- 1、本文档共15页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
陈建源研究成果
陳 建 源 研 究 成 果 Oct, 2007
Journal
Chang, C. C., Lin, C. H. and Chen, C. Y., A Conference Key Distribution Scheme Using Interpolating Polynomials, International Journal of Security Its Applications, Vol. 1, No. 2, pp. 9-20, Oct. 2007.
Chien-Yuan Chen, Chih-Cheng Hsueh, and Chih-Chieh Hsu, “Two-to-one Quantum Teleportation Protocol and Its Application,” Chaos, Solitons and Fractals, Volume 36, Issue 5,?June 2008, Pages 1399-1404.(SCI)
Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptographic Relational Algebra for Databases Using the Field Authenticator,” Computers Mathematics with applications, Volume 54, Issue 1, pp. 38-44, July 2007, (SCI)
Chien-Yuan Chen and Chih-Cheng Hsueh, “A Collusion Attack on Ghodosi and Saeednia’s Scheme,” Journal of I-Shou University(義守大學學報), vol.12, pp.29-34, Aug. 2006.
Chih-Cheng Hsueh and Chien-Yuan Chen, “Constant-time Solution to Database Searching by NMR Ensemble Computing,” Fortschritte der Physik, Vol. 54, No. 7, pp. 519-524,?July 2006. (SCI)
Chien-Yuan Chen, “An Efficient Parity Detection Technique Using the Two-Moduli Set {2h – 1, 2h + 1},” Information Sciences , Vol. 176, No. 22, pp. 3426-3430, 2006. (SCI)
Chien-Yuan Chen, Chin-Chen Chang and Chih-Cheng Hsueh, “A Fast Modular Multiplication Algorithm with the Fixed Window Size”, Journal of I-Shou University (義守大學學報), vol.12, pp.35-52, Aug. 2006 .
Chien-Yuan Chen and Chih-Cheng Hsueh, “Quantum Factorization Algorithm by NMR Ensemble Computers,” Applied Mathematics and Computation, Vol. 174, Issue 2, pp. 1363-1369, 15 March 2006. (SCI)
Chien-Yuan Chen, Cheng-Yuan Ku, and David C. Yen, “Cryptanalysis of Large RSA Exponent by Using the LLL Algorithm,” Applied Mathematics and Computation, Vol. 169, Issue 1, pp. 516-525, October 2005. (SCI)
Jen-Ho Yang, Chin-Chen Chang, and Chien-Yuan Chen, “A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique,” ?International Journal of Computer Mathematics, Vol. 81, No. 6, pp. 775-780, June 2004. (SCI)
文档评论(0)