Abel C. H. Chen

Orcid: 0000-0003-3628-3033

According to our database1, Abel C. H. Chen authored at least 39 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
NIST Post-Quantum Cryptography Standard Algorithms Based on Quantum Random Number Generators.
CoRR, July, 2025

A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE.
CoRR, July, 2025

HQSI: Hybrid Quantum Swarm Intelligence - A Case Study of Online Certificate Status Protocol Request Flow Prediction.
CoRR, May, 2025

Implementation of Shor Algorithm: Factoring a 4096-Bit Integer Under Specific Constraints.
CoRR, May, 2025

Man-in-the-Middle Attacks Targeting Quantum Cryptography.
CoRR, March, 2025

One-Time Signature Based on Pseudorandom Number Generator.
CoRR, January, 2025

Hybrid Scheme of Post-Quantum Cryptography and Elliptic-Curve Cryptography for Certificates - A Case Study of Security Credential Management System in Vehicle-to-Everything Communications.
CoRR, January, 2025

An Efficient Key Expansion Method Applied to Security Credential Management System.
CoRR, January, 2025

Homomorphic Encryption Based on Lattice Post-Quantum Cryptography.
CoRR, January, 2025

Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941.
CoRR, January, 2025

Comments on "L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things" - Efficiency Improvement Based on the Certificate Digest Method.
IEEE Access, 2025

Comments on "Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities" - Privacy-Preserving Certificate in V2X Communications.
IEEE Access, 2025

2024
EQNN: Enhanced Quantum Neural Network.
CoRR, 2024

Key Expansion Based on Internet X.509 Public Key Infrastructure for Anonymous Voting.
CoRR, 2024

Post-Quantum Cryptography Anonymous Scheme - PQCWC: Post-Quantum Cryptography Winternitz-Chen.
CoRR, 2024

Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System.
CoRR, 2024

X.509 Information Security Certification Based on Post-Quantum Cryptography.
CoRR, 2024

A Study on the Situation of Connected Car Patent Portfolios.
CoRR, 2024

Performance Comparison of Various Modes of Advanced Encryption Standard.
CoRR, 2024

The Security Performance Analysis of Blockchain System Based on Post-Quantum Cryptography - A Case Study of Cryptocurrency Exchanges.
CoRR, 2024

Post-Quantum Cryptography Neural Network.
CoRR, 2024

Homomorphic Encryption Based on Post-Quantum Cryptography.
CoRR, 2024

Key Expansion Based on Elliptic Curve Cryptography for Anonymous Voting.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024

2023
PQC-NN: Post-Quantum Cryptography Neural Network.
IACR Cryptol. ePrint Arch., 2023

PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme.
IACR Cryptol. ePrint Arch., 2023

Machine learning for trust, security, and privacy in computing and communications.
EURASIP J. Wirel. Commun. Netw., 2023

Performance Analysis of Security Certificate Management System in Vehicle-to-Everything (V2X).
CoRR, 2023

Evaluation and Analysis of Standard Security Technology in V2X Communication - Exploring ECQV Implicit Certificate Cracking.
CoRR, 2023

The Pseudonymous Certificates for Healthcare Systems.
CoRR, 2023

Research on Efficiency Analysis of Microservices.
CoRR, 2023

Similarity Calculation Based on Homomorphic Encryption.
CoRR, 2023

Exploring the Techniques of Information Security Certification.
CoRR, 2023

Homomorphic Hashing Based on Elliptic Curve Cryptography.
CoRR, 2023

How to Prove the Optimized Values of Hyperparameters for Particle Swarm Optimization?
CoRR, 2023

The 3rd International Workshop on Deep Learning for the Web of Things.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Homomorphic Encryption-Based Similarity Calculation for Mobile Data Usage Prediction.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

2022
The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications.
IACR Cryptol. ePrint Arch., 2022

Machine learning and deep learning methods for wireless network applications.
EURASIP J. Wirel. Commun. Netw., 2022

Exploring the Optimized Value of Each Hyperparameter in Various Gradient Descent Algorithms.
CoRR, 2022


  Loading...