Skip navigation
IVLE
Email
Library
Map
Calendar
Home
Research Outputs
View research outputs
Deposit publication / dataset
Researchers
Help
FAQs
Contact us
Guidelines
Log in
ScholarBank@NUS
Research Outputs
Browsing by Author
LAM KWOK YAN,KARCH
Enter a last name
Select a letter below to browse by last name or type
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Or
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Showing results 10 to 25 of 25
< previous
Refman
EndNote
Bibtex
RefWorks
Excel
CSV
PDF
Send via email
Issue Date
Title
Author(s)
8-Dec-1994
Efficiency of SS(l) square-and-multiply exponentiation algorithms
Lam, K.-Y.
;
Hui, L.C.K.
Oct-1996
Efficient nearer-ancestor algorithm for network routing
Lam, K.-Y.
;
Hui, L.C.K.
1-Jan-1994
Fast square-and-multiply exponentiation for RSA
Hui, L.C.K.
;
Lam, K.-Y.
6-Nov-1997
Hash function based on block cipher
Yi, X.
;
Lam, K.Y.
Apr-1997
Implementing a highly available network directory service
Lam, K.-Y.
;
Salkield, T.
1999
Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
Sufatrio, Kwok Yan Lam
Dec-1995
Multivariate data analysis software for enhancing system security
Lam, K.-Y.
;
Hui, L.
;
Chung, S.-L.
1999
New construction of algebraic-geometry codes
Niederreiter, H.
;
Xing, C.
;
Lam, K.Y.
2003
On identification secret sharing schemes
Cai, N.
;
Lam, K.Y.
Oct-1998
On the Efficient Implementation of Fair Non-repudiation
You, C.-H.
;
Zhou, J.
;
Lam, K.-Y.
Dec-1995
Replay tolerance of authentication protocols
Lam, K.-Y.
1999
Scalable threshold closure
Zhang, C.
;
Lam, K.-Y.
;
Jajodia, S.
1999
Securing digital signatures for non-repudiation
Zhou, J.
;
Lam, K.Y.
1999
Sequences with almost perfect linear complexity profiles and curves over finite fields
Xing, C.
;
Lam, K.Y.
1999
Several classes of binary sequences with three-level autocorrelation
Ding, C.
;
Helleseth, T.
;
Lam, K.Y.
2001
The Weight Distribution of C5(1, n)
Lam, K.Y.
;
Sica, F.