


default search action
Narn-Yih Lee
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Chia-Chou Chuang, Yu-Lun Jheng, Chien Huang, Lu-Ying Huang, Pei-Yin Chen, Narn-Yih Lee:
Live Demonstration: Low Cost AES-256 Circuit Design and Application. APCCAS 2024: 811 - 2023
- [j29]Shih-Hsiang Lin
, Jun-Yi Lee, Chia-Chou Chuang, Narn-Yih Lee, Pei-Yin Chen, Wen-Long Chin
:
Hardware Implementation of High-Throughput S-Box in AES for Information Security. IEEE Access 11: 59049-59058 (2023)
2010 – 2019
- 2017
- [c11]Narn-Yih Lee, Bing-Han Wu:
Privacy Protection Technology and Access Control Mechanism for Medical Big Data. IIAI-AAI 2017: 424-429 - 2013
- [c10]Narn-Yih Lee, Zih-Ling Chen, Fu-Kun Chen:
Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem. COMPSAC Workshops 2013: 11-15 - 2011
- [c9]Narn-Yih Lee, Yun-Kuan Chang:
Hybrid Provable Data Possession at Untrusted Stores in Cloud Computing. ICPADS 2011: 638-645
2000 – 2009
- 2009
- [c8]Narn-Yih Lee, Tzu-Yi Lee:
User Friendly Digital Rights Management System Based on Smart Cards. IIH-MSP 2009: 869-872 - 2008
- [j28]Narn-Yih Lee, Chien-Nan Wu, Chien-Chih Wang:
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1): 12-20 (2008) - 2007
- [j27]Narn-Yih Lee, Ming-Feng Lee:
Web Metering Scheme Based on the Bilinear Pairings. IEICE Trans. Inf. Syst. 90-D(3): 688-691 (2007) - [j26]Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. Informatica 18(1): 61-66 (2007) - [c7]Narn-Yih Lee, Ching-Chun Wang:
Yet Another Wavelet Watermarking Scheme for Copyright Protection. CEC/EEE 2007: 421-424 - 2005
- [j25]Narn-Yih Lee, Ming-Feng Lee:
The security of a strong proxy signature scheme with proxy signer privacy protection. Appl. Math. Comput. 161(3): 807-812 (2005) - [j24]Narn-Yih Lee, Shu-Ya Yang:
The design of integrating subliminal channel with access control. Appl. Math. Comput. 171(1): 573-580 (2005) - [j23]Narn-Yih Lee, Yu-Chung Chiu:
Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2): 177-180 (2005) - [j22]Narn-Yih Lee, Jung-Chic Chen:
Improvement of One-Time Password Authentication Scheme Using Smart Cards. IEICE Trans. Commun. 88-B(9): 3765-3767 (2005) - [j21]Narn-Yih Lee, Chien-Chih Wang:
Verifiable Oblivious Transfer Protocol. IEICE Trans. Inf. Syst. 88-D(12): 2890-2892 (2005) - 2004
- [j20]Narn-Yih Lee, Ming-Feng Lee:
Further improvement on the modified authenticated key agreement scheme. Appl. Math. Comput. 157(3): 729-733 (2004) - [j19]Narn-Yih Lee, Pei-Hsiu Ho:
Convertible undeniable signature with subliminal channels. Appl. Math. Comput. 158(1): 169-175 (2004) - [j18]Narn-Yih Lee, Chien-Nan Wu:
Improved authentication key exchange protocol without using one-way hash function. ACM SIGOPS Oper. Syst. Rev. 38(2): 85-92 (2004) - [j17]Narn-Yih Lee, Ming-Feng Lee:
Comments on multiparty key exchange scheme. ACM SIGOPS Oper. Syst. Rev. 38(4): 70-73 (2004) - 2003
- [j16]Narn-Yih Lee, Dai-Rui Lin:
Robust Digital Signature Scheme with Subliminal Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 187-188 (2003) - [j15]Narn-Yih Lee, Ming-Kung Sun:
Analysis on Traceability on Stadler et al.'s Fair Blind Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(11): 2901-2902 (2003) - [j14]Narn-Yih Lee, Pei-Hsiu Ho:
Digital signature with a threshold subliminal channel. IEEE Trans. Consumer Electron. 49(4): 1240-1242 (2003) - 2002
- [j13]Narn-Yih Lee:
The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(10): 2364-2367 (2002) - 2001
- [j12]Narn-Yih Lee, Tzonelih Hwang:
New Multistage Secret Sharing Scheme Based on Factorization Problem. J. Inf. Sci. Eng. 17(3): 525-529 (2001) - 2000
- [j11]Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee, Juin-Jang Tsai:
(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders. Cryptologia 24(3): 250-268 (2000) - [j10]Narn-Yih Lee, Tzonelih Hwang, Chuan-Ming Li:
(t, n) Threshold Untraceable Signatures. J. Inf. Sci. Eng. 16(6): 835-846 (2000)
1990 – 1999
- 1999
- [j9]Narn-Yih Lee, Tzonelih Hwang:
Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy". Comput. Commun. 22(1): 87-89 (1999) - [j8]Narn-Yih Lee, Tzonelih Hwang:
On the security of fair blind signature scheme using oblivious transfer. Comput. Commun. 22(3): 287-290 (1999) - [j7]Narn-Yih Lee, Tzonelih Hwang:
Group-oriented undeniable signature schemes with a trusted center. Comput. Commun. 22(8): 730-734 (1999) - [j6]Chih-Hung Wang, Tzonelih Hwang, Narn-Yih Lee:
Comments on Two Group Signatures. Inf. Process. Lett. 69(2): 95-97 (1999) - [j5]Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang:
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures. Inf. Process. Lett. 70(2): 79-81 (1999) - [c6]Marc Joye, Narn-Yih Lee, Tzonelih Hwang:
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. ISW 1999: 47-51 - [c5]Marc Joye, Seungjoo Kim
, Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes. ISW 1999: 271-275 - 1998
- [c4]Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes. ACISP 1998: 415-422 - 1996
- [c3]Narn-Yih Lee, Tzonelih Hwang:
On the security of Park et al.'s key distribution protocol for digital mobile communications. PIMRC 1996: 1248-1251 - 1995
- [j4]Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system. Comput. Commun. 18(12): 978-981 (1995) - [j3]Tzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li, Ming-Yung Ko, Yung-Hsiang Chen:
Two Attacks on Neuman-Stubblebine Authentication Protocols. Inf. Process. Lett. 53(2): 103-107 (1995) - 1994
- [j2]Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:
Conspiracy Attacks on the Threshold RSA Signature Scheme. Cryptologia 18(4): 372-380 (1994) - [j1]Narn-Yih Lee, Tzonelih Hwang:
A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy. J. Inf. Sci. Eng. 10(4): 601-610 (1994) - [c2]Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. EUROCRYPT 1994: 194-204 - 1993
- [c1]Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:
Remark on the Threshold RSA Signature Scheme. CRYPTO 1993: 413-420
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-14 17:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint