Basic information
Tzonelih Hwang, 1958/03, Taiwan. Ph.D, Distinguished Professor, Department of Computer
Science and Information Engineering, National Cheng Kung University, Taiwan.
Research interests
Cryptographic
Techniques, Network Security, Information Security, Entrance Guarding System,
Error Correction Code, Quantum Cryptography
Education
1986 Ph.D, U.S.A \ Univ. of Southwestern Louisiana
1983 M.S, U.S.A \ Univ. of Southwestern Louisiana
1977 B.S, R.O.C \ National Cheng Kung University
Publications
-
Y. Tsai and Tzonelih Hwang, 1990, May “ID Based
Public Key Cryptosystems Based on Okamoto and Tanaka’s ID Based
One Way Communication Scheme,” Electronics Letters, Vol. 26, No. 1, pp.
666-668. (EI, SCI)
-
Tzonelih Hwang and T.R.N. Rao, 1990, Deccember, “Secret
Error-Correcting Code (SECC),” Journal of Institution of Electronics and
Telecommunication Engineers, Special Issue on Digital Communication, Vol. 36,
No. 5&6, pp. 362-367
-
C. Laih, L. Harn, J. Lee and Tzonelih Hwang, 1991,
March, “Dynamic Threshold Scheme Based on the Definition of Cross-Product in an
N-Dimentional Linear Space,” Journal of Information Science and Engineering,
Vol. 7, No. 1, pp. 13-23. (EI, SCI)
-
S.G. Hwang and Tzonelih Hwang, 1991, June, “Secure
Computer Networking System,” Journal of Information and Education, Vol. 23, pp.
17-21. (in Chinese)
-
W.C. Ku and Tzonelih Hwang, 1991, June, “Key
Management for Secure Networking System,” Journal of Information and Education,
Vol. 23, pp. 22-28. (in Chinese)
-
Tzonelih Hwang, 1991, November, “Parallel Decoding
of Binary BCH Codes,” Electronics Letters, Vol. 27, No. 24, pp. 2223-2225. (EI,
SCI)
-
H.M. Sun and Tzonelih Hwang, 1992, “On Double-One
Matrices and Double-Zero Matrices”, Linear and Multilinear Algebra, Vol. 31,
pp.47-55. (SCI, EI)
-
Tzonelih Hwang and Y. Wang, 1992, “Parallel
Decoding of the (31, 16, 7) Quadratic Residue Code”, J. Inf. Sci. Eng. 8(1):
157-166. (SCI, EI)
-
Tzonelih Hwang, 1992, June, “Protocols for Group
Oriented Secret Sharing”, Inf. Process. Lett. 42(4): 179-182. (SCI, EI)
-
J.L. Chen and Tzonelih Hwang, 1992, June, “Computer
Virus and Computer Networks,” Journal of Information and Education, Vol. 29,
pp. 15-16. (in Chinese)
-
Tzonelih Hwang, 1992, Auguest, “Attacks on Okamoto
and Tanaka's One-Way ID-Based Key Distribution System”, Inf. Process. Lett.
43(2): 83-86. (SCI, EI)
-
Tzonelih Hwang, 1992, November, “Efficient ID-Based
Key Distribution with Tamperfree Devices”, Inf. Process. Lett. 44(1): 31-34.
(SCI, EI)
-
Tzonelih Hwang, 1992, Decemebr, “Group-Oriented
Secure Communications Based on the RSA Scheme,” International Journal of
Information Science and Engineering, Vol.3, No. 2. (SCI, EI)
-
Tzonelih Hwang and S.Y. Hwang, 1993, “An Improved
Algorithm for Davida and Cowles’s Decoding Method,”
Computers and Mathematics with Applications, Vol. 26, No. 7, pp. 59-66. (SCI,
EI)
-
Tzonelih Hwang, 1993, “Scheme for Secure Digital
Mobile Communications Based on Symmetric Key Cryptography”, Inf. Process. Lett.
48(1): 35-37. (SCI, EI)
-
H.M. Sun and Tzonelih Hwang, 1994, January,
"Key Generation of Algebraic-Code Cryptosystems", Computers and
Mathematics with Applications, Vol. 27, No. 2, pp. 99-106. (SCI, EI)
-
Tzonelih Hwang and J.L. Chen, 1994, January,
"ID-Based Conference Key Broadcast Systems," IEE Proceedings -
Computers and Digital Techniques, Vol. 141, No. 1, pp. 57-60. (SCI, EI)
-
J.L. Chen and Tzonelih Hwang, 1994, "ID-Based
Conference Key Broadcast Schemes with User Authentication," Computer and
Security, Vol. 13, No. 1, pp. 53-67. (SCI, EI)
-
N.Y. Lee and Tzonelih Hwang, 1994, “A Pseudo-Key
Scheme for Dynamic Access Control in a Hierarchy”, J. Inf. Sci. Eng. 11(4):
601-610. (SCI, EI)
-
M.Y. Ko, Tzonelih Hwang and C.C. Chang, 1994,
September, "Attack on ID-Based Signature Scheme Based on Rabin’s Public Key
Cryptosystem," Computers Communication, Vol. 17, No. 9, pp. 674-676. (SCI,
EI)