scispace - formally typeset
W

Wun-She Yap

Researcher at Universiti Tunku Abdul Rahman

Publications -  82
Citations -  864

Wun-She Yap is an academic researcher from Universiti Tunku Abdul Rahman. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 13, co-authored 66 publications receiving 624 citations. Previous affiliations of Wun-She Yap include Agency for Science, Technology and Research & Institute for Infocomm Research Singapore.

Papers
More filters
Book ChapterDOI

An efficient certificateless signature scheme

TL;DR: This paper constructs an efficient certificateless signature scheme based on the intractability of the computational Diffie-Hellman problem and presents an extended construction whose trust level is the same as that of a traditional signature scheme.
Journal ArticleDOI

Cancellable iris template generation based on Indexing-First-One hashing

TL;DR: A new cancellable iris scheme, coined as "Indexing-First-One" (IFO) hashing, inspired from the Min-hashing that primarily used in text retrieval domain and strengthened by two novel mechanisms, namely P-order Hadamard product and modulo threshold function is introduced.
Journal ArticleDOI

Cryptanalysis of a new image alternate encryption algorithm based on chaotic map

TL;DR: It is shown that the Wang and Guo image encryption scheme is vulnerable to an impossible differential attack and a divide-and-conquer attack when a large all black image is encrypted.
Journal ArticleDOI

SPRING: a novel parallel chaos-based image encryption scheme

TL;DR: SPRING is a novel image encryption scheme designed based on lightweight chaotic maps and simple logical and arithmetic operations, which is also highly optimized for massively parallel architecture (e.g. GPU).
Book ChapterDOI

Security Mediated Certificateless Signatures

TL;DR: This paper proposes the first concrete provable scheme without bilinear pairing, which is existential unforgeable in the random oracle model based on the intractability of the discrete logarithm problem, has a short public key size, and achieves a trust level which is the same as that of a traditional public key signature.