Cryptographers' World
 

Chi-Sung Laih


Author's Web Page Link

10 papers in database with 242 citations 

Editor of 1 conference proceedings book

H-number: 8

Conference Proceedings

 
1. Chi-Sung Laih, editor, Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings. Springer, 2003. ISBN 3-540-20592-6.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ching-Nung Yang,  Chi-Sung Laih,  New Colored Visual Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 20(3), pp. 325 - 336, Springer, 2000.

[Electronic Edition][Cited 50 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Wu-Chuan Yang,  Dah-Jyh Guan,  Chi-Sung Laih,  Fast Multi-computations with Integer Similarity Strategy, pp. 138 - 153, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

2. Shee-Yau Wu,  Shih-Chuan Lu,  Chi-Sung Laih,  Design of AES Based on Dual Cipher and Composite Field, pp. 25 - 38, CT-RSA 2004.

[Electronic Edition][Cited 11 times ]

3. Hung-Min Sun,  Wu-Chuan Yang,  Chi-Sung Laih,  On the Design of RSA with Short Secret Exponent, pp. 150 - 164, ASIACRYPT 1999.

[Electronic Edition][Cited 31 times ]

4. Chi-Sung Laih,  Sung-Ming Yen,  Secure Addition Sequence and Its Application on the Server-Aided Secret Computation Protocols, pp. 219 - 230, ASIACRYPT 1992.

[Electronic Edition][Cited 5 times ]

5. Sung-Ming Yen,  Chi-Sung Laih,  The Fast Cascade Exponentiation Algorithm and its Applications on Cryptography, pp. 447 - 456, ASIACRYPT 1992.

[Electronic Edition][Cited 18 times ]

6. Tsutomu Matsumoto,  Hideki Imai,  Chi-Sung Laih,  Sung-Ming Yen,  On Verifiable Implicit Asking Protocols for RSA Computation, pp. 296 - 307, ASIACRYPT 1992.

[Electronic Edition][Cited 28 times ]

7. Chi-Sung Laih,  Lein Harn,  Generalized Threshold Cryptosystems, pp. 159 - 166, ASIACRYPT 1991.

[Electronic Edition][Cited 41 times ]

8. Chi-Sung Laih,  Sung-Ming Yen,  Lein Harn,  Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence, pp. 450 - 459, ASIACRYPT 1991.

[Electronic Edition][Cited 11 times ]

9. Chi-Sung Laih,  Lein Harn,  Jau-Yien Lee,  Tzonelih Hwang,  Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space, pp. 286 - 298, CRYPTO 1989.

[Electronic Edition][Cited 39 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...