Chien-Yuan Chen

Orcid: 0000-0002-4162-9695

According to our database1, Chien-Yuan Chen authored at least 29 papers between 1995 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Solving Bernstein and Vazirani's Problem with the 2-bit Permutation Function.
Quantum Inf. Process., 2022

2021
An exact quantum algorithm for testing 3-junta in Boolean functions with one uncomplemented product.
Quantum Inf. Process., 2021

2020
Information hiding method based on quantum image by using Bell states.
Quantum Inf. Process., 2020

An exact quantum algorithm for testing Boolean functions with one uncomplemented product of two variables.
Quantum Inf. Process., 2020

A natural language interface with casual users for crowd animation.
Comput. Animat. Virtual Worlds, 2020

Generation of small groups with rich behaviors from natural language interface.
Comput. Animat. Virtual Worlds, 2020

2018
RNS parity detection for the two-moduli set {2p - j, 2p + j}.
Int. J. Comput. Math. Comput. Syst. Theory, 2018

Hotspot Analysis of the Spatial and Temporal Distribution of Fires.
Proceedings of the 4th International Conference on Geographical Information Systems Theory, 2018

2015
Reversible Data Hiding Based on Histogram Modification over Ternary Computers.
J. Inf. Hiding Multim. Signal Process., 2015

2013
Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme.
J. Inf. Hiding Multim. Signal Process., 2013

Spatial and temporal distribution of disaster events in mountainous townships of Taiwan.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

2011
A Large Sigma V <sub>TH</sub> /VDD Tolerant Zigzag 8T SRAM With Area-Efficient Decoupled Differential Sensing and Fast Write-Back Scheme.
IEEE J. Solid State Circuits, 2011

Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan.
Int. J. Medical Informatics, 2011

An improved Chen's parity detection technique for the two-moduli set.
Int. J. Comput. Math., 2011

2009
The micropatterns of glutaraldehyde-crosslinked gelatin as ECM for attachment of tumor cells.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

A Generalization of de Weger's Method.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
Cryptographic relational algebra for databases using the field authenticator.
Comput. Math. Appl., 2007

A Conference Key Distribution Scheme Using Interpolating Polynomials.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
An efficient parity detection technique using the two-moduli set {2<sup><i>h</i></sup> - 1, 2<sup><i>h</i></sup> + 1}.
Inf. Sci., 2006

Quantum factorization algorithm by NMR ensemble computers.
Appl. Math. Comput., 2006

2005
Cryptanalysis of large RSA exponent by using the LLL algorithm.
Appl. Math. Comput., 2005

Multiplication Algorithm on Quantum Computation.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

2004
An escrow electronic cash system with limited traceability.
Inf. Sci., 2004

Cryptanalysis of short secret exponents modulo RSA primes.
Inf. Sci., 2004

A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math., 2004

1999
A fast modular multiplication algorithm for calculating the product AB modulo N.
Inf. Process. Lett., 1999

A fast modular multiplication method based on the Lempel-Ziv binary tree.
Comput. Commun., 1999

1996
Cryptanalysis of the Secret Exponent of the RSA Scheme.
J. Inf. Sci. Eng., 1996

1995
Remote scheme for password authentication based on theory of quadratic residues.
Comput. Commun., 1995


  Loading...