2007 |
52 | EE | Yu-Chuan Liu,
Hsiang-An Wen,
Chun-Li Lin,
Tzonelih Hwang:
Proxy-protected signature secure against the undelegated proxy signature attack.
Computers & Electrical Engineering 33(3): 177-185 (2007) |
51 | EE | Tzonelih Hwang,
Kuo-Chang Lee,
Chuan-Ming Li:
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols.
IEEE Trans. Dependable Sec. Comput. 4(1): 71-80 (2007) |
50 | EE | Jui-Ting Chung,
Chuan-Ming Li,
Tzonelih Hwang:
All-in-one group-oriented cryptosystem based on bilinear pairing.
Inf. Sci. 177(24): 5651-5663 (2007) |
49 | EE | Pei-Hui Huang,
Hsiang-An Wen,
Chih-Hung Wang,
Tzonelih Hwang:
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes.
Informatica, Lith. Acad. Sci. 18(1): 55-60 (2007) |
48 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem.
Informatica, Lith. Acad. Sci. 18(1): 61-66 (2007) |
2006 |
47 | EE | Hsiang-An Wen,
Chun-Li Lin,
Tzonelih Hwang:
Provably secure authenticated key exchange protocols for low power computing clients.
Computers & Security 25(2): 106-113 (2006) |
46 | EE | Chi-Chao Chang,
Tzonelih Hwang:
Modular Design for Round-Oriented Password Authentication Protocols.
J. Inf. Sci. Eng. 22(5): 1295-1308 (2006) |
2005 |
45 | EE | Hsiang-An Wen,
Kuo-Chang Lee,
Sheng-Yu Hwang,
Tzonelih Hwang:
On the traceability on RSA-based partially signature with low computation.
Applied Mathematics and Computation 162(1): 421-425 (2005) |
44 | EE | Hsiang-An Wen,
Sheng-Yu Hwang,
Tzonelih Hwang:
On the unlinkability of randomization-enhanced Chaum's blind signature scheme.
Applied Mathematics and Computation 164(3): 799-803 (2005) |
43 | EE | Hung-Min Sun,
Bing-Chang Chen,
Tzonelih Hwang:
Secure key agreement protocols for three-party against guessing attacks.
Journal of Systems and Software 75(1-2): 63-68 (2005) |
2004 |
42 | EE | Tian-Fu Lee,
Tzonelih Hwang,
Chun-Li Lin:
Enhanced three-party encrypted key exchange without server public keys.
Computers & Security 23(7): 571-577 (2004) |
41 | EE | Tian-Fu Lee,
Tzonelih Hwang:
Improved conference key distribution protocol based on a symmetric balanced incomplete block design.
Operating Systems Review 38(3): 58-64 (2004) |
2003 |
40 | | Chun-Li Lin,
Tzonelih Hwang:
A password authentication scheme with secure password updating.
Computers & Security 22(1): 68-72 (2003) |
39 | EE | Hung-Min Sun,
Her-Tyan Yeh,
Tzonelih Hwang:
On the Linkability of Some Group Signature Schemes.
Informatica, Lith. Acad. Sci. 14(1): 85-94 (2003) |
38 | EE | Bin-Tsan Hsieh,
Hung-Min Sun,
Tzonelih Hwang:
On the Security of Some Password Authentication Protocols.
Informatica, Lith. Acad. Sci. 14(2): 195-204 (2003) |
37 | EE | Her-Tyan Yeh,
Hung-Min Sun,
Tzonelih Hwang:
Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng. 19(6): 1059-1070 (2003) |
2001 |
36 | EE | Narn-Yih Lee,
Tzonelih Hwang:
New Multistage Secret Sharing Scheme Based on Factorization Problem.
J. Inf. Sci. Eng. 17(3): 525-529 (2001) |
35 | | Chun-Li Lin,
Hung-Min Sun,
Tzonelih Hwang:
Efficient and Practical DHEKE Protocols.
Operating Systems Review 35(1): 41-47 (2001) |
2000 |
34 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chuan-Ming Li:
(t, n) Threshold Untraceable Signatures.
J. Inf. Sci. Eng. 16(6): 835-846 (2000) |
33 | | Chun-Li Lin,
Hung-Min Sun,
Tzonelih Hwang:
Three-party Encrypted Key Exchange: Attacks and A Solution.
Operating Systems Review 34(4): 12-20 (2000) |
1999 |
32 | EE | Marc Joye,
Narn-Yih Lee,
Tzonelih Hwang:
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.
ISW 1999: 47-51 |
31 | | Narn-Yih Lee,
Tzonelih Hwang:
Comments on ``Dynamic Key Management Schemes for Access control in a Hierarchy''.
Computer Communications 22(1): 87-89 (1999) |
30 | EE | Narn-Yih Lee,
Tzonelih Hwang:
On the security of fair blind signature scheme using oblivious transfer.
Computer Communications 22(3): 287-290 (1999) |
29 | EE | Jiun-Jang Tsai,
Tzonelih Hwang,
Chih-Hung Wang:
New generalized group-oriented cryptosystem based on Diffie-Hellman scheme.
Computer Communications 22(8): 727-729 (1999) |
28 | EE | Narn-Yih Lee,
Tzonelih Hwang:
Group-oriented undeniable signature schemes with a trusted center.
Computer Communications 22(8): 730-734 (1999) |
27 | EE | Chih-Hung Wang,
Tzonelih Hwang,
Narn-Yih Lee:
Comments on Two Group Signatures.
Inf. Process. Lett. 69(2): 95-97 (1999) |
26 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett. 70(2): 79-81 (1999) |
1998 |
25 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes.
ACISP 1998: 415-422 |
24 | EE | Tzonelih Hwang,
Chih-Hung Wang:
Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders.
Inf. Process. Lett. 65(4): 189-193 (1998) |
1997 |
23 | EE | Chih-Hung Wang,
Tzonelih Hwang:
Threshold and Generalized DSS Signatures without a Trusted Party.
ACSAC 1997: 221-226 |
22 | | Tzonelih Hwang,
Chih-Hung Wang:
Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders.
ISW 1997: 266-272 |
21 | EE | Chih-Hung Wang,
Tzonelih Hwang:
Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication.
Computers & Security 16(4): 339-344 (1997) |
1995 |
20 | EE | Chih-Hung Wang,
Tzonelih Hwang,
Jiun-Jang Tsai:
On the Matsumoto and Imai's Human Identification Scheme.
EUROCRYPT 1995: 382-392 |
19 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chih-Hung Wang,
Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system.
Computer Communications 18(12): 978-981 (1995) |
18 | EE | Yung-Hsiang Chen,
Tzonelih Hwang:
ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer.
Computer Communications 18(12): 993-996 (1995) |
17 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chuan-Ming Li,
Ming-Yung Ko,
Yung-Hsiang Chen:
Two Attacks on Neuman-Stubblebine Authentication Protocols.
Inf. Process. Lett. 53(2): 103-107 (1995) |
16 | EE | Tzonelih Hwang,
Yung-Hsiang Chen:
On the Security of SPLICE/AS - The Authentication System in WIDE Internet.
Inf. Process. Lett. 53(2): 91-101 (1995) |
15 | | Jau-Liang Chen,
Tzonelih Hwang:
How to Thwart the Mafia Attack.
Inf. Sci. 85(1-3): 99-104 (1995) |
1994 |
14 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.
EUROCRYPT 1994: 194-204 |
13 | EE | Ming-Yung Ko,
Tzonelih Hwang,
Chin-Chen Chang:
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem.
Computer Communications 17(9): 674-676 (1994) |
12 | EE | Jau-Liang Chen,
Tzonelih Hwang:
Identity-based conference key broadcast schemes with user authentication.
Computers & Security 13(1): 53-57 (1994) |
11 | EE | Narn-Yih Lee,
Tzonelih Hwang:
A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy.
J. Inf. Sci. Eng. 11(4): 601-610 (1994) |
1993 |
10 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Remark on the Threshold RSA Signature Scheme.
CRYPTO 1993: 413-420 |
9 | | Tzonelih Hwang:
Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography.
Inf. Process. Lett. 48(1): 35-37 (1993) |
1992 |
8 | | Tzonelih Hwang:
Protocols for Group Oriented Secret Sharing.
Inf. Process. Lett. 42(4): 179-182 (1992) |
7 | | Tzonelih Hwang:
Attacks on Okamoto and Tanaka's One-Way ID-Based Key Distribution System.
Inf. Process. Lett. 43(2): 81-86 (1992) |
6 | | Tzonelih Hwang:
Efficient ID-Based Key Distribution with Tamperfree Devices.
Inf. Process. Lett. 44(1): 31-34 (1992) |
5 | EE | Tzonelih Hwang,
Yihfuh Wang:
Parallel Decoding of the (31, 16, 7) Quadratic Residue Code .
J. Inf. Sci. Eng. 8(1): 157-166 (1992) |
1990 |
4 | EE | Tzonelih Hwang:
Cryptosystem for Group Oriented Cryptography.
EUROCRYPT 1990: 352-360 |
1989 |
3 | EE | Chi-Sung Laih,
Lein Harn,
Jau-Yien Lee,
Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
CRYPTO 1989: 286-298 |
2 | EE | Tzonelih Hwang,
T. R. N. Rao:
Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract).
EUROCRYPT 1989: 657-661 |
1988 |
1 | EE | Tzonelih Hwang,
T. R. N. Rao:
Secret Error-Correcting Codes (SECC).
CRYPTO 1988: 540-563 |