default search action
Erl-Huei Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j27]Shin-Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu:
A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application. Int. J. Netw. Secur. 20(2): 396-402 (2018) - 2017
- [j26]Tso-Cho Chen, Erl-Huei Lu, Chia-Jung Li, Kuo-Tsang Huang:
An Efficient Weighted Bit-Flipping Algorithm for Decoding LDPC Codes Based on Log-Likelihood Ratio of Bit Error Probability. IEICE Trans. Commun. 100-B(12): 2095-2103 (2017) - 2016
- [j25]Erl-Huei Lu, Kuo-Tsang Huang, Jung-Hui Chiu:
Word-Based AES Encryption Without Data Expansion. J. Inf. Sci. Eng. 32(4): 849-861 (2016) - 2014
- [j24]Erl-Huei Lu, Tso-Cho Chen, Pen-Yao Lu:
A New Method for Evaluating Error Magnitudes of Reed-Solomon Codes. IEEE Commun. Lett. 18(2): 340-343 (2014) - [j23]Pen-Yao Lu, Erl-Huei Lu, Tso-Cho Chen:
An Efficient Hybrid Decoder for Block Turbo Codes. IEEE Commun. Lett. 18(12): 2077-2080 (2014) - [j22]Wen-Tsai Ko, Shin-Yan Chiou, Erl-Huei Lu, Henry Ker-Chang Chang:
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety. J. Medical Syst. 38(9): 66 (2014) - 2013
- [c9]Erl-Huei Lu, Tso-Cho Chen, Pen-Yao Lu:
Theoretic approach to BP-based WBF decoding algorithm of LDPC codes. ISWPC 2013: 1-4 - 2012
- [c8]Wen-Tsai Ko, Erl-Huei Lu, Shin-Yan Chiou, Henry Ker-Chang Chang:
A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application. RFIDSec Asia 2012: 63-71 - 2011
- [j21]Chiou-Yng Lee, Chia-Chen Fan, Erl-Huei Lu:
Combined circuit architecture for computing normal basis and Montgomery multiplications over GF(2m). Int. J. Auton. Adapt. Commun. Syst. 4(3): 291-306 (2011) - 2010
- [j20]Ya-Cheng Lu, Erl-Huei Lu:
Concurrent Algorithm and Hardware Implementation for Low-Latency Turbo Decoder Using a Single MAP Decoder. IEICE Trans. Commun. 93-B(1): 1-8 (2010)
2000 – 2009
- 2009
- [j19]Erl-Huei Lu, Yi-Nan Lin, Wei-Wen Hung:
Improvement of turbo decoding using cross-entropy. Comput. Commun. 32(6): 1034-1038 (2009) - [c7]Hsin-Kun Lai, Chia-Chin Ma, Erl-Huei Lu:
Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit. ISA 2009: 563-569 - 2008
- [j18]Chin-Chin Chen, Chiou-Yng Lee, Erl-Huei Lu:
Scalable and Systolic Montgomery Multipliers over GF(2m). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1763-1771 (2008) - [c6]Chin-Chin Chen, Chiou-Yng Lee, Erl-Huei Lu:
Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m). Mobility Conference 2008: 46 - 2006
- [j17]Yi-Nan Lin, Wei-Wen Hung, Tsan-Jieh Chen, Erl-Huei Lu:
Modeling the bit-level stochastic correlation for turbo decoding. Comput. Commun. 29(18): 3856-3862 (2006) - [c5]Chiou-Yng Lee, Chin-Chin Chen, Yuan-Ho Chen, Erl-Huei Lu:
Low-Complexity Bit-Parallel Systolic Multipliers over GF(2m). SMC 2006: 1160-1165 - [c4]Yi-Nan Lin, Wei-Wen Hung, Wei-Chen Lin, Tsan-Jieh Chen, Erl-Huei Lu:
An Efficient Soft-Input Scaling Scheme for Turbo Decoding. SUTC (2) 2006: 252-255 - 2005
- [j16]Pin-Chang Su, Henry Ker-Chang Chang, Erl-Huei Lu:
ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem. Appl. Math. Comput. 164(3): 757-772 (2005) - [j15]Shun-Fu Pon, Erl-Huei Lu, Albert B. Jeng:
Meta-He digital signatures based on factoring and discrete logarithms. Appl. Math. Comput. 165(1): 171-176 (2005) - [j14]Pin-Chang Su, Erl-Huei Lu, Henry Ker-Chang Chang:
A knapsack public-key cryptosystem based on elliptic curve discrete logarithm. Appl. Math. Comput. 168(1): 40-46 (2005) - [j13]Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:
Design of traceable security system. Appl. Math. Comput. 168(2): 933-944 (2005) - [j12]Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:
Fail-stop blind signature scheme design based on pairings. Appl. Math. Comput. 169(2): 1324-1331 (2005) - [j11]Shun-Fu Pon, Erl-Huei Lu, Albert B. Jeng:
One private-key for all DL-based cryptosystems. Appl. Math. Comput. 170(1): 666-672 (2005) - [j10]Yeun-Renn Ting, Erl-Huei Lu, Ya-Cheng Lu:
Ringed bit-parallel systolic multipliers over a class of fields GF(2m). Integr. 38(4): 571-578 (2005) - [j9]Chiou-Yng Lee, Jenn-Shyong Horng, I-Chang Jou, Erl-Huei Lu:
Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2m). IEEE Trans. Computers 54(9): 1061-1070 (2005) - 2004
- [j8]Yeun-Renn Ting, Erl-Huei Lu, Jau-Yien Lee:
Low complexity bit-parallel systolic architecture for computing C+AB2 over a class of GF(2m). Integr. 37(3): 167-176 (2004) - 2002
- [j7]Shun-Fu Pon, Erl-Huei Lu, Jau-Yien Lee:
Dynamic reblocking RSA-based multisignatures scheme for computer and communication networks. IEEE Commun. Lett. 6(1): 43-44 (2002) - [c3]Chiou-Yng Lee, Ya-Cheng Lu, Erl-Huei Lu:
Low-complexity systolic multiplier over GF(2m) using weakly dual basis. APCCAS (1) 2002: 367-372 - 2001
- [j6]Erl-Huei Lu, Shao-Wei Wu, Yi-Chang Cheng:
A decoding algorithm for triple-error-correcting binary BCH codes. Inf. Process. Lett. 80(6): 299-303 (2001) - [j5]Chiou-Yng Lee, Erl-Huei Lu, Jau-Yien Lee:
Bit-Parallel Systolic Multipliers for GF(2m) Fields Defined by All-One and Equally Spaced Polynomials. IEEE Trans. Computers 50(5): 385-393 (2001) - [c2]Chiou-Yng Lee, Erl-Huei Lu, Jau-Yien Lee:
New bit-parallel systolic multipliers for a class of GF(2m). ISCAS (4) 2001: 578-581
1990 – 1999
- 1998
- [j4]Yi-Chang Cheng, Erl-Huei Lu, Shaw Woei Wu:
A Modified Version of the Rao-Nam Algebraic-Code Encryption Scheme. Inf. Process. Lett. 68(4): 215-217 (1998) - 1994
- [j3]Erl-Huei Lu, Yi-Chang Chen, Hsiao-Peng Wuu:
A Complete Decoding Algorithm for Double-Error-Correcting Primitive Binary BCH Codes of Odd m. Inf. Process. Lett. 51(3): 117-120 (1994) - [j2]Erl-Huei Lu, Yi-Chang Cheng, Hsiao-Peng Wuu:
Corrigendum: A Complete Decoding Algorithm for Double-Error-Correcting Primitive Binary BCH Codes of Odd m. Inf. Process. Lett. 52(6): 341 (1994)
1980 – 1989
- 1988
- [j1]Erl-Huei Lu, Lein Harn, Jau-Yien Lee, Wen-Yih Hwang:
A programmable VLSI architecture for computing multiplication and polynomial evaluation modulo a positive integer. IEEE J. Solid State Circuits 23(1): 204-207 (1988) - [c1]Erl-Huei Lu, Wen-Yie Hwang, Lein Harn, Jau-Yien Lee:
A conference key distribution system based on the Lagrange interpolating polynomial. INFOCOM 1988: 1092-1094
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint