueh, Jen-Ho Yang, and Chien-Yuan Chen, “A Partially Blind
Multisignature Scheme Based on the Discrete Logarithm Problem,” 第六屆資訊管理
研究暨實務研討會, pp. 109, National Chiao-Tung University, Hsinchu, Taiwan, R.O.C,
Dec. 2, 2000.
40. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “A Joint Singature Scheme Against
Insider Attack,” 第六屆資訊管理研究暨實務研討會, pp. 114, National Chiao-Tung
University, Hsinchu, Taiwan, R.O.C, Dec. 2, 2000.
41. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “Publicly Verifiable Batch
Encryption with the Same Message,” 2000台灣區網際網路研討會(TANET2000), pp.
55-58, 成功大學, 台南, 台灣, Oct. 19-21, 2000.
42. Yi-Hsien Lin, Chang-Jinn Tsao, and Chien-Yuan Chen: “A Micropayment System with
Coins of Different Denominations,” CEC 2000全國校園電子商務應用研討會, pp.
237-243, 樹德科技大學, 高雄, 台灣, May 24, 2000.( NSC89-2213-E-214-004)
43. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “RSA-Based Escrowed Blind
Signature and Its Application,” Proceedings of Workshop on Internet & Distributed
Systems II, pp.412-416, National Cheng-Kung University, Tainan, Taiwan, R.O.C, May
11-12, 2000.( NSC89-2218-E-214-001)
44. Chang-Jinn Tsao, Yi-Hsien Lin, Chien-Yuan Chen, and Cheng-Yuan Ku, “An Efficient
Escrow Electronic Cash System Based on Yacobi's Scheme,” Proceedings of Workshop
on Internet & Distributed Systems II, pp.398-406, National Cheng-Kung University,
Tainan, Taiwan, R.O.C, May 11-12, 2000. (NSC89-2213-E-214-009)
45. Chien-Yuan Chen, “Cryptanalysis of Large RSA Exponents by Using the LLL
Algorithm,” Proceedings of The Tenth National Conference on Information Security,
pp.45-50, National Dong-Hwa University, Hualien, Taiwan, R.O.C, May 5-6, 2000.
46. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “Escrowed Blind Signature and It's
Application,” Proceedings of The tenth National Conference on Information Security,
pp.119-122, National Dong-Hwa University, Hualien, Taiwan, R.O.C, May 5-6, 2000.
(NSC89-2218-E-214-001)
47. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “Comment on Lee and Kim's
Message Recovery Fair Blind Signature Scheme,” Proceedings of The tenth National
Conference on Information Security, pp.123-125, National Dong-Hwa University,
Hualien, Taiwan, R.O.C, May 5-6, 2000.
48. Chang-Jinn Tsao, Yi-Hsien Lin, and Chien-Yuan Chen, “An Improved CFN
Untraceable Electronic Cash System,” Proceedings of The tenth National Conference on
Information Security, pp.222-227, National Dong-Hwa University, Hualien, Taiwan,
R.O.C, May 5-6, 2000.
49. Chien-Yuan Chen, “Cryptanalysis of Short Secret Exponents Modulo RSA Primes,”
Proceedings of 1999 National Computer Symposium, pp.C173-C177, Tamkang
University, Taipai, Taiwan, R.O.C, Dec. 20-21, 1999. (NSC89-2213-E-214-002)
50. Yi-Hsien Lin, Chang-Jinn Tsao, and Chien-Yuan Chen, “Fair Exchange Based on
Continued Fractions,” Eighth National Conference on Science and Technology of
National Defense, Chung-Cheng Institute of Technology, National Defense University,
Tao-Yuan, Taiwan, R.O.C, Nov. 20, 1999.
51. 曹昌進, 林宜賢, 陳建源, 古政元, “有效率之託管電子現金系統,” 第六屆三軍官校
基礎學術研討會論文集,中冊, pp. 343-348, 空軍官校, 高雄, 台灣, May 21, 1999.
(NSC89-2213-E-214-009)
52. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “A New Subliminal
Channel Without Sharing a Secret Key,” Proceedings of The Ninth National Conference
on Information Security, pp. 237-240, Chaoyang University, Taichung, Taiwan, R.O.C,
May 14-15, 1999.
53. Chien-Yuan Chen and Chin-Chen Chang, “A Fast Modular Multiplication Algorithm for
Calculating the Product AB Modulo N,” Proceedings of The Ninth National Conference
on Information Security, pp. 41-45, Chaoyang University, Taichung, Taiwan, R.O.C,
May 14-15, 1999.
54. Chien-Yuan Chen, Shin-Jia Hwang and Chin-Chen Chang, “New Multisignature
Scheme Based on One-Way Functions,” Proceedings of 4th Multimedia Technology and
Applications Symposium, pp.332-340, I-Shou University, Kaohsiung, Taiwan, R.O.C,
Apr. 16, 1999.
55. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “A Software Key Escrow
System Suitable for Broadcasting,” Proceedings of Workshop on Cryptology and
Information Security, pp.155-158, National Cheng Kung University, Tainan, Taiwan,
R.O.C, Dec. 17-19, 1998.
56. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “A New Multilevel
Database Field Encryption and Authentication Cryptosystem,” Proceedings of
Workshop on Cryptology and Information Security, pp.29-35, National Cheng Kung
University, Tainan, Taiwan, R.O.C, Dec. 17-19, 1998.
57. Chien-Yuan Chen, “A Fast Modular Multiplication Method Using Yacobi’s Algorithm,”
Proceedings of 1998 IEEE International Symposium on Information Theory, pp.50, MIT,
Cambridge, MA USA, Aug. 16-21, 1998.
58. Chien-Yuan Chen and Tung-Chun Liu, “A New Fast Modular Multiplication Method
Based on the Lempel-Ziv Tree,” Proceedings of The Eighth National Conference on
Information Security, pp.347-354, National Sun Yat-Sen University, Kaohsiung, Taiwan,
R.O.C, May 15-16, 1998.
59. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of the LUC
Public Key Cryptosystem,” Proceedings of The Eighth National Conference on
Information Security, pp.49-58, National Sun Yat-Sen University, Kaohsiung, Taiwan,
R.O.C, May 15-16, 1998.
60. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalyzing the
RSA-like Schemes by Using the Continued Fraction Method,” Proceedings of The
Eighth National Conference on Information Security, pp.81-90, National Sun Yat-Sen
University, Kaohsiung, Taiwan, R.O.C, May 15-16, 1998.
61. Liang-An Chen, Been-Chian Chien, and Chien-Yuan Chen, “A Dynamic Allocating
Approach for Dynamic Files on Multi-disk Systems,” Proceeding of 1997 National
Computer Symposium, pp. A60-A65, Tung-Hai University, Taichung, Taiwan, R.O.C,
Dec. 22-23, 1997.
62. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of Short
Secret Exponent and Large Public Exponent of RSA,” Proceedings of International
Conference on Cryptology and Information Security, pp.14-18, National Sun Yat-Sen
University, Kaohsiung, Taiwan, R.O.C, Dec. 19-21, 1996.
63. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Fast RSA-type Schemes
Based on Pell Equations over Zn*,” Proceedings of International Conference on
Cryptology and Information Security, pp. 1-5, National Sun Yat-Sen University,
Kaohsiung, Taiwan, R.O.C, Dec. 19-21, 1996.
64. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of a Key
Sharing System for Global Telecommunications,” Proceedings of The Sixth National
Conference on Information Security, pp.224-227, National Chung-Hsing University,
Taichung, Taiwan, R.O.C, May 1996. (查無日期)
65. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “An Improved Multistage
Sharing Scheme,” Proceedings of The Fifth National Conference on Information
Security, pp.142-143, National Taiwan University of Science and Technology, Taipei,
Taiwan, May 5, 1995.
66. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “A  (p-1) Method of
,
Factoring RSA s Modulus,” Proceedings of Cryptography-Policy and Algorithms
Conference, pp. 225-231, Brisbane, Australia, Jul. 3-5, 1995.
67. Chien-Yuan Chen, Chin-Chen Chang, and Wei-Pang Yang, “New Signature with
Message Recovery Against Forgery,” Proceedings of International Computer
Symposium, pp. 293-296, National Chiao-Tung University, Hsinchu, Taiwan, R.O.C,
Dec. 12-13, 1994.
其他論文:
1. 陳建源,"量子電腦對傳統區塊加解密法之威脅",資訊安全通訊第十一
卷第四期, pp. 37-50, October 2005.
2. Chih-Cheng Hsueh and Chien-Yuan Chen, “Ensemble Algorithm for the Selection
Problem by NMR Ensemble Quantum Computers,” quant-ph/0407109.
3. Chien-Yuan Chen, “Breaking Classical Public Key Cryptosystems by Using a
Novel Ensemble Search Algorithm,” quant-ph/0407126.
4. 陳建源、柯博文、謝忠益、薛智誠、楊仁和,"部分盲簽章與託管簽章之簡介",
資訊安全通訊第七卷第三期, pp. 78-85, June 2001.
○ 1999 年畢業
曹昌進(Chang-Jinn Tsao)
論文題目:An Electronic Bearer Check System
(無記名電子支票系統)
林宜賢(Yi-Hsien Lin)
論文題目:An Electronic Payment System with Bills of lading
(電子提貨單系統)
○ 2000 年畢業 謝忠益(Jong-E Hsien)
論文題目:An Electronic Traveler’s Check System
(電子旅行支票系統 )
柯博文(Po-Wen Ko)
論文題目:An Electronic Gift Certificate System
(電子禮券系統)
○ 2001 年畢業 楊仁和(Jen-Ho Yang)
論文題目:A Fast Division Algorithm in Residue Number System
(一個在餘數系統下的快速除法演算法)
○ 2002 年畢業 吳文榮(Wen-Rong Wu)
論文題目:The Study of Quantum Search
(量子搜尋之研究)
曾耀賢(Yao-Hsien Tseng)
論文題目:The Study of Oblivious Transfer
(模糊傳送之研究)
鄭勝文(Sheng-Wen Zheng)
論文題目:The Electronic Cash System with Proxy Notaries
(可代理公證之電子現金系統)
○ 2003 年畢業 吳旭東(Shiu-Dung Wu)
論文題目:The study of quantum oblivious transfer protocol
(量子模糊傳送協定之研究)
戴昱欽(Yu-Chin Dai)
論文題目:The Study of Quantum Identification System
(量子身份認證之研究)
Download