陳 建 源 研究成果Oct,2007

Journal

  1. Chang, C. C., Lin, C. H. and Chen, C. Y., "A Conference Key Distribution Scheme Using Interpolating Polynomials," International Journal of Security & Its Applications, Vol. 1, No. 2, pp. 9-20, Oct. 2007.
  2. Chien-Yuan Chen, Chih-Cheng Hsueh,and Chih-Chieh Hsu, “Two-to-one Quantum Teleportation Protocol and Its Application,” Chaos, Solitons and Fractals, Volume 36, Issue 5,June 2008, Pages 1399-1404.(SCI)
  3. Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptographic Relational Algebra for Databases Using the Field Authenticator,” Computers & Mathematics with applications, Volume 54, Issue 1, pp. 38-44, July 2007, (SCI)
  4. Chien-Yuan Chen and Chih-Cheng Hsueh, “A Collusion Attack on Ghodosi and Saeednia’s Scheme,”Journal of I-Shou University(義守大學學報), vol.12, pp.29-34, Aug. 2006.
  5. Chih-Cheng Hsueh and Chien-Yuan Chen, “Constant-time Solution to Database Searching by NMR Ensemble Computing,”Fortschritte der Physik,Vol. 54, No. 7, pp. 519-524,July 2006.(SCI)
  6. Chien-Yuan Chen, “An Efficient Parity Detection Technique Using the Two-Moduli Set {2h – 1, 2h + 1},” Information Sciences,Vol. 176, No. 22, pp. 3426-3430, 2006. (SCI)
  7. Chien-Yuan Chen, Chin-Chen Chang and Chih-Cheng Hsueh, “A Fast Modular Multiplication Algorithm with the Fixed Window Size”,Journal of I-Shou University (義守大學學報), vol.12, pp.35-52, Aug. 2006 .
  8. Chien-Yuan Chen and Chih-Cheng Hsueh, “Quantum Factorization Algorithm by NMR Ensemble Computers,”Applied Mathematics and Computation,Vol. 174, Issue 2, pp. 1363-1369, 15 March 2006.(SCI)
  9. Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptanalysis of Large RSA Exponent by Using the LLL Algorithm,”Applied Mathematics and Computation,Vol. 169, Issue 1, pp. 516-525, October 2005. (SCI)
  10. Jen-Ho Yang, Chin-Chen Chang, and Chien-Yuan Chen, “A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique,”International Journal of Computer Mathematics, Vol. 81, No. 6, pp. 775-780, June 2004. (SCI)
  11. Cheng-Yuan Ku,Chang-Jinn Tsao, Yi-Hsien Lin, and Chien-Yuan Chen, “An Escrow Electronic Cash System with Limited Traceability,” Information Sciences,Vol. 164/1-4, pp 17-30, Aug. 2004.(NSC89-2213-E-214-009) (SCI)
  12. Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptanalysis of Short Secret Exponents Modulo RSA Primes,”Information Sciences,Vol. 160/1-4, pp. 225-233, March 2004. (NSC-89-2213-E-214-002) (SCI)
  13. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “Improved Lee and Kim's Message Recovery Fair Blind Signature Scheme,”義守大學學報第八期, pp. 215-225, 2001.
  14. Chien-Yuan Chen, Yi-Hsien Lin, and Jr-Chen Shiue, “Fair Exchange Based on Continued Fractions, “義守大學學報第八期, pp. 207-214, 2001.
  15. Chang-Jinn Tsao, Chien-Yuan Chen, and Cheng-Yuan Ku,“An Electronic Bearer Check System,” IEICE Transactions on Communications, Vol.E85-B, No.1 pp.325-331, 2002. (SCI)
  16. Chien-Yuan Chen and Chin-Chen Chang, “A Fast Modular Multiplication Algorithm for Calculating the Product AB Modulo N,”Information Processing Letters, Vol. 72, pp. 77-81, 1999.(EI)
  17. Chang-Jinn Tsao, Yi-Hsien Lin, and Chien-Yuan Chen, “Optimal Cache Points of the PayWord Chain in Micro-payment Systems,”義守大學學報第六期, pp. 153-160, 1999.
  18. Chien-Yuan Chen and Tung-Chun Liu, “A Fast Modular Multiplication Method Based on the Lempel-Ziv Binary Tree,”Computer Communication, Vol. 22, No.9, pp. 871-874, 1999.(NSC87-2213-E-214-006)(EI)
  19. Shin-Jia Hwang, Chien-Yuan Chen,and Chin-Chen Chang, “An Encryption/Multisignature Scheme with Specified Receiving Groups,”Computer System Science & Engineering, Vol. 13, pp. 125-133, Jan. 1998. (EI)
  20. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Hybrid Method for Modular Exponentiation with Precomputation,” Electronics Letters, Vol. 32, pp. 540-541, 1996. (EI, SCI)
  21. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of the Secret Exponent of the RSA Scheme,”Journal of Information Science and Engineering, Vol. 12, pp. 277-290, 1996. (EI)
  22. Chin-Chen Chang, Sun-Min Tsu, and Chien-Yuan Chen,“A Remote Scheme for Password Authentication Based on the Theory of Quadratic Residues,”Computer Communications , Vol. 18, No. 12, pp. 936-942, Dec. 1995. (EI)
  23. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “A New Subliminal Channel Based on Fiat-Shamir,s Signature Scheme,”Journal of the Chinese Institute of Engineers, Vol. 18, No. 6, pp.867-872, 1995.
  24. Chin-Chen Chang and Chien-Yuan Chen, “A Dynamic Access Control Scheme Based upon Ziegler,s Row Displacement Method,”Journal of Electrical Engineering, Vol. 35, No. 1, pp.59-68, Feb. 1992.張真誠和陳建源,植基於Ziegler 列向量位移的動態存取控制法,民國81 年電工雙月刊二月。
  25. Chin-Chen Chang and Chien-Yuan Chen, “A Look-Ahead Digital Signature Scheme Based upon Linked Lists,”Journal of Electrical Engineering, Vol. 35, No. 2, pp.59-68, April, 1992.張真誠和陳建源,一個植基於串列結構的向前看數值簽章法,民國81 年電工雙月刊四月。
  26. Chin-Chen Chang and Chien-Yuan Chen, “A Fast Accessing Scheme to Retrieve Multi-Character Words,”Journal of Computers, 1993. 張真誠和陳建源,一種中文多字詞的快速擷取法,民國 81 年電腦學刊。

Conference

  1. 吳永春、張書豪和陳建源, ”基於列默概念之右移k-ary演算法”, UHC 2007 . U-Home Conference Copyright c 2007 Kun Shan University (2007 UHC優質家庭生活科技之關鍵技術研討會) , P.58, 崑山科技大學, 台南, 2007.
  2. 張書豪、吳永春和陳建源, ”改良式列默演算法”, CSIM2007 . Information Security & Computer Science (第十三屆資訊管理暨實務研討會), P.158, 樹德科技大學, 高雄, 2007.
  3. Chien-Yuan Chen and Chih-Cheng Hsueh, “Constant-time Solution to Simon’s Decision Problem with the Known Subgroup Range in Quantum Computer,”Proceedings of Third IASTED International Conference: Computational Intelligence, Banff, Canada, pp. 19-22, July 2-4, 2007. (accepted rate 46.85)
  4. 田錦燕、張圻毓、陳建源和王振仲, ”在L1範數下二維模格最短向量問題之研究,” Proceedings of 2006 Multimedia and networking Systems Conference (2006多媒體及通訊系統研討會) , 光碟論文集, 義守大學, 高雄,Dec. 16, 2006.
  5. 張圻毓、林儀逢和陳建源, “二階層列默演算法,”Proceedings of 2006 Multimedia and networking Systems Conference (2006多媒體及通訊系統研討會) , 光碟論文集, 義守大學, 高雄, Dec. 16, 2006.
  6. 張書豪、王振仲、陳建源和吳永春, “基於k進位之列默演算法,” Proceedings of 2006 Multimedia and networking Systems Conference (2006多媒體及通訊系統研討會) , 光碟論文集, 義守大學, 高雄, Dec. 16, 2006.
  7. 尚惠芳和陳建源, “多媒體英語教學環境的個人學習資料庫之研究,”Proceedings of 2006 Multimedia and networking Systems Conference (2006多媒體及通訊系統研討會) , 光碟論文集, 義守大學, 高雄, Dec. 16,2006.
  8. Chih-Cheng Hsueh, Chien-Yuan Chen and Jeng-Jung Wang, “A Novel Ensemble Sorting Algorithm in NMR Ensemble Quantum Computers”, 2006 Conference on Information Technology and Applications in Outlying Islands (ITAOI2006第五屆離島資訊技術與應用研討會), 光碟論文集, National Kinmen Institute of Technology, Kinmen, Taiwan, R.O.C, Jun. 2-3, 2006.
  9. Chih-Cheng Hsueh and Chien-Yuan Chen, “One to n quantum secret key encryption protocol based on quantum discrete logarithm problem”, 2006 Conference on Information Technology and Applications in Outlying Islands (ITAOI2006第五屆離島資訊技術與應用研討會), 光碟論文集, National Kinmen Institute of Technology, Kinmen, Taiwan, R.O.C, Jun. 2-3, 2006.
  10. Chih-Cheng Hsueh(薛智誠) and Chien-Yuan Chen(陳建源), “量子機率式模糊傳送協定”, Proceedings of 2006 National Information Security Conference (第16屆全國資訊安全會議), 光碟論文集, Feng Chia University, Taichung, Taiwan, R.O.C, Jun. 8-9, 2006.
  11. Chih-Cheng Hsueh, Chien-Yuan Chen and and Yu-Chin Dai, “Quantum Identification Protocol with Trusted Author”, National Computer Symposium (2005年全國計算機會議), Kun-Shan University, Tainan, Taiwan, R.O.C, Dec. 15-16, 2005.
  12. Chien-Yuan Chen and Chih-Cheng Hsueh, “Multiplication Algorithm on Quantum Computation,”Proceeding of the 2005 International Conference on Foundations of Computer Science, pp. 38-45, Las Vegas, Nevada, U.S.A., June 27-29, 2005.
  13. Chih-Cheng Hsueh, Chien-Yuan Chen,and Yu-Chin Dai, “Quantum Identification Protocol with Maximally Entangled States,”15th National Information Security Conference, pp.1-8, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, Jun. 6-10, 2005.
  14. Chih-Chieh Hsu, Chih-Cheng Hsueh, and Chien-Yuan Chen, “Two-to-one Quantum Teleportation Protocol and Its Application,”15th NationalInformation Security Conference, pp.389-396 , National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, Jun. 6-10, 2005.
  15. Chih-Cheng Hsueh and Chien-Yuan Chen, “Quantum Secret Key Encryption Based on Quantum Discrete Logarithm Problem,” Int. computer Symposium(ICS’04), pp.297-301, The Grand Hotel, Taipei, Taiwan, R.O.C, Dec. 15-17, 2004.
  16. 陳建源, 夏顥, “以加權布爾條件式量子搜尋法查詢資料庫之研究,” 陸軍軍官學校綜合學術論文研討會, 資訊組,陸軍官校,高雄, 台灣, May 28, 2004.
  17. Chien-Yuan Chen andChih-Cheng Hsueh, “Quantum Factorization Algorithm by NMR Ensemble Computers,”14th National Information Security Conference, pp. 480-484, National Taipei University of Technology, Taipei, Taiwan, R.O.C, Jun. 10-11, 2004.
  18. Chih-Cheng Hsueh and Chien-Yuan Chen, “Quantum Key Agreement with Maximally Entangled States,” 14th National Information Security Conference, pp. 236-242, National Taipei University of Technology, Taipei, Taiwan, R.O.C, Jun. 10-11, 2004.
  19. Chien-Yuan Chen, Cheng-Yuan Ku, and Haw Shiah, “The Montgomery Inverse in Ternary Number System,”2003 International Conference on Informatics, Cybernetics, and Systems(ICICS’03), pp. 415-419, I-ShouUniversity, Kaohsiung, Taiwan, R.O.C,Dec. 14-16, 2003.
  20. Chih-Cheng Hsueh and Chien-Yuan Chen, “Quantum Key Agreement Protocol Based on Password Authentication,” 2003 International Conference on Informatics, Cybernetics, and Systems(ICICS’03), pp. 349-355, I-ShouUniversity, Kaohsiung, Taiwan, R.O.C, Dec. 14-16, 2003.
  21. 鄭勝文, 陳建源, 夏顥, “可代理公證之電子現金,” 2003年海峽兩岸大學校長會議暨科學技術學術研討會,pp.120, 中正大學, 嘉義, 台灣, Oct. 27-28, 2003.
  22. Chih-Cheng Hsueh, Chien-Yuan Chen,andPo-Wen Ko, “A Partially Blind Verification Scheme,” 13thNational Information Security Conference, pp. 391-397, Chang-Gung University, Tao-Yuan, Taiwan, R.O.C, Aug. 28-29, 2003.
  23. Wen-Rong Wu, Chien-Yuan Chen, and Chih-Cheng Hsueh, “無串謀之網路秘密競標系統,”Symposium on Application and Development of Information Technologies, pp. 89-93, National Pingtung Institute of Commerce, Ping-Tung, Taiwan, R.O.C, Jun. 28, 2003.
  24. Sheng-Wen Zheng and Chien-Yuan Chen, “A Secure and Untraceable off-line Electronic Cash Based on the Discrete Logarithm Problem,”Symposium on Application and Development of Information Technologies, pp. 99-104, National Pingtung Institute of Commerce, Ping-Tung, Taiwan, R.O.C, Jun. 28, 2003.
  25. Wen-Rong Wu, Chien-Yuan Chen, Chin-Yu Liu, and Ming-Ho Wu, “基於方程式之多次代理簽章法,”12thNational Information Security Conference, pp. 171-174, TaichungHealthcare and ManagementUniversity, Taichung, Taiwan, R.O.C, May 16-17, 2002.
  26. Chien-Yuan Chen, and Chih-Cheng Hsueh, “基於方程式因數分解Takagi密碼系統之模數,” 12thNational Information Security Conference, pp. 355-358, TaichungHealthcare and ManagementUniversity, Taichung, Taiwan, R.O.C, May 16-17, 2002.
  27. Jen-Ho Yang, Chien-Yuan Chen, and C. H. Wang,“An Improvement of the High-Speed Division Algorithm for Residue Number System,” 12thNational Information Security Conference, pp. 273-276, TaichungHealthcare and Management University, Taichung, Taiwan, R.O.C, May 16-17, 2002.
  28. Chien-Yuan Chen and Chih-Cheng Hsueh, “A Collusion Attack on Ghodosi and Saeednia’s Scheme,”Proceedings of National Computer Symposium: Information Security, Vol. F, pp. F064-F066, Chinese-Culture University, Taipei, Taiwan, R.O.C, Dec. 20-21, 2001.
  29. Chien-Yuan Chen and Chih-Cheng Hsueh, “Cryptanalyzing Gong and Harn's RSA-type Scheme by Using the Continued Fraction Method,”Proceedings of the tenth national conference on science and technology of national defense (第十屆國防科技學術研討會), pp. 1-91~1-93, Chung-Cheng Institute of Technology, National Defense University, Tao-Yuan, Taiwan, R.O.C, Nov. 23-24, 2001.
  30. Chien-Yuan Chen, Chin-Chen Chang, and Chih-Cheng Hsueh, “A Fast Modular Multiplication Algorithm with the Fixed Window Size,”Proceedings of the tenth national conference on science and technology of national defense (第十屆國防科技學術研討會), pp. 1-94~1-97, Chung-Cheng Institute of Technology, National Defense University, Tao-Yuan, Taiwan, R.O.C, Nov. 23-24, 2001. ( NSC89-2745-P-214-004)
  31. 尚惠芳、陳建源, “多媒體電腦輔助英語閱讀教學軟體之製作,”第三屆大專院校應用外語實務成果發表研討會論文集。斗六市:雲林科技大學,pp.171-180, 2001 ( NSC 89-2411-H-214-002)。
  32. Chang-Chin Tsao, Chien-Yuan Chen, and Chih-Cheng Hsueh, “A New Proxy Signature Scheme Based on the Factorization Problem,”2001 Conference on Theory and Practice for Electronic Commerce, pp. 94-97, Chang-Jung University, Tainan, Taiwan, R.O.C, Oct. 26, 2001.
  33. Jong-E Hsien, Chih-Cheng Hsueh, and Chien-Yuan Chen, “An Electronic Traveler’s Check System,”2001 Conference on Theory and Practice for Electronic Commerce, Tainan,pp. 164-169, Chang-Jung University, Tainan, Taiwan, R.O.C, Oct. 26, 2001.
  34. Po-Wen Ko, Chien-Yuan Chen, and Chih-Cheng Hsueh, “An Electronic Gift Certificate System,”2001 Workshop on Consumer Electronics, 光碟論文集, Taipei World Trade Center, Taipei, Taiwan, R.O.C, Oct. 17-19, 2001.
  35. Chien-Yuan Chen and Chin-Cheng Hsueh, “基於三次方程式之因數分解模數 N=p2q,”11thNational Information Security Conference, pp. 249-252, NationalCheng-KungUniversity, Tainan, Taiwan, R.O.C, May 3-4, 2001.(NSC89-2213-E-214-055)
  36. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “New Signcryption Scheme Based on the Factoring Problem,” 2000 Asia Pacific Conference on Multimedia Technology and Applications,pp.409-412, I-Shou University, Kaohsiung, Taiwan, R.O.C, Dec. 18-19, 2000.
  37. Jen-Ho Yang, Chih-Cheng Hsueh, and Chien-Yuan Chen, “Partially Blind Multisignature Scheme Based on RSA Modulus,” 2000 Asia Pacific Conference on Multimedia Technology and Applications, pp. 420-424, I-Shou University, Kaohsiung, Taiwan, R.O.C, Dec. 18-19, 2000.
  38. Po-Wen Ko,Jong-E Hsien, and Chien-Yuan Chen, “Publicly Verifiable Batch Encryption,”Proceedings of the 2000 International Computer Symposium, Workshop on Cryptology and Information Security, pp.131-136, National Chung Cheng University, Chiayi, Taiwan, R.O.C, Dec. 6-8, 2000.
  39. Chih-Cheng Hsueh, Jen-Ho Yang, and Chien-Yuan Chen, “A Partially Blind Multisignature Scheme Based on the Discrete Logarithm Problem,”第六屆資訊管理研究暨實務研討會, pp. 109, NationalChiao-TungUniversity, Hsinchu, Taiwan, R.O.C, Dec. 2, 2000.
  40. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “A Joint Singature Scheme Against Insider Attack,”第六屆資訊管理研究暨實務研討會,pp. 114, NationalChiao-TungUniversity, Hsinchu, Taiwan, R.O.C, Dec. 2, 2000.
  41. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “Publicly Verifiable Batch Encryption with the Same Message,”2000台灣區網際網路研討會(TANET2000), pp. 55-58, 成功大學, 台南, 台灣, Oct. 19-21, 2000.
  42. Yi-Hsien Lin, Chang-Jinn Tsao, and Chien-Yuan Chen: “A Micropayment System with Coins of Different Denominations,” CEC 2000全國校園電子商務應用研討會, pp. 237-243, 樹德科技大學, 高雄, 台灣, May 24, 2000.(NSC89-2213-E-214-004)
  43. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “RSA-Based Escrowed Blind Signature and Its Application,”Proceedings of Workshop on Internet & Distributed Systems II, pp.412-416, National Cheng-Kung University,Tainan, Taiwan, R.O.C, May 11-12, 2000.( NSC89-2218-E-214-001)
  44. Chang-Jinn Tsao, Yi-Hsien Lin, Chien-Yuan Chen, and Cheng-Yuan Ku,“An Efficient Escrow Electronic Cash System Based on Yacobi's Scheme,”Proceedings of Workshop on Internet & Distributed Systems II, pp.398-406, National Cheng-Kung University, Tainan, Taiwan, R.O.C, May 11-12, 2000. (NSC89-2213-E-214-009)
  45. Chien-Yuan Chen,“Cryptanalysis of Large RSA Exponents by Using the LLL Algorithm,”Proceedings of The Tenth National Conference on Information Security, pp.45-50, NationalDong-HwaUniversity, Hualien, Taiwan, R.O.C, May 5-6, 2000.
  46. Po-Wen Ko, Jong-E Hsien, and Chien-Yuan Chen, “Escrowed Blind Signature and It's Application,”Proceedings of The tenth National Conference on Information Security, pp.119-122, National Dong-Hwa University, Hualien, Taiwan, R.O.C, May 5-6, 2000.(NSC89-2218-E-214-001)
  47. Jong-E Hsien, Po-Wen Ko, and Chien-Yuan Chen, “Comment on Lee and Kim's Message Recovery Fair Blind Signature Scheme,”Proceedings of The tenth National Conference on Information Security, pp.123-125, National Dong-Hwa University, Hualien, Taiwan, R.O.C, May 5-6, 2000.
  48. Chang-Jinn Tsao, Yi-Hsien Lin, and Chien-Yuan Chen,“An Improved CFN Untraceable Electronic Cash System,”Proceedings of The tenth National Conference on Information Security, pp.222-227, National Dong-Hwa University, Hualien, Taiwan, R.O.C, May 5-6, 2000.
  49. Chien-Yuan Chen, “Cryptanalysis of Short Secret Exponents Modulo RSA Primes,” Proceedings of 1999 National Computer Symposium, pp.C173-C177, TamkangUniversity, Taipai, Taiwan, R.O.C, Dec.20-21, 1999. (NSC89-2213-E-214-002)
  50. Yi-Hsien Lin,Chang-Jinn Tsao, and Chien-Yuan Chen,“Fair Exchange Based on Continued Fractions,” Eighth National Conference on Science and Technologyof National Defense, Chung-Cheng Institute of Technology, National Defense University, Tao-Yuan, Taiwan, R.O.C,Nov. 20, 1999.
  51. 曹昌進, 林宜賢, 陳建源, 古政元, “有效率之託管電子現金系統,” 第六屆三軍官校基礎學術研討會論文集,中冊, pp. 343-348, 空軍官校, 高雄, 台灣, May 21, 1999. (NSC89-2213-E-214-009)
  52. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “A New Subliminal Channel Without Sharing a Secret Key,”Proceedings of The Ninth National Conference on Information Security, pp. 237-240, Chaoyang University, Taichung, Taiwan, R.O.C, May 14-15, 1999.
  53. Chien-Yuan Chen and Chin-Chen Chang, “A Fast Modular Multiplication Algorithm for Calculating the Product AB Modulo N,”Proceedings of The Ninth National Conference on Information Security, pp. 41-45, Chaoyang University, Taichung, Taiwan, R.O.C, May 14-15, 1999.
  54. Chien-Yuan Chen,Shin-Jia Hwang and Chin-Chen Chang, “New Multisignature Scheme Based on One-Way Functions,”Proceedings of 4th Multimedia Technology and Applications Symposium, pp.332-340, I-Shou University, Kaohsiung, Taiwan, R.O.C, Apr. 16, 1999.
  55. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “A Software Key Escrow System Suitable for Broadcasting,”Proceedings of Workshop on Cryptology and Information Security, pp.155-158, National Cheng Kung University, Tainan, Taiwan, R.O.C, Dec. 17-19, 1998.
  56. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “A New Multilevel Database Field Encryption and Authentication Cryptosystem,”Proceedings of Workshop on Cryptology and Information Security, pp.29-35, National Cheng Kung University, Tainan, Taiwan, R.O.C, Dec. 17-19, 1998.
  57. Chien-Yuan Chen, “A Fast Modular Multiplication Method Using Yacobi’s Algorithm,”Proceedings of 1998 IEEE International Symposium on Information Theory, pp.50, MIT, Cambridge, MA USA, Aug. 16-21, 1998.
  58. Chien-Yuan Chen and Tung-Chun Liu, “A New Fast Modular Multiplication Method Based on the Lempel-Ziv Tree,”Proceedings of The Eighth National Conference on Information Security, pp.347-354, NationalSunYat-SenUniversity, Kaohsiung, Taiwan, R.O.C, May 15-16, 1998.
  59. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of the LUC Public Key Cryptosystem,”Proceedings of The Eighth National Conference on Information Security, pp.49-58, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, May 15-16, 1998.
  60. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalyzing the RSA-like Schemes by Using the Continued Fraction Method,”Proceedings of The Eighth National Conference on Information Security, pp.81-90, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, May 15-16, 1998.
  61. Liang-An Chen, Been-Chian Chien, and Chien-Yuan Chen, “A Dynamic Allocating Approach for Dynamic Files on Multi-disk Systems,” Proceeding of 1997 National Computer Symposium, pp.A60-A65, Tung-Hai University, Taichung, Taiwan, R.O.C, Dec. 22-23, 1997.
  62. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of Short Secret Exponent and Large Public Exponent of RSA,”Proceedings of International Conference on Cryptology and Information Security, pp.14-18, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, Dec. 19-21, 1996.
  63. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Fast RSA-type Schemes Based on Pell Equations over Zn*,”Proceedings of International Conference on Cryptology and Information Security, pp.1-5, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C, Dec. 19-21, 1996.
  64. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “Cryptanalysis of a Key Sharing System for Global Telecommunications,”Proceedings of The Sixth National Conference on Information Security, pp.224-227, National Chung-Hsing University, Taichung, Taiwan, R.O.C, May 1996.(查無日期)
  65. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “An Improved Multistage Sharing Scheme,”Proceedings of The Fifth National Conference on Information Security, pp.142-143, National Taiwan University of Science and Technology, Taipei, Taiwan, May 5, 1995.
  66. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “A (p-1) Method of Factoring RSA,s Modulus,”Proceedings of Cryptography-Policy and Algorithms Conference, pp. 225-231, Brisbane, Australia,Jul. 3-5, 1995.
  67. Chien-Yuan Chen,Chin-Chen Chang, and Wei-Pang Yang, “New Signature with Message Recovery Against Forgery,”Proceedings of International Computer Symposium, pp. 293-296,National Chiao-Tung University, Hsinchu, Taiwan, R.O.C,Dec. 12-13, 1994.

其他論文:

1. 陳建源,"量子電腦對傳統區塊加解密法之威脅",資訊安全通訊第十一卷第四期, pp. 37-50, October 2005.

2. Chih-Cheng Hsueh and Chien-Yuan Chen, “Ensemble Algorithm for the Selection Problem by NMR Ensemble Quantum Computers,” quant-ph/0407109.

3. Chien-Yuan Chen, “Breaking Classical Public Key Cryptosystems by Using a Novel Ensemble Search Algorithm,” quant-ph/0407126.

4. 陳建源、柯博文、謝忠益、薛智誠、楊仁和,"部分盲簽章與託管簽章之簡介",資訊安全通訊第七卷第三期, pp. 78-85, June 2001.

○1999年畢業 曹昌進(Chang-Jinn Tsao)

論文題目:An Electronic Bearer Check System

(無記名電子支票系統)

林宜賢(Yi-Hsien Lin)

論文題目:An Electronic Payment System with Bills of lading

(電子提貨單系統)

○2000年畢業 謝忠益(Jong-E Hsien)

論文題目:An Electronic Traveler’s Check System

(電子旅行支票系統)

柯博文(Po-Wen Ko)

論文題目:An Electronic Gift Certificate System

(電子禮券系統)

○2001年畢業 楊仁和(Jen-Ho Yang)

論文題目:A Fast Division Algorithm in Residue Number System

(一個在餘數系統下的快速除法演算法)

○2002年畢業 吳文榮(Wen-Rong Wu)

論文題目:The Study of Quantum Search

(量子搜尋之研究)

曾耀賢(Yao-Hsien Tseng)

論文題目:The Study of Oblivious Transfer

(模糊傳送之研究)

鄭勝文(Sheng-Wen Zheng)

論文題目:The Electronic Cash System with Proxy Notaries

(可代理公證之電子現金系統)

○2003年畢業 吳旭東(Shiu-Dung Wu)

論文題目:The study of quantum oblivious transfer protocol

(量子模糊傳送協定之研究)

戴昱欽(Yu-Chin Dai)

論文題目:The Study of Quantum Identification System

(量子身份認證之研究)