題名 | 作者 | 日期 |
A new construction of resilient functions over GF(p) with good cryptographic properties | Huang, Kai-Qun; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:35:19Z |
A Study on Parity Checks in Stream Cipher Correlation Attacks | Hong, Jun-Chu; Tsai, Wen-Nung; Chen, Rong-Jaye | 2006-10-27T06:11:18Z |
A Variant of AES against Square Attack | Wang, Wei-Chuan; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T04:00:36Z |
Cryptographic Protocols for Sealed-Bid Auctions Without Trusted Servers | Tzeng, Wen-Guey; Yeh, Nai-Chia; Chen, Rong-Jaye | 2006-10-16T04:00:49Z |
DNA solution to the traveling salesman optimization problem | Hwu, Jing-Shang; Chen, Rong-Jaye | 2006-10-17T08:35:25Z |
Efficient Computation of the Weil Pairing in ID-based Cryptosystems | Hwu, Jing-Shyang; Chen, Rong-Jaye; Lue, Huei-Shyong; Lin, Jer-Shyong | 2006-10-16T05:39:15Z |
Genetic Algorithms for Channel Assignment in PCS | Chen, Chih-Jen; Chang, Ming-Feng; Chen, Rong-Jaye | 2006-10-20T17:41:52Z |
(n,t) Threshold Key Generation in Identity-based Cryptosystems | Tseng, Fu-Kuo; Chen, Rong-Jaye | 2011-03-31T21:47:52Z |
New Efficient Constructions of Binary Asymmetric Error-Correcting Codes | Liang, Han-Chang; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:34:57Z |
The birnbaum importance and the optimal replacement for the consecutive-k-out-of-n: F system | Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-17T08:44:10Z |
Two New Constructions of Resilient Boolean Functions Satisfying Propagation Criterion | Lin, Chin-Hsin; Tsai, Shi-Chun; Chen, Rong-Jaye | 2006-10-16T04:00:42Z |