Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments,Symmetry-Basel SCI 2018 劉兆樑(Chao-Liang Liu)、Wang-Jui Tsa(Wang-Jui Tsai)、Ting-Yi Chan(Ting-Yi Chang)*、Ta-Ming Liu(Ta-Ming Liu)
Speeding up Pairing Computation Using Non-adjacent Form and ELM Method,International Journal of Network Security EI 2016 劉兆樑(Chao-Liang Liu)、Gwoboa Horng(Gwoboa Horng)、Du-Shiau Tsa(Du-Shiau Tsai)
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion,COMPUTER JOURNAL SCI 2015 劉兆樑(Chao-Liang Liu)、Wang-Jui Tsa(Wang-Jui Tsai)、Ting-Yi Chan(Ting-Yi Chang)、Chun-Cheng P(Chun-Cheng Peng)、Peng-Shiang(Peng-Shiang Wong)
Implementing Multiple Biometric Features for a Recall-Based Graphical Keystroke Dynamics Authentication Systemon a Smart Phone,JOURNAL OF NETWORK AND COMPUTER APPLICATIONS SCI 2015 劉兆樑(Chao-Liang Liu)、Cheng-Jung T(Cheng-Jung Tsai)、Ting-Yi Chan(Ting-Yi Chang)、Wang-Jui Tsa(Wang-Jui Tsai)、Po-Kai Zhong(Po-Kai Zhong)
Cryptanalysis of some user identification schemes for distributed computer networks,INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS SCI 2014 Yu-Chi Chen(Yu-Chi Chen)、劉兆樑(Chao-Liang Liu)、Gwoboa Horng(Gwoboa Horng)
Cryptanalysis of some user identification schemes for distributed computer networks,INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS SCI 2014 Yu-Chi Chen(Yu-Chi Chen)、劉兆樑(Chao-Liang Liu)、Gwoboa Horng(Gwoboa Horng)
Strong non-repudiation based on certificateless short signatures,IET Information Security EI 2013 Yu-Chi Chen(Yu-Chi Chen)、Gwoboa Horng(Gwoboa Horng)、劉兆樑(Chao-Liang Liu)
An Image Authentication Method by Grouping Most Significant Bits,Journal of Electronic Science and Technology EI 2012 詹啟祥(Chi-Shiang Chan)、蔡淵裕(Yuan-Yu Tsai)、劉兆樑(Chao-Liang Liu)
Efficient Certificateless Aggregate Signature Scheme,Journal of Electronic Science and Technology EI 2012 Yu-Chi Chen(Yu-Chi Chen)、Gwoboa Horng(Gwoboa Horng)、劉兆樑(Chao-Liang Liu)、蔡淵裕(Yuan-Yu Tsai)、詹啟祥(Chi-Shiang Chan)
A Simple Keystroke Dynamics-Based Authentication System using Means and Standard Deviations,Journal of Internet Technology SCI 2012 劉兆樑(Chao-Liang Liu)、Ting-Yi Chan(Ting-Yi Chang)、Mao-Lun Chia(Mao-Lun Chiang)、Cheng-Jung T(Cheng-Jung Tsai)
A provably secure certificateless proxy signature scheme,International Journal of Innovative Computing Information and Control SCI 2011 Yu-Chi Chen(Yu-Chi Chen)、劉兆樑(Chao-Liang Liu)*、Gwoboa Horng(Gwoboa Horng)、Kuo-Chang Ch(Kuo-Chang Chen)
Girault's level-3 security in certificateless cryptography revisited,COMPUTERS & SECURITY SCI 2011 劉兆樑(Chao-Liang Liu)
An Efficient Certificateless Aggregate Signature Scheme,FUNDAMENTA INFORMATICAE SCI 2011 劉兆樑(Chao-Liang Liu)
Refinements of Miller's Algorithm over Weierstrass Curves Revisited,COMPUTER JOURNAL SCI 2011 Duc-Phong Le(Duc-Phong Le)、劉兆樑(Chao-Liang Liu)*
Computing the Modular Inverses Is as Simple as Computing the GCDs,FINITE FIELDS AND THEIR APPLICATIONS SCI 2008 劉兆樑(Chao-Liang Liu)、洪國寶(Gwoboa Horng)、劉欣喻(Hsin-Yu Liu)
Further Refinement of Pairing Computation Based on Miller''s Algorithm,APPLIED MATHEMATICS AND COMPUTATION SCI 2007 劉兆樑(Chao-Liang Liu)
Performance Improvement for the GGM-Construction of Pseudorandom Functions,APPLIED MATHEMATICS AND COMPUTATION SCI 2006 劉兆樑(Chao-Liang Liu)
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem,IEICE TRANSACTIONS ON COMMUNICATIONS SCI 2005 劉兆樑(Chao-Liang Liu)
Security Analysis of a Threshold Access Control Scheme Based on Smart Cards,IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT SCI 2004 劉兆樑(Chao-Liang Liu)
Practical Necessity of Girault’s Level-Three Security in Certificateless Cryptography - Cryptology and Information Security Conference 2011 Yunlin 2011.05 Yu-Chi Chen、劉兆樑(Chao-Liang Liu)、Bo-Yu Chen、Gwoboa Horng
Further Refinement of Pairing Computation Based on Miller’s Algorithm - Proc. of the sixteenth National Conference on Information Security Taichung 2006. 劉兆樑(Chao-Liang Liu)、Gwoboa Horng、Jo-Fen Chang
Performance Improvement for the GGM-Construction of Pseudorandom Functions - Proc. of the National Computer Symposium Tainan 2005. Yu-Sheng Chen、Gwoboa Horng、劉兆樑(Chao-Liang Liu)
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing - Proc. of the International Computer Symposium Taipei 2004. Gwoboa Horng、劉兆樑(Chao-Liang Liu)、Hsin-Yu Liu
Cryptanalysis of a Remote User Authentication Scheme Based on Smart Cards - Proc. of the National Computer Symposium Taichung 2003. Gwoboa Horng、劉兆樑(Chao-Liang Liu)、Po-Kun Chou
Security Enhancement for a One-Time Password Authentication Scheme Using Smart Cards - 2003 Workshop on Consumer Electronics Tainan 2003. Tzung-Her Chen、Gwoboa Horng、劉兆樑(Chao-Liang Liu)