Basic information
Tzonelih Hwang, 1958/03, Taiwan. Ph.D, Distinguished Professor, Department of Computer Science and Information Engineering, National Cheng Kung University, Taiwan.
Research interests
Cryptographic Techniques, Network Security, Information Security, Entrance Guarding System, Error Correction Code, Quantum Cryptography
Education
1986 Ph.D, U.S.A \ Univ. of Southwestern Louisiana
1983 M.S, U.S.A \ Univ. of Southwestern Louisiana
1977 B.S, R.O.C \ National Cheng Kung University
Publications
- Y. Tsai and Tzonelih Hwang, 1990, May “ID Based Public Key Cryptosystems Based on Okamoto and Tanaka’s ID Based One Way Communication Scheme,” Electronics Letters, Vol. 26, No. 1, pp. 666-668. (EI, SCI)
- Tzonelih Hwang and T.R.N. Rao, 1990, Deccember, “Secret Error-Correcting Code (SECC),” Journal of Institution of Electronics and Telecommunication Engineers, Special Issue on Digital Communication, Vol. 36, No. 5&6, pp. 362-367
- C. Laih, L. Harn, J. Lee and Tzonelih Hwang, 1991, March, “Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space,” Journal of Information Science and Engineering, Vol. 7, No. 1, pp. 13-23. (EI, SCI)
- S.G. Hwang and Tzonelih Hwang, 1991, June, “Secure Computer Networking System,” Journal of Information and Education, Vol. 23, pp. 17-21. (in Chinese)
- W.C. Ku and Tzonelih Hwang, 1991, June, “Key Management for Secure Networking System,” Journal of Information and Education, Vol. 23, pp. 22-28. (in Chinese)
- Tzonelih Hwang, 1991, November, “Parallel Decoding of Binary BCH Codes,” Electronics Letters, Vol. 27, No. 24, pp. 2223-2225. (EI, SCI)
- H.M. Sun and Tzonelih Hwang, 1992, “On Double-One Matrices and Double-Zero Matrices”, Linear and Multilinear Algebra, Vol. 31, pp.47-55. (SCI, EI)
- Tzonelih Hwang and Y. Wang, 1992, “Parallel Decoding of the (31, 16, 7) Quadratic Residue Code”, J. Inf. Sci. Eng. 8(1): 157-166. (SCI, EI)
- Tzonelih Hwang, 1992, June, “Protocols for Group Oriented Secret Sharing”, Inf. Process. Lett. 42(4): 179-182. (SCI, EI)
- J.L. Chen and Tzonelih Hwang, 1992, June, “Computer Virus and Computer Networks,” Journal of Information and Education, Vol. 29, pp. 15-16. (in Chinese)
- Tzonelih Hwang, 1992, Auguest, “Attacks on Okamoto and Tanaka's One-Way ID-Based Key Distribution System”, Inf. Process. Lett. 43(2): 83-86. (SCI, EI)
- Tzonelih Hwang, 1992, November, “Efficient ID-Based Key Distribution with Tamperfree Devices”, Inf. Process. Lett. 44(1): 31-34. (SCI, EI)
- Tzonelih Hwang, 1992, Decemebr, “Group-Oriented Secure Communications Based on the RSA Scheme,” International Journal of Information Science and Engineering, Vol.3, No. 2. (SCI, EI)
- Tzonelih Hwang and S.Y. Hwang, 1993, “An Improved Algorithm for Davida and Cowles’s Decoding Method,” Computers and Mathematics with Applications, Vol. 26, No. 7, pp. 59-66. (SCI, EI)
- Tzonelih Hwang, 1993, “Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography”, Inf. Process. Lett. 48(1): 35-37. (SCI, EI)
- H.M. Sun and Tzonelih Hwang, 1994, January, "Key Generation of Algebraic-Code Cryptosystems", Computers and Mathematics with Applications, Vol. 27, No. 2, pp. 99-106. (SCI, EI)
- Tzonelih Hwang and J.L. Chen, 1994, January, "ID-Based Conference Key Broadcast Systems," IEE Proceedings - Computers and Digital Techniques, Vol. 141, No. 1, pp. 57-60. (SCI, EI)
- J.L. Chen and Tzonelih Hwang, 1994, "ID-Based Conference Key Broadcast Schemes with User Authentication," Computer and Security, Vol. 13, No. 1, pp. 53-67. (SCI, EI)
- N.Y. Lee and Tzonelih Hwang, 1994, “A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy”, J. Inf. Sci. Eng. 11(4): 601-610. (SCI, EI)
- M.Y. Ko, Tzonelih Hwang and C.C. Chang, 1994, September, "Attack on ID-Based Signature Scheme Based on Rabin’s Public Key Cryptosystem," Computers Communication, Vol. 17, No. 9, pp. 674-676. (SCI, EI)