| 題名 | 作者 | 日期 |
| A BLOCK-BASED APPROACH TO SECURE ATM NETWORKING | Gamage, Chandana; Leiwo, Jussipekka; Zheng, Yuliang | 2006-10-20T02:11:33Z |
| A New Efficient k-out-of-n Oblivious Transfer Scheme by means of Common Cipher | Wang, Chih-Hung; Lin, Chi-Shin | 2006-10-13T01:19:20Z |
| A NOVEL ID-BASED GROUP SIGNATURE | Tseng, Yuh-Min; Jan, Jinn-Ke | 2006-10-20T06:04:18Z |
| A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process | Fan, Chun-I; Lei, Chin-Laung | 2006-11-13T02:44:13Z |
| An Attack on Untraceable Blind Signature Scheme | Fan, Chun-I; Chen, Ming-Te | 2006-06-09T08:18:49Z |
| Authenticated Key Agreement Protocol for Exchanging n2 Keys without Using One-way Hash Function | Huang, Chih-Jen; Chang, Shih-Hsu; Hsu, Wen-Hsing | 2006-11-13T03:00:30Z |
| Authentication Protocol for 3G Mobile Communication Systems | Lin, Chih-Hsing; Twu, Shih-Hsiung | 2006-10-16T03:22:52Z |
| Convertible Proxy Signature Scheme | Sun, Hung-Min | 2006-11-13T01:16:12Z |
| Cryptanalysis of a digital signature scheme based on factoring and discrete logarithms | Sun, Hung-Min | 2006-10-17T03:53:12Z |
| Cryptanalysis on Traceability on RSA-Based Partially Signature with Low Computation | Wu, Lin-Chuan; Yeh, Yi-Shiung; Liu, Tsann-Shyong | 2006-10-16T05:34:06Z |
| Fail-Stop Blind Signature Scheme Based on the Integer Factorization | Wu, Lin-Chuan; Fan, Chun-I; Yeh, Yi-Shiung; Liu, Tsann-Shyong | 2006-10-13T01:20:10Z |
| Group-Access Smart Card with Elliptic Curve Cryptosystem | Wu, Shyi-Tsong; Chieu, Bin-Chang | 2006-10-16T04:01:04Z |
| Improved Authenticated Key Agreement Scheme via Password Authentication | Sun, Hung-Min; Hsieh, Bin-Tsan | 2006-11-13T03:00:59Z |
| Improved authenticated multiple-key agreement protocol without using conventional one-way function | Chien, Hung-Yu | 2006-10-16T03:22:30Z |
| Nearly Optimal user Efficient Partially Blind Signatures | Fan, Chun-I | 2006-10-16T04:00:15Z |
| On-line Error Detection in Systolic Polynomial Basis Multiplier over GF(2m) Using Parity Prediction Method | Ma, Chi-Ting Jr; Wu, Chia-Jen Jr; Chiou, Che Wun Jr | 2011-03-24T23:44:00Z |
| Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option | Schartner, Peter Jr; Rass, Stefan Jr | 2011-01-10T00:03:57Z |
| Randomized Key Chaining Mides with Unforgeability | Lin, Hsi-Chung; Yen, Sung-Ming | 2006-10-16T03:22:42Z |
| Scalable Architecture for Dual Basis Multiplication over GF(2m) | Chen, Liang-Hwa Jr; Chang, Po-Lun Jr; Lee, Chiou-Yng Jr | 2011-03-24T23:42:19Z |
| User Efficient Randomized Chaum's Blind Signatures | Fan, Chun-I; Chen, Wei-Kuei | 2006-10-17T04:05:14Z |