Chien-Ning Chen

According to our database1, Chien-Ning Chen authored at least 13 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Secure GCM implementation on AVR.
Discret. Appl. Math., 2018

2016
On determining optimal parameters for testing devices against laser fault attacks.
Proceedings of the International Symposium on Integrated Circuits, 2016

2015
Secure Binary Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Memory Address Side-Channel Analysis on Exponentiation.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure.
J. Cryptogr. Eng., 2012

Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.
Proceedings of the Advances in Information and Computer Security, 2012

2011
Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2004
Improvement on Ha-Moon Randomized Exponentiation Algorithm.
Proceedings of the Information Security and Cryptology, 2004

2003
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...