Download
Appendixes of "New Efficient Three-party Quantum Key Distribution Protocols" Download

JOURNALS
  1. Y.-W. Tsai and Tzonelih Hwang, “ID Based Public Key Cryptosystems Based on Okamoto and Tanaka’s ID Based One Way Communication Scheme,” Electronics Letters, Vol. 26, No. 1 (1990), pp. 666-668. (EI,SCI)
  2. Tzonelih Hwang and T.R.N. Rao, “Secret Error-Correcting Code (SECC),” Journal of Institution of Electronics and Telecommunication Engineers, Special Issue on Digital Communication, Vol. 36, No. 5&6 (1990), pp. 362-367.(EI,SCI)
  3. Chi-Sung Laih, Lein Harn, Jau-yien Lee and Tzonelih Hwang, “Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space,” Journal of Information Science and Engineering, Vol. 7, No. 1 (1991), pp. 13-23. (EI,SCI)
  4. S.G. Hwang and Tzonelih Hwang, “Secure Computer Networking System,” Journal of Information and Education, Vol. 23 (1991), pp. 17-21.(in Chinese)
  5. Wei-Chi Ku and Tzonelih Hwang, “Key Management for Secure Networking System,” Journal of Information and Education, Vol. 23 (1991), pp. 22-28. (in Chinese)
  6. Tzonelih Hwang, November, “Parallel Decoding of Binary BCH Codes,” Electronics Letters, Vol. 27, No. 24 (1991), pp. 2223-2225. (EI,SCI)
  7. Hung-Min Sun and Tzonelih Hwang, “On Double-One Matrices and Double-Zero Matrices”, Linear and Multilinear Algebra, Vol. 31 (1992), pp.47-55. (SCI, EI)
  8. Tzonelih Hwang and Y. Wang, “Parallel Decoding of the (31, 16, 7) Quadratic Residue Code”, Journal of Information Science and Engineering, Vol. 27, No. 24 (1992), pp. 2223-2225. (SCI, EI)
  9. Tzonelih Hwang, “Protocols for Group Oriented Secret Sharing,” Information Processing Letters, Vol. 42, Issue 4 (1992), pp. 179–182. (SCI, EI)
  10. Jau Liang Chen and Tzonelih Hwang, “Computer Virus and Computer Networks,” Journal of Information and Education, Vol. 29, (1992), pp. 15-16. (in Chinese)
  11. Tzonelih Hwang, “Attacks on Okamoto and Tanaka's One-Way ID-Based Key Distribution System”, Information Processing Letters, Vol. 43, Issue 2 (1992), pp. 83-86.(SCI, EI)
  12. Tzonelih Hwang, “Efficient ID-Based Key Distribution with Tamperfree Devices”, Information Processing Letters, Vol. 44, Issue 1 (1992), pp. 31-34.(SCI, EI)
  13. Tzonelih Hwang, “Group-Oriented Secure Communications Based on the RSA Scheme,” International Journal of Information Science and Engineering, Vol.3, No. 2 (1992). (SCI, EI)
  14. Tzonelih Hwang and S.Y. Hwang, “An Improved Algorithm for Davida and Cowles’s Decoding Method,” Computers and Mathematics with Applications, Vol. 26, No. 7 (1993), pp. 59-66. (SCI, EI)
  15. Tzonelih Hwang, “Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography,” Information Processing Letters, Vol. 48, Issue 1 (1993), pp. 35-37. (SCI, EI)
  16. Hung-Min Sun and Tzonelih Hwang, "Key Generation of Algebraic-Code Cryptosystems," Computers and Mathematics with Applications, Vol. 27, No. 2 (1994), pp. 99-106. (SCI, EI)
  17. Tzonelih Hwang and Jau Liang Chen, "ID-Based Conference Key Broadcast Systems," IEE Proceedings - Computers and Digital Techniques, Vol. 141, No. 1 (1994), pp. 57-60. (SCI, EI)
  18. Jau Liang Chen and Tzonelih Hwang, "ID-Based Conference Key Broadcast Schemes with User Authentication," Computer and Security, Vol. 13, No. 1 (1994), pp. 53-67. (SCI, EI)
  19. N.Y. Lee and Tzonelih Hwang, “A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy,” Journal of Information Science and Engineering, Vol.11, No. 4 (1994), pp. 601-610.(SCI, EI)
  20. M.Y. Ko, Tzonelih Hwang and C.C. Chang, "Attack on ID-Based Signature Scheme Based on Rabin’s Public Key Cryptosystem," Computers Communication, Vol. 17, No. 9 (1994), pp. 674-676. (SCI, EI)
  21. Chuan-Ming Li, Tzonelih Hwang and Narn-Yih Lee, “Conspiracy Attacks on the Threshold RSA signature Scheme,” CRYTOLOGIA, Vol. XVIII, No.4 (1994), pp. 372-380. (SCI, EI)
  22. Jau-Liang Chen and Tzonelih Hwang, “How to Thwart the Mafia Attack,” Information Sciences, Vol. 85, Issue 1-3 (1995), pp. 99-104. (SCI, EI)
  23. Tzonelih Hwang and Wei-Chi Ku, “Reparable Key Distribution Protocols for Internet Environment,” IEEE Trans. on Commun., Vol. 43, No. 5 (1995), pp. 1947-1949. (SCI, EI)
  24. Tzonelih Hwang and Yung-Hsiang Chen, “On the Security of SPLICE/AS - The Authentication System in WIDE Internet,” Information Processing Letters, Vol. 53, Issue 2 (1995), pp. 97-101. (SCI, EI)
  25. Tzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li, Ming-Yung Ko and Yung-Hsiang Chen, “Two Attacks on Neuman-Stubblebine Authentication Protocols,” Information Processing Letters, Vol. 53, Issue 2 (1995), pp. 103-107. (SCI, EI)
  26. Tzonelih Hwang and Maujy Peng, “Human Identification,” Journal of Information and Education, Vol. 48, (1995),pp. 18-20.(in Chinese)
  27. Narn-Yih Lee and Tzonelih Hwang, “The security of He and Kiesler's signature schemes,” IEE PROCEEDINGS- COMPUTERS AND DIGITAL TECHNIQUES, Vol.142, No.5 (1995), pp.370-372. (SCI, EI)
  28. Chih-Hung Wang,Tzonelih Hwang and Jiun-Jang Tsai , “On the Matsumoto and Imai Human Identification Scheme,” IEE PROCEEDINGS- COMPUTERS AND DIGITAL TECHNIQUES, Vol.921, (1995), pp.382-392 . (SCI, EI)
  29. Yung-Hsiang Chen and Tzonelih Hwang, “ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer,” COMPUTER COMMUNICATIONS, Vol.18, Issue 12 (1995), pp.993-996 (SCI, EI)
  30. Tzonelih Hwang, Narn-Yih Lee,Chih-Hung Wang and Ming-Yung Ko, “On the security of Wu and Yeh's conference key distribution system”, COMPUTER COMMUNICATIONS, Vol.18, Issue 12 (1995), pp.978-981 (SCI, EI)
  31. Narn-Yih Lee and Tzonelih Hwang, “Modified Harn signature scheme based on factorising and discrete logarithms,” IEE PROCEEDINGS- COMPUTERS AND DIGITAL TECHNIQUES, Vol.143, Issue 3 (1996), pp.196-198. (SCI, EI)
  32. Tzonelih Hwang and Maujy Peng, May, “Attack on a User Authentication Schemefor Mobile Phone,” Computer, Communication, Consumer Electronics, CCL Technical Journal, Special Issue on Wireless Communications, Vol. 49, (1996), pp. 76-78.(in Chinese)
  33. Tzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li and C.C. Chang, “On the Security of Chang and Wu’s Broadcasting Cryptosystem for Computer networks”, Computer Systems Science and Engineering, Vol.11, No.5 (1996), pp. 311-314, (SCI, EI)
  34. Wang Chih-Hung and Tzonelih Hwang, “Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication,” COMPUTERS & SECURITY, Vol.16, Issue 4 (1997), pp339-344. (SCI, EI)
  35. Nara-Yih Lee and Tzonelih Hwang, “On the Security of Park et al.’s Key Distribution Protocol for Digital Mobile Communications,” CRYTOLOGIA, Vol. XXI, No.4 (1997), pp. 327-334. (SCI, EI)
  36. Narn-Yih Lee and Tzonelih Hwang, “Remarks on Chang-Buehrer access control scheme in a hierarchy”, COMPUTERS & MATHEMATICS WITH APPLICATIONS , Vol.34, Issue 12 (1997), pp11-12. (SCI, EI)
  37. Tzonelih Hwang and Chih-Hung Wang, “Protection for E-mail and on-line Talk,” Connectives, Internet, Network, Communication, 77, (1997),pp. 44-52. (invited paper in Chinese)
  38. Tzonelih Hwang, “Comment on "Reparable key distribution protocols for Internet environments" – Reply,” IEEE TRANSACTIONS ON COMMUNICATIONS, Vol. 46, Issue 1 (1998), pp.22 (EI, SCI)
  39. Tzonelih Hwang and Wang Chih-Hung, “Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders,” Information Processing Letters, Vol. 65, Issue 4 (1998), pp. 189-193. (EI, SCI)
  40. C.S. Hong and Tzonelih Hwang, "Building Secure Keys for Internet", Connectives, Internet, Network, Communication, 83, (1998), pp. 64-68. (invited paper in Chinese)
  41. Chih-Hung Wang and Tzonelih Hwang, "PC Security," Connectives, Internet, Network, Communication, 83, (1998),pp. 94-101. (invited paper in Chinese)
  42. Narn-Yih Lee and Tzonelih Hwang, "Comments on ‘dynamic key management schemes for access control in a hierarchy’," Computer Communications, Vol. 22, Issue 1 (1999), pp. 87-89. (EI, SCI)
  43. Wang Chih-Hung, Tzonelih Hwang and Narn-Yih Lee, 1999, January, "Comments on two group signatures," Information Processing Letters, Vol. 69, Issue 2 (1999), pp. 95-97. (EI, SCI)
  44. Narn-Yih Lee and Tzonelih Hwang, "On the security of fair blind signature scheme using oblivious transfer," Computer Communications, Vol. 22, Issue 3 (1999), pp. 287-290. (EI, SCI)
  45. Narn-Yih Lee, Tzonelih Hwang and Chih-Hung Wang, "The security of two ID-based multisignature protocols for sequential and broadcasting architectures," Information Processing Letters, Vol. 70, Issue 2 (1999), pp. 79-81. (EI, SCI)
  46. Jiun-Jang Tsai,, Tzonelih Hwang and Chih-Hung Wang, "New generalized group-oriented cryptosystem based on Diffie-Hellman scheme," Computer Communications, Vol. 22, Issue 8 (1999), pp. 727-729. (EI, SCI)
  47. Narn-Yih Lee and Tzonelih Hwang, "Group-oriented undeniable signature schemes with a trusted center," Computer Communications, Vol. 22, Issue 8 (1999), pp. 730-734. (EI, SCI)
  48. Hung-Min Sun, Narn-Yih Lee and Tzonelih Hwang, "Threshold Proxy Signatures," IEE Proceedings - Computers and Digital Techniques, Vol. 146, No. 5 (1999), pp. 259-263. (SCI, EI)
  49. Hung-Min Sun, B. J. Chen and Tzonelih Hwang, "Cryptanalysis of Group Signature Scheme Using Self-Certified Public Keys," IEE Electronics Letters, Vol. 35, No. 22 (1999), pp. 1938-1939. (SCI, EI)
  50. Wang Chih-Hung, and Tzonelih Hwang, “(t,m) Threshold and Generalized ID-based Conference Key Distribution System,” Applied Mathematics and Computation, Vol. 112, Issue 2-3 (2000), pp181-191. (EI,SCI)(Impact Factor: 0.284)
  51. Narn-Yih Lee , Chi-Chao Chang, Chun-Li Lin and Tzonelih Hwang, “Privacy and non-repudiation on Pay-TV systems,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1 (2000), pp. 20-27. (EI,SCI)(Impact Factor: 0.356)
  52. Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee and Jiun-Jang Tsai, “Threshold-multisiganture scheme and generalized-multisiganture scheme where suspected forgery implies traceability of adversarial shareholders”, CRYTOLOGIA, Vol. XXIV, No.3 (2000), pp. 250-268. (EI,SCI)
  53. Chun-Li Lin, Hung-Min Sun and Tzonelih Hwang, “Three-party Encrypt Key Exchange: Attacks and a Solution,” ACM Operating Systems Review, Vol.34, No.4 (2000), pp.12-20. (EI)
  54. Narn-Yih Lee, Tzonelih Hwang and Chuan-Ming Li , “(t, n) Threshold Untraceable Signatures,” JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, Vol.16, Issue 6 (2000), pp.835-846. (EI, SCI)(Impact Factor: 0.096)
  55. Chun-Li Lin, Hung-Min Sun and Tzonelih Hwang, “Efficient and Practical DHEKE Protocols ,” ACM Operating Systems Review, Vol. 35, No. 1 (2001), pp. 41-47. (EI)
  56. Chun-Li Lin, Hung-Min Sun and Tzonelih Hwang, "Attacks and Solutions on Strong-Password Authentication," IEICE Transactions on Communications, Vol.E84-B, No.9 (2001), pp.2622-2627. (SCI, EI)(Impact Factor: 0.343)
  57. Narn-Yin Lee, and Tzonelih Hwang, “New multistage secret sharing scheme based on factorization problem,” Journal of Information Science and Engineering, Vol. 17, No. 3 (2001), pp. 525-529. (SCI, EI)(Impact Factor: 0.130)
  58. Her-Tyan Yeh, Hung-Min Sun, and Tzonelih Hwang, "Security Analysis of the Generalized Key Agreement and Password Authentication Protocol," IEEE Communications Letters, Vol. 5, No. 11 (2001), pp. 462-463. (SCI, EI)(Impact Factor: 0.689)
  59. Chun-Li Lin, Hung-Min Sun, Michael Steiner and Tzonelih Hwang, "Three-party Encrypted Key Exchange Without Server Public-Keys," IEEE Communications Letters, Vol. 5, No. 12 (2001), pp. 497-499. (SCI, EI)(Impact Factor: 0.689)
  60. Hung-min Sun, Bing-chang Chen, Narn-yih Lee and Tzonelih Hwang, "Threshold proxy signatures with undeniable signers," Communication of IICM, Vol. 5 (2002), No. 1, pp. 9-26. (SCI, EI)
  61. Bin-Tsan Hsieh, Hung-Min Sun and Tzonelih Hwang, "Cryptanalysis of Enhancement for Simple Authentication Key Agreement Algorithm," IEE Electronics Letters, Vol. 38, Issue 1 (2002), pp. 20-21. (SCI, EI)(Impact Factor: 0.970)
  62. Xun Yi, Chee Kheong Siew, Hung-Min Sun, Her-Tyan Yeh, Chun-Li Lin and Tzonelih Hwang, “Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications,” IEEE Transactions on Vehicular Technology, Vol. 52, Issue 2 (2003), pp. 465-468. (SCI, EI)(Impact Factor: 1.220)
  63. Chun-Li Lin and Tzonelih Hwang, “A Password Authentication Scheme with Secure Password Updating,” Computers & Security, Vol. 22, Issue 1 (2003), pp. 68-72. (SCI, EI)(Impact Factor: 0.085)
  64. Her-Tyan Yeh, Hung-Min Sun and Tzonelih Hwang, “Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks,” Journal of Information Science and Engineering, Vol. 19, Issue 6 (2003), pp. 1059-1070. (EI,SCIE)(Impact Factor: 0.171)
  65. Hung-Min Sun, Her-Tyan Yeh and Tzonelih Hwang, “On the Linkability of Some Group Signature Schemes,” Informatica, Lith. Acad. Sci., Vol. 14, Issue 1 (2003), pp.85-94.(EI,SCIE)
  66. Bin-Tsan Hsieh, Hung-Min Sun and Tzonelih Hwang, "On the Security of Some Password Authentication Protocols," Informatica, Lith. Acad. Sci., Vol. 14, Issue 2 (2003), pp.195-204. (EI,SCIE)
  67. H. A. Wen, C. M. Lo and Tzonelih Hwang, “On the Publicly Verifiable Authenticated Encryption,” Electronics Letters, Vol. 39, No. 19 (2003), pp. 1382-1383. (EI,SCI)(Impact Factor: 1.072)
  68. Her-Tyan Yeh, Hung-Min Sun and Tzonelih Hwang, “Improved Authenticated Multiple-Key Agreement Protocol,” Computers & Mathematics with Applications, Vol. 46, Issue 2-3 (2003), pp.207-211. (EI,SCIE)(Impact Factor: 0.413)
  69. Tian-Fu Lee and Tzonelih Hwang, "An Improved Conference Key Distribution Protocol Based on a Symmetric Balanced Incomplete Block Design,” ACM SIGOPS Operating Systems Review, Vol. 38, No. 3 (2004). pp. 58-63. (EI)
  70. Chi-Chao Chang, Narn-Yih Lee and Tzonelih Hwang, “A framework for one-round mobile agent transaction,” IEICE Ttransactions on Communications, Vol.E87-B, No.7 (2004), pp.1883-1889. (EI, SCI)(Impact Factor: 0.436)
  71. Chuan-ming Li and Tzonelih Hwang, "A New SEM-Based Cryptosystem with Reducedly Trusted CA," Journal of Computers, Vol. 16, No. 3 (2004), pp.7-13. (EI, SCI)
  72. Tian-Fu Lee, Tzonelih Hwang and Chun-Li Lin, "Enhanced Three-Party Encrypted Key Exchange without Server Public Keys,” Computers & Security, Vol. 23, Issue 7 (2004), pp. 571-577. (EI, SCI)(Impact Factor: 0.457)
  73. Chun-Li Lin, Hsiang-An Wen, Tzonelih Hwang and Hung-Min Sun, “Provably Secure Three-Party Password-Authenticated Key Exchange,” IEICE Transactions on Fundamentals of Electronics Communications and Computers, Vol.E87-A, No.11 (2004), pp.2990-3000. (EI, SCI)(Impact Factor: 0.374)
  74. Sheng-Yu Hwang, Hsiang-An Wen and Tzonelih Hwang, “On the security enhancement for anonymous secure E-voting over computer network,” Computer Standards & Interfaces, Vol. 27, No. 2 (2005), pp. 163-168. (EI, SCIE)(Impact Factor: 0.316)
  75. Hsiang-An Wen, Kuo-Chang Lee, Sheng-Yu Hwang and Tzonelih Hwang, “On the Traceability on RSA-based Partially Signature with Low Computation,” Applied Mathematics and Computation, Vol. 162, Issue 1 (2005), pp. 421-426. (EI, SCIE)(Impact Factor: 0.567)
  76. Hung-Min Sun, Bing-Chang Chen and Tzonelih Hwang, ”Secure key agreement protocols for three-party against guessing attacks,” Journal of Systems and Software, Vol.75, Issue 1-2 (2005), pp.63-68. (EI,SCIE)(Impact Factor: 0.716)
  77. Hsiang-An Wen, Tian-Fu Lee and Tzonelih Hwang, “A Provably Secure Three-Party Password-based Authenticated Key Exchange Protocol Using Weil Pairing,” IEE Proceedings - Communications, Vol.152, Issue 2 (2005), pp.138-143. (EI, SCI)(Impact Factor: 0.195)
  78. Hsiang-An Wen,  Sheng-Yu Hwang and Tzonelih Hwang, “On the unlinkability of randomization-enhanced Chaum's blind signature scheme,” Applied Mathematics and Computation, Vol. 164, Issue 3 (2005), pp. 799-803. (EI, SCIE)(Impact Factor: 0.567)
  79. Kuo-Chang Lee, Hsiang-An Wen and Tzonelih Hwang, “Convertible ring signature,” IEE Proceedings - Communications, Vol. 152, Issue 4 (2005), pp.411-414. (EI, SCI)(Impact Factor: 0.195)
  80. Tian-Fu Lee, Chi-Chao Chang and Tzonelih Hwang, “Private Authentication Techniques for the Global Mobility Network,” Wireless Personal Communications, Vol. 35, Issue 4 (2005), pp.329-336. (EI, SCI)(Impact Factor: 0.243)
  81. Chuan-Ming Li, Chi-Chao Chang, and Tzonelih Hwang, "Comment on ``Quantum secret sharing between multiparty and multiparty without entanglement,'' Physical Review A, Vol. 73, Issue 1 (2006), p.016301. (EI, SCI)(Impact Factor: 2.997)
  82. Hsiang-An Wen, Chun-Li Lin and Tzonelih Hwang, “Provably secure authenticated key exchange protocols for low power computing clients,” Computers & Security, Vol. 25, Issue 2 (2006), pp. 106-113.(EI, SCI)(Impact Factor: 0.743)
  83. Tzonelih Hwang and H-Y Hsia, "Deciphering the Secret Code in 'The Lady of Shalott,'" Vol. 16, (2006), pp 21-39, Fiction and Drama, National Cheng Kung University.
  84. Chi-Chao Chang and Tzonelih Hwang, " Modular Design for Round-Oriented Password Authentication Protocols,'' Journal of Information Science and Engineering, Vol. 22, No. 5 (2006), pp. 1295-1308. (EI, SCI)(Impact Factor: 0.268)
  85. Tzonelih Hwang, Kuo-Chang Lee and Chuan-Ming Li, "Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols," IEEE Transactions on Dependable and Secure Computing, Volume 4, Issue 1 (2007), pp. 71-80. (EI, SCI)(Impact Factor: 1.762)
  86. Chuan-Ming Li, Tzonelih Hwang and Kuo-Chang Lee, "Security on "Asymmetrical quantum key distribution protocol"," International Journal of Modern Physics C, Vol. 18, Issue 2 (2007), pp. 157-161. (EI, SCI)(Impact Factor: 0.920)
  87. Chuan-Ming LI, Tzonelih Hwang and Narn-Yih Lee, " Security Flaw in "Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem",'' INFORMATICA, Vol. 18 No. 1 (2007), pp. 61-66. (EI,SCI)(Impact Factor: 0.221)
  88. Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang and Tzonelih Hwang, " On the Proxy-Protected Property of Chen et al.’s Proxy Multisignature Schemes,'' INFORMATICA, Vol. 18 No. 1 (2007), pp. 55-60. (EI,SCI)(Impact Factor: 0.221)
  89. Tzonelih Hwang and Kuo-Chang Lee, "EPR Quantum Key Distribution Protocols with 100% Qubit Efficiency," IET Information Security, Vol. 1, No. 1 (2007), pp. 43-45 (EI)
  90. Yu-Chuan Liu, Hsiang-An Wen, Chun-Li Lin and Tzonelih Hwang, "Proxy protected signature secure against the undelegated proxy signature attack," Computers & Electrical Engineering, Vol 33, Issue 3 (2007), pp. 177-185. (EI, SCI)(Impact Factor: 0.154)
  91. C.-M. Lo, Tzonelih Hwang and Chuan-Ming Li, " Revocation-free public-key encryption based on security-mediated public-key infrastructure," IET Information Security, Vol 1, No 3 (2007), pp. 134-141, (EI)
  92. Jui-Ting Chung, Chuan-Ming Li and Tzonelih Hwang, “All-in-one Group-Oriented Cryptosystem Based on Bilinear Pairing,” INFORMATION SCIENCES, Vol. 177, Issue 24 (2007), pp. 5651-5663 (EI,SCI)(Impact Factor: 1.003)
  93. Tzonelih Hwang, Chuan-Ming Li and Narn-Yih Lee, “Secure Direct Communication using Deterministic BB84 Protocol,” International Journal of Modern Physics C, Vol. 19, Issue 4 (2008), pp. 625-635 (EI,SCI)(Impact Factor: 0.841)
  94. Chao-Lin Yang, Chuan-Ming Li and Tzonelih Hwang, “Subliminal Channels in the ID-based Threshold Ring Signature,” International Journal of Computer Mathematics, Vol. 86, No.5 (2009), pp.753-770 (EI,SCI)(Impact Factor: 0.308)
  95. Chuan-Ming Li and Tzonelih Hwang, “Two-Way Quantum-Bit-String Commitment,” International Journal of Modern Physics B, Vol. 24, Issue 10 (2010) pp. 1245-1252 (EI,SCI)(Impact Factor: 0.408)
  96. I-Chao Chen, Tzonelih Hwang and Chuan-Ming Li, “Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol,” PHYSICA SCRIPTA, Vol. 78, Issue 3 (2008), p. 035005 (EI,SCI)(Impact Factor: 0.946)
  97. Han-Cheng Shih, Kuo-Chang Lee and Tzonelih Hwang, "New Efficient Three-party Quantum Key Distribution Protocols," IEEE Journal of Selected Topics in Quantum Electronics, Vol. 15, No. 6 (2009), pp. 1602-1606. (EI,SCI)(Impact Factor: 2.518)
  98. Jia-Hao Chen, Kuo-Chang Lee and Tzonelih Hwang, “The Enhancement of Zhou et al.’s Quantum Secret Sharing Protocol,” International Journal of Modern Physics C, Vol. 20, No. 10 (2009), pp. 1531-1535. (EI,SCI)(Impact Factor: 0.728)
  99. Tian-Fu Lee, Shu-Hui Chang, Tzonelih Hwang, and Song-Kong Chong, “Enhanced Delegation-Based Authentication Protocol for PCSs,” IEEE Transaction on Wireless Communications, Vol. 8, No. 5 (2009), pp. 2166-2171. (EI,SCI) (Impact Factor: 2.181)
  100. Song-Kong Chong and Tzonelih Hwang, “Quantum Key Agreement Protocol Based on BB84,” Optics Communications, Vol. 283, Issue 6 (2010), pp. 1192-1195.(EI,SCI) (Impact Factor: 1.316)
  101. Chia-Wei Tsai and Tzonelih Hwang, “New Deterministic Quantum Communication via Symmetric W State,” Optics Communications, Vol. 283, Issue 21 (2010), pp. 4397-4400 (EI,SCI) (Impact Factor: 1.316)
  102. Shih-Hsueh Wang, Song-Kong Chong and Tzonelih Hwang, “On Multiparty Quantum Secret Sharing with Bell State and Bell Measurements,” Optics Communications, Vol. 283, Issue 21 (2010), pp. 4405-4407 (EI,SCI) (Impact Factor: 1.316)
  103. Chia-Wei Tsai and Tzonelih Hwang, “Teleportation of a Pure EPR State via GHZ-like State,” International Journal of Theoretical Physics, Vol. 49, Isuue 8 (2010), pp. 1969-1975. (EI,SCI) (Impact Factor: 0.688)
  104. Chao-Ren Hsieh, Chia-Wei Tasi and Tzonelih Hwang, “Quantum Secret Sharing Using GHZ-like State,” Communications in Theoretical Physics, Vol. 54, No. 6 (2010), pp. 1019-1022 (EI,SCI) (Impact Factor: 0.579)
  105. Chia-Wei Tsai, Shih-Hsueh Wang and Tzonelih Hwang, “Comment on “N quantum channel are sufficient for Multi-user Quantum key Distribution protocol between n users”,” Optics Communications, Vol. 283, Issue 24 (2010), pp. 5285-5286 (EI,SCI) (Impact Factor: 1.316)
  106. Tian-Fu Lee and Tzonelih Hwang, “Simple Password-Based Three-Party Authenticated Key Exchange without Server Public Keys,” Information Sciences, Vol.180, Issue 9 (2010), pp. 1702-1714. (EI,SCI) (Impact Factor: 3.095)
  107. Song-Kong Chong and Tzonelih Hwang, “The Enhancement of Three-Party Simultaneous Quantum Secure Direct Communication Scheme with EPR Pairs,” Optics Communications, Vol. 284, Issue 1 (2011), pp. 515-518 (EI,SCI) (Impact Factor: 1.316)
  108. ChunWei Yang, ChiaWei Tsai and Tzonelih Hwang, “Fault Tolerant Two-step Quantum Secure Direct Communication Protocol against Collective Noises,” Science in China Series G: Physics Mechanics & Astronomy, Vol. 54, Issue 3 (2011), pp. 496-501. (SCI, EI) (Impact Factor: 1.040)
  109. Song-Kong Chong, Yi-Ping Luo and T. Hwang, "On "Arbitrated Quantum Signature of Classical Messages against Collective Amplitude Damping Noise"," Optics Communications, Vol. 284, Issue 3 (2011), pp. 893-895, (EI,SCI) (Impact Factor: 1.316)
  110. Jason Lin and Tzonelih Hwang, "An Enhancement on Shi et al.'s Multiparty Quantum Secret Sharing Protocol," Optics Communications Vol. 284, Issue 5 (2011), pp. 1468-1471 (EI,SCI) (Impact Factor: 1.316)
  111. Chia-Wei Tsai, Chao-Ren Hsieh and Tzonelih Hwang, ”Dense Coding Using Cluster States and It’s Application on Deterministic Secure Quantum Communication,” European Physical Journal D, Vol. 61, Issue. 3 (2011), pp. 779-783 (EI, SCI)(Impact Factor: 1.420)
  112. Tzonelih Hwang, Cheng-Chieh Hwang and Chia-Wei Tsai, ”Quantum Key Distribution Protocol Using Dense Coding of Three-qubit W State,” European Physical Journal D, Vol. 61, Issue 3 (2011), pp. 785-790.(EI, SCI) (Impact Factor: 1.420)
  113. Jason Lin, Hsin-Yi Tseng and Tzonelih Hwang, "Intercept-resend Attacks on Chen et al.'s Quantum Private Comparison Protocol and the Improvements," Optics Communications, Vol. 284, Issue 9 (2011), pp. 2412-2414 (EI,SCI) (Impact Factor: 1.316)
  114. Tzonelih Hwang, Song-Kong Chong, Yi-Ping Luo and Tong-Xuan Wei, "New Arbitrated Quantum Signature of Classical Messages against Collective Amplitude Damping Noise," Optics Communications, Vol. 284, Issue. 12 (2011), pp. 3144-3148. (EI,SCI) (Impact Factor: 1.316)
  115. Song-Kong Chon, Chia-Wei Tsai and Tzonelih Hwang, "Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"," International Journal of Theoretical Physics, Vol. 50, Issue. 6 (2011), pp. 1793-1802.(EI,SCI) (Impact Factor: 0.688)
  116. Hsin-Yi Tseng, Tzonelih Hwang and Ching-Ying Lin, "On the "Deterministic Secure Quantum Communication using Four-particle Entangled State and Entanglement Swapping," Journal of Information Science and Engineering , Vol. 28, Issue 3 (2012), pp. 471-478.(EI, SCI) (Impact Factor: 0.315)
  117. Tzonelih Hwang, Cheng-Chieh Hwang and Chuan-Ming Li, "Multiparty Quantum Secret Sharing Based on GHZ states," Physica Scripta, Vol. 83, Issue 4 (2011), 045004. (EI, SCI), (Impact Factor: 1.088)
  118. Chun-Wei Yang, Chia-Wei Tsai and Tzonelih Hwang, "Thwarting Intercept-and-Resend Attack on Zhang’s Quantum Secret Sharing Using Collective Rotation Noises," Quantum Information Processing, Vol. 11, Issue 1 (2012), pp. 113-122.(EI, SCI), (Impact Factor: 1.449)
  119. Toung-Shang Wei, Chia-Wei Tsai and Tzonelih Hwang, "Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”," International Journal of Theoretical Physics, Vol. 50, Issue 9 (2011), pp. 2703-2707.(EI,SCI) (Impact Factor: 0.688)
  120. Shih-Hung Kao, Chia-Wei Tsai and Tzonelih Hwang, "Enhanced Multiparty Controlled QSDC Using GHZ State," Communications in Theoretical Physics, Vol. 55, No. 06 (2011), pp. 1007-1011. (EI,SCI), (Impact Factor: 0.579)
  121. Tzonelih Hwang, Cheng-Chieh Hwang, Chun-Wei Yang and Chuan-Ming Li, "Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol," International Journal of Theoretical Physics, Vol. 50, Issue 9 (2011), pp. 2790-2798.(EI,SCI)
  122. Chia-Wei Tsai and Tzonelih Hwang, "Multiparty Quantum Secret Sharing Based on Two Special Entangled States," Science China Physics,Mechanics & Astronomy, Vol. 55, Issue 3 (2012), pp. 460-464. (SCI, EI) (Impact Factor: 1.040)
  123. Tzonelih Hwang, Chia-Wei Tsai, and Song-Kong Chong, "Probabilistic Quantum Key Distribution," Quantum Information and Computation, Vol. 11, Issue 7-8 (2011), pp. 615-637.(EI, SCI) (Impact Factor: 2.980)
  124. Hsin-Yi Tseng, Jason Lin, and Tzonelih Hwang, "New Quantum Private Comparison Protocol Using EPR Pairs," Quantum Information Processing, Vol. 11, Issue 2 (2012), pp. 373-384.(EI, SCI) (Impact Factor: 1.449)
  125. Tian-Fu Lee and Tzonelih Hwang, "Provably Secure and Efficient Authentication Techniques for the Global Mobility Network," Journal of Systems and Software, Vol. 84, Issue 10 (2011), pp. 1717-1725 (EI, SCI)(Impact Factor: 1.293)
  126. Cheng-Chieh Hwang, Tzonelih Hwang and Chuan-Ming Li, "Enhancement of GAO's Multiparty Quantum Secret Sharing," Communications in Theoretical Physics, Vol. 56, Issue 1 (2011), pp. 79-82.(EI, SCI) (Impact Factor: 0.488)
  127. Ching-Ying Lin and Tzonelih Hwang, "On "A Simple Three-party Password-based Key Exchange Protocol"," International Journal of Communication Systems, Vol. 24, Issue 11 (2011), pp. 1520-1532.(SCI), (Impact Factor: 0.229)
  128. Chia-Wei Tsai, Toung-Shang Wei and Tzonelih Hwang, "One-Way Quantum Authenticated Secure Communication Using Rotation Operation, " Communications in Theoretical Physics, Vol. 56 , No. 6 (2011), pp. 1023-1026. (EI, SCI)(Impact Factor: 0.747)
  129. Chia-Wei Tsai and Tzonelih Hwang, " Entanglement swapping of GHZ state via a GHZ-like state," Physica Scripta, Vol. 84 , No. 4 (2011), p.045006.(SCI, EI) (Impact Factor: 1.088)
  130. Lin-Lin Liu, Chia-Wei Tsai and Tzonelih Hwang, "QSS using Symmetric W State," International Journal of Theoretical Physics, Vol. 51, Issue 7 (2012), pp 2291-2306. (SCI, EI)(Impact Factor: 0.845)
  131. Chun-Wei Yang, Tzonelih Hwang and Yi-Ping Luo, Enhancement on "Quantum Blind Signature Based on Two-State Vector Formalism," Quantum Information and Processing, Vol. 12, Issue 1 (2013), pp. 109-117. (SCI, EI)(Impact Factor: 2.000)
  132. Hsin-Yi Tseng, Chia-Wei Tsai, Tzonelih Hwang and Chuan-Ming Li, "Quantum Secret Sharing Based on Quantum Search Algorithm," International Journal of Theoretical Physics, Vol. 51, Issue 10 (2012), pp 3101-3108. (SCI, EI)(Impact Factor: 0.845)
  133. Jung-Lun Hsu, Song-Kong Chong, Tzonelih Hwang and Chia-Wei Tsai, "Dynamic Quantum Secret Sharing," Quantum Information and Processing, Vol. 12, Issue 1 (2013), pp. 331-344. (SCI, EI)(Impact Factor: 2.000)
  134. Hsin-Yi Tseng, Chia-Wei Tsai and Tzonelih Hwang, "Controlled Deterministic Secure Quantum Communication Based on Quantum Search Algorithm," International Journal of Theoretical Physics,Vol. 51, Issue 8 (2012), pp 2447-2454. (SCI, EI)(Impact Factor: 0.845)
  135. Jason Lin, and Tzonelih Hwang, "New Circular Quantum Secret Sharing for Remote Agents," Quantum Information and Processing, Vol. 12, Issue 1 (2013), pp 685-697. (SCI, EI)(Impact Factor: 2.000)
  136. Tzonelih Hwang, Yi-Ping Luo and Song-Kong Chong, "Comment on ``Security analysis and improvements of arbitrated quantum signature schemes``," Physical Review A, Vol. 85, Issue 5 (2012), p.056301. (SCI, EI), (Impact Factor: 2.861)
  137. Yao-Jen Chang, Chia-Wei Tsai and Tzonelih Hwang, "Multi-user Private Comparison Protocol Using GHZ Class States," Quantum Information Processing, Vol. 12, Issue 2 (2013), pp. 1077-1088. (SCI, EI), (Impact Factor: 2.000)
  138. Chun-Wei Yang and Tzonelih Hwang, "Improved QSDC Protocol over a Collective-dephasing Noise Channel," International Journal of Theoretical Physics, Vol. 51 ,Issue 12 (2012),pp. 3941-3950. (SCI, EI)(Impact Factor: 0.845)
  139. Jason Lin and Tzonelih Hwang, "Bell State Entanglement Swappings over Collective Noises and their Applications on Quantum Cryptography," Quantum Information Processing , Vol. 12, Issue 2 (2013), pp.1089-1107. (SCI, EI) (Impact Factor: 2.000)
  140. Shih-Hung Kao, Chia-Wei Tsai, and Tzonelih Hwang, "Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication," International Journal of Theoretical Physics, Vol. 51, Issue 12 (2012), pp. 3868-3875. (SCI, EI)(Impact Factor: 0.845)
  141. Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang, "Intercept-resend Attacks on Semiquantum Secret Sharing and the Improvements," International Journal of Theoretical Physics, Vol. 52, Issue 1 (2013), pp. 156-162. (SCI, EI) (Impact Factor: 0.845)
  142. Ching-Ying Lin and Tzonelih Hwang, "CNOT Extractioin Attack on "Quantum Asymmetric Cryptography with Symmetric Keys"," SCIENCE CHINA Physics, Mechanics & Astronomy, (2014) (SCI, EI)
  143. Chun-Wei Yang and Tzonelih Hwang, "Quantum Dialogue Protocols Immune to Collective Noise," Quantum Information Processing, Vol. 12, Issue 6 (2013), pp. 2131-2142. (EI, SCI) (Impact Factor: 2.000)
  144. Shih-Hung Kao and Tzonelih Hwang, "Cryptanalysis and Improvement of the Controlled Secure Direct Communication," Chinese Physics B, Vol. 22, No. 6 (2013), p.060308. (SCI, EI) (Impact Factor: 1.376)
  145. Chun-Wei Yang, Tzonelih Hwang and Tzu-Han Lin, "Modification Attack on QSDC with Authentication and the Improvement," International Journal of Theoretical Physics, Vol. 52, Issue 7 (2013), pp. 2230-2234. (EI, SCI) (Impact Factor: 0.845)
  146. Chia-Wei Tsai and Tzonelih Hwang, "Deterministic quantum communication using the symmetric W state," Science China Physics, Mechanics and Astronomy, Vol. 56, Issue. 10 (2013), pp.1903–1908, (EI, SCI) (Impact Factor: 1.169)
  147. Chun-Wei Yang, Shih-Hung Kao and Tzonelih Hwang, "Comment on “Efficient and Feasible Quantum Private Comparison of Equality against the Collective Amplitude Damping Noise”," Quantum Information Processing, Vol. 12, Issue 8 (2013), pp. 2871-2875. (EI, SCI) (Impact Factor: 2.000)
  148. Tzu-Han Lin, Ching-Ying Lin and Tzonelih Hwang, "Man-in-the-Middle Attack on "Quantum Dialogue with Authentication Based on Bell States"," International Journal of Theoretical Physics, Vol. 52, Issue 9 (2013), pp. 3199-3203. (EI, SCI) (Impact Factor: 0.845)
  149. Yi-Ping Luo and Tzonelih Hwang, "Erratum: "New arbitrated quantum signature of classical messages against collective amplitude damping noise"," Optics Communication, Vol. 303, (2013), pp. 73. (EI, SCI) (Impact Factor: 1.486)
  150. Chun-Wei Yang, Chia-Wei Tsai and Tzonelih Hwang, "Fault Tolerant Deterministic Quantum Communications Using GHZ States over Collective-Noise Channels," Quantum Information Processing, Vol. 12, Issue 9 (2013), pp. 3043-3055.(EI, SCI) (Impact Factor: 2.000)
  151. Ci-Hong Liao, Chun-Wei Yang and Tzonelih Hwang,"Comment on "Dynamic Quantum Secret Sharing"," Quantum Information Processing, Vol. 12, Issue 10 (2013), pp 3143-3147. (EI, SCI) (Impact Factor: 2.960)
  152. Chun-Wei Yang and Tzonelih Hwang, "Fault Tolerant Quantum Key Distributions Using Entanglement Swapping of GHZ States over Collective-Noise Channels," Quantum Information Processing, Vol. 12, Issue 10 (2013), pp. 3207-3222. (EI, SCI) (Impact Factor: 2.960)
  153. Chun-Wei Yang and Tzonelih Hwang, "Fault Tolerant Authenticated Quantum Direct Communication Immune to Collective Noises," Quantum Information Processing, Vol. 12, Issue 11 (2013), pp. 3495-3509. (EI, SCI)(Impact Factor: 2.960)
  154. Yu-Ting Chen and Tzonelish Hwang, "Multiparty Quantum Remote Control," Quantum Information Processing, Vol. 12, Issue 11 (2013), pp3545-3552. (EI, SCI)(Impact Factor: 2.960)
  155. Yi-Ping Luo and Tzonelih Hwang, "Arbitrated Quantum Signature of Classical Messages without Using Authenticated Classical Channels," Quantum Information Processing, Vol. 13, Issue 1 (2014), pp. 113-120. (EI, SCI)(Impact Factor: 2.960)
  156. Chun-Wei Yang and Tzonelih Hwang, "Measure-and-resend Attack and Improvement on "A Scheme to Share Information via Employing Discrete Algorithm to Quantum States"," International Journal of Theoretical Physics, Vol. 53, Issue 1 (2014), pp. 224-227. (EI, SCI)(Impact Factor: 1.188)
  157. Shih-Hung Kao and Tzonelih Hwang, "Multiparty Controlled Quantum Secure Direct Communication Based on Quantum Search Algorithm," Quantum Information Processing, Vol. 12, Issue 12 (2013), pp 3791-3805. (EI, SCI)(Impact Factor: 2.960)
  158. Tzu-Han Lin, Chun-Wei Yang and Tzonelih Hwang, "Unitary Operation Attack and the Improvement on Probabilistic Quantum Key Distribution," Quantum Information and Computation. Volume 14 Issue 9and10, July 2014, pp. 757-762(EI, SCI)(Impact Factor: 1.625)
  159. Jason Lin, Chun-Wei Yang and Tzonelih Hwang, "Quantum Private Comparison of Equality Protocol without a Third Party," Quantum Information Processing, Vol. 13, Issue 2 (2014), pp. 239-247. (EI, SCI)(Impact Factor: 2.960)
  160. Tzu-Han Lin, Chun-Wei Yang and Tzonelih Hwang, "Attacks and Improvement on "Quantum Direct Communication with Mutual Authentication,"" International Journal of Theoretical Physics, Vol. 53, Issue 2 (2014), pp. 597-602. (EI, SCI)(Impact Factor: 1.188)
  161. Chun-Wei Yang and Tzonelih Hwang, "Efficient Key Construction on Semi-quantum Secret Sharing Protocols," International Journal of Quantum Information. Vol.11, No. 5 (2013), 1350052 (7 pages) (EI, SCI)(Impact Factor: 0.992)
  162. Yu-Ting Chen and Tzonelih Hwang, "Comment on the quantum private comparison protocol based on Bell entangled states," International Journal of Theoretical Physics, Vol. 53, Issue 3 (2014), pp. 837-840. (EI, SCI)(Impact Factor: 1.188)
  163. Tzonelih Hwang and Prosanta Gope, "Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication through Synchronously One-Time Secrets," Wireless Personal Communications, Vol. 77, Issue 1 (2014), pp 197-224 (EI, SCI)(Impact Factor: 0.979)
  164. Chun-Wei Yang and Tzonelih Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Information Processing, Vol. 13, Issue 3 (2014), pp. 781-794. (EI, SCI)(Impact Factor: 2.960)
  165. Tzu-Han Lin and Tzonelih Hwang, "Man-in-the-middle attack on Quantum Secure Communications with Authentication," Quantum Information Processing. Vol. 13, Issue 4 (2014), pp. 917-923. (EI, SCI)(Impact Factor: 2.960)
  166. Tzonelih Hwang, Yi-Ping Luo, Chun-Wei Yang and Tzu-Han Lin, "Quantum Authencryption -- One-step Authenticated Quantum Secure Direct Communications for Off-line Communicants," Quantum Information Processing. Vol. 13, Issue 4 (2014), pp 925-933 (EI, SCI)(Impact Factor: 2.960)
  167. Jung-Lun Hsu, Yu-Ting Chen, Chia-Wei Tsai and Tzonelih Hwang, "Quantum Teleportation with Remote Rotation on a GHZ State," International Journal of Theoretical Physics, Vol. 53, Issue 4 (2014), PP. 1233-1238. (EI, SCI)(Impact Factor: 1.188)
  168. Kun-Fei Yu, Chun-Wei Yang, Ci-Hong Liao and Tzonelih Hwang, "Authenticated Semi-quantum Key Distribution Protocol Using Bell States," Quantum Information Processing. Vol. 13, Issue 6 (2014), pp 1457-1465 (EI, SCI)(Impact Factor: 2.960)
  169. Lin-Lin Liu and Tzonelih Hwang, "Controlled remote state preparation protocols via AKLT states," Quantum Information Processing. Vol. 13, Issue 7 (2014), pp 1639-1650 (EI, SCI)(Impact Factor: 2.960)
  170. Chun-Wei Yang, Chia-Wei Tsai and Tzonelih Hwang, "Fault-tolerant Controlled Quantum Secure Direct Communication over Collective Quantum Noise Channel," Laser Physics. Vol. 24, No. 10 (2014), 105203(8 pages) (EI, SCI) (Impact Factor: 1.025)
  171. Ci-Hong Liao, Chun-Wei Yang and Tzonelish Hwang, "Dynamic quantum secret sharing protocol based on GHZ state", Quantum Information Processing. Vol. 13, Issue 8 (2014), pp 1907-1916. (EI, SCI) (Impact Factor: 2.960)
  172. Ching-Ying Lin, Chun-Wei Yang, and Tzonelih Hwang, "Authenticated Quantum Dialogue Based on Bell States," International Journal of Theoretical Physics. Vol. 54, Issue 3 (2015), pp 780-786. (EI, SCI) (Impact Factor: 1.188)
  173. Chun-Wei Yang, Yi-Ping Luo, Tzonelih Hwang, "Forgery attack on one-time proxy signature and the improvement," Quantum Information Processing. Vol. 13, Issue 9 (2014), pp 2007-2016. (EI, SCI) (Impact Factor: 2.960)
  174. Yi-Ping Luo, Ching-Ying Lin and Tzonelih Hwang, "Efficient Quantum Dialogue Using Single Photons," Quantum Information Processing. vol. 13, Issue 11 (2014), pp2451-2461. (EI, SCI) (Impact Factor: 2.960)
  175. Tzonelih Hwang and Prosanta Gope, "RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode," Cryptologia , pages 1-14.
  176. Lin-Lin Liu and Tzonelih Hwang, "Controlled probabilistic quantum key distribution using a ground state", Quantum Information Processing. vol. 14, Issue 3 (2015), pp989-1003. (EI, SCI) (Impact Factor: 2.960)
  177. Prosanta Gope, Tzonelih Hwang, "Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks", Wireless Personal Communications. (2015-02 publish) (EI, SCI)(Impact Factor: 0.979)
  178. Prosanta Gope, Tzonelih Hwang, "Lightweight and Energy Efficient Mutual Authentication and Key Agreement Scheme with User Anonymity for Secure Communication in Global Mobility Networks", IEEE System Journal. (2015 accepted) (EI, SCI)(Impact Factor: 1.746)
  179. Tzonelih Hwang and Prosanta Gope, "PFC-CTR, PFC-OCB: Efficient Stream-Cipher Modes of authencryption" Cryptologia (EI,SCI) (Impact factor: 0.186 ).
  180. Tian-Fu Lee, Ching-Ying Lin, Chun-Li Lin, Tzonelih Hwang, "Provably secure extended chaotic map-based three-party key agreement protocols using password authentication", Nonlinear Dynamics, (2015-4-28) accepted, (EI, SCI)(Impact Factor:2.419)
  181. Prosanta Gope, Tzonelih Hwang, "A Realistic Lightweight Authentication Protocol Preserving Strong Anonymity for Securing RFID System", Computers & Security. Volume: 55,November 2015,pp 271-280 (2015-5-28) published, (EI, SCI)(Impact Factor:1.172)
  182. Prosanta Gope, Tzonelih Hwang, "Untraceable Sensor Movement in Distributed IoT Infrastructure", IEEE Sensors Journal. Volume:15, Issue: 9, (2015-6-9), pp. 5340-5348(EI, SCI)(Impact Factor: 1.852)
  183. Chih-Hung Chang, Yi-Ping Luo, Chun-Wei Yang, Tzonelih Hwang, "Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement" , Quantum Information Processing. September 2015, Volume 14, Issue 9, pp 3515-3522 (2015 accept). (EI, SCI) (Impact Factor: 2.960)
  184. Tzonelih Hwang, Prosanta Gope, "IAR-CTR, IAR-CFB: Integrity Aware Real-time Based Counter and Cipher Feedback Mode", Security and Communication Networks (Wiley Journal).volume 8,Issue 18,pp 3939-3952(2015 accepted) (EI, SCI)(Impact Factor: 0.720)
  185. Prosanta Gope, Tzonelih Hwang, "Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs", Information Technology and Control.Vol 44, No 3 (2015)(EI, SCI)(Impact Factor: 0.623)
  186. S. Huang, T. Hwang, and P. Gope, “Multi-party Quantum Private Comparison with an Almost-dishonest Third Party” , Quantum Information Processing. (2015 accepted)(EI, SCI) (Impact Factor: 2.960)
  187. Tzonelih Hwang and Yi-Ping Luo, “Probabilistic Authenticated Quantum Dialogue” , Quantum Information Processing. Volume 14, Issue 12 (2015 accepted), Page 4631-4650 (EI, SCI)(Impact Factor: 2.960)
  188. Shih-Hung Kao, Yu-Ting Chen, Chia-Wei Tsai, and Tzonelih Hwang , “Multi-controller Quantum Teleportation with Remote Rotation and its Applications” , Quantum Information Processing.(2015 accepted) Volume 14, Issue 12, pp 4615-4629 (EI, SCI)(Impact Factor: 2.960)
  189. Tzonelih Hwang ,Prosanta Gope, "IA-CTR: Integrity Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks", Wireless Personal Communications, pp 1-13, 20 October 2015 (EI, SCI)(Impact Factor: 0.979)
  190. Tzonelih Hwang ,Prosanta Gope, "Robust Stream-Cipher Mode of Authenticated Encryption for Secure Communication in Wireless Sensor Network", Security and Communication Networks, Volume 9, Issue 7, pages 667-679, 10 May 2016 (EI, SCI)(Impact Factor: 0.720)
  191. Prosanta Gope ,Tzonelih Hwang , “BSN-Care: A Secure IoT-based Modern Healthcare System Using Body Sensor Network”, IEEE Sensors Journal, 20 November 2015, Volume 16 , Issue 5, pp 1368-1376 (SCI, EI)(Impact Factor: 1.852)
  192. Chih-Hung Chang, Tzonelih Hwang , and Prosanta Gope , “An Efficient Quantum Private Comparison of Equality over Collective-noise Channels” , International Journal of Theoretical Physics, April 2016, Volume 55, Issue 4, pp 2125-2138(EI, SCI)(Impact Factor: 0.845)
  193. Tzonelih Hwang, Tzu-Han Lin, Shih-Hung Kao , “Quantum Entanglement Establishment between Two Strangers” , Quantum Information Processing. January 2016, Volume 15, Issue 1, pp 385-403(EI, SCI)(Impact Factor: 2.960)
  194. Yi-Ping Luo , Tzonelih Hwang, “Authenticated Semi-quantum Direct Communication Protocols using Bell States” , Quantum Information Processing. February 2016, Volume 15, Issue 2, pp 947-958(EI, SCI)(Impact Factor: 2.960)
  195. Prosanta Gope , Tzonelih Hwang, “An Efficient Mutual Authentication and Key Agreement Scheme Preserving Strong Anonymity of the Mobile User in Global Mobility Networks” , Journal of Network and Computer Applications. Volume 62, February 2016, Pages 1–8(EI, SCI)(Impact Factor: 2.229)
  196. Sheng-Liang Hwang, Tzonelih Hwang, "Multi-Party Quantum Private Comparison Protocol with an Almost-dishonest Third Party using GHZ States" , International Journal of Theoretical Physics. pp 1-8, 27 January 2016(EI, SCI)(Impact Factor: 0.845)
  197. Prosanta Gope ,Tzonelih Hwang , “PFX: an essence of authencryption for block-cipher security”, Security and Communication Networks, 11 JAN 2016 (SCI, EI)(Impact Factor: 0.449)
  198. Chih-Hung Chang, Chun-Wei Yang, Geng-Rong Hzu, Tzonelih Hwang, Shih-Hung Kao, "Quantum dialogue protocols over collective noises using entanglement of GHZ state" , Quantum Information Processing.(2016-3-23 accepted) (EI, SCI)(Impact Factor: 2.960)
  199. Chuan-Ming Li, Kun-Fei Yu, Shih-Hung Kao and Tzonelih Hwang, "Authenticated Semi-quantum Key Distributions without Classical Channel", Quantum Information Processing(2016-3-19 accepted) (EI, SCI)(Impact Factor: 2.960)
  200. Chih-Hung Chang, Chun-Wei Yang and Tzonelih Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states", International Journal of Theoretical Physics(2016/4/19 accepted) (EI, SCI)(Impact Factor: 0.845)
  201. Shih-Hung Kao and Tzonelih Hwang, "Controlled Quantum Dialogue Robust against Conspiring Users", Quantum Information Processing(2016/6/13 accepted) (EI, SCI)(Impact Factor: 2.960)
  202. Prosanta Gope, Tzonelih Hwang, "A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-time Application Data Access in Wireless Sensor Networks", IEEE Transactions on Industrial Electronics, (2016 acceptd)(EI, SCI)(Impact Factor : 6.49)
  203. Chun-Wei Yang, Shih-Hung Kao, Tzonelih Hwang, "Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise", Quantum Information Processing. November 2016, Volume 15, Issue 11, pp 4711–4727 (EI, SCI)(Impact Factor: 2.960)
  204. Shih-Min Hung, Sheng-Liang Hwang, Tzonelih Hwang and Shih-Hung Kao, "Multiparty quantum private comparison with almost dishonest third parties for strangers", Quantum Information Processing , February 2017, 16:36(EI,SCI)(Impact Factor : 2.192)
  205. Yi-Ping Luo, Shang-Lun Tsai, Tzonelih Hwang and Shih-Hung Kao, "On “A new quantum blind signature with unlinkability”", Quantum Information Processing , Quantum Information Processing, 15 February 2017(EI,SCI)(Impact Factor : 2.192)
  206. Tian-Fu Lee, Tzonelih Hwang, "Three-party authenticated key agreements for optimal communication", PLOS ONE, March 29, 2017(Impact Factor : 2.806)
  207. Yi-Ping Luo, Wen-Han Chou, Tzonelih Hwang, "Comment on “A practical protocol for three-party authenticated quantum key distribution”", Quantum Information Processing , May 2017, 16:119.(EI,SCI)(Impact Factor : 2.192)
  208. Kun-Fei Yu, Jun Gu, Tzonelih Hwang, Prosanta Gope, "Multi-party Semi-quantum Key Distribution Convertible Multi-party Semi-quantum Secret Sharing", Quantum Information Processing, August 2017, 16:194(Ei,SCI)(Impact Factor : 2.192)
  209. Shih-Hung Kao, Tzonelih Hwang, "Controlled quantum dialogue using cluster states", Quantum Information Processing, May 2017, 16:139(EI,SCI)(Impact Factor : 2.192)
  210. Jun Gu, Tzonelih Hwang, "Improvement of 'Novel Multiparty Quantum Key Agreement Protocol with GHZ States'", International Journal of Theoretical Physics , 02 August 2017 , pp 1–9 . (EI,SCI)(Impact Factor : 0.964)
CONFERENCES
  1. Tzonelih Hwang and T. R. N. Rao, 1988, “Secret Error-Correcting Codes (SECC)”, CRYPTO’88: 540-563.
  2. Tzonelih Hwang and T. R. N. Rao, 1989, “Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract)”, EUROCRYPT’89: 657-661.
  3. Chi-Sung Laih, Lein Harn, Jau-Yien Lee and Tzonelih Hwang, 1989, “Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space”, CRYPTO’89: 286-298.
  4. Hung-Min Sun and Tzonelih Hwang, 1989, "On the Generation of Large Nonsingular Matrix Pairs and Permutation Matrices for Algebraic-Code Cryptosystems", Proceedings of National Computer Symposium 1989, pp. 796-801.
  5. Y. Tsay and Tzonelih Hwang, 1989, "ID-Based Public-Key Cryptosystems Based on Okamoto and Tanaka’s ID-Based One-way Communication scheme," Proceedings of 1989 National Computer Symposium, Vol. 2, pp.826-830.
  6. Tzonelih Hwang, 1990, “Cryptosystem for Group Oriented Cryptography”, EUROCRYPT’90: 352-360.
  7. Tzonelih Hwang and T.R.N. Rao, 1990, “Algebraic-Code Cryptosystems for Information Privacy, Reliability and Authenticity”, 1990 IEEE International Symposium on Information Theorem, California, USA.
  8. Tzonelih Hwang, 1990, “On the Secure Communication of Group Oriented Societies”, 1990 IEEE International Symposium on Information Theorem, California, USA.
  9. Tzonelih Hwang, Y. Chen and C. Laih, 1990, “Non-interactive Password Authentications without Password Tables”, Proceeding of 1990 IEEE Region 10 Conference on Computer and Communication Systems, 99. 194-196, 24-27 September, 1990, Hong Kong.
  10. Tzonelih Hwang, Y. Chen, 1990, “Algebraic-code Cryptosystem Using Random Code Chaining”, Proceeding of 1990 IEEE Region 10 Conference on Computer and Communication Systems, pp. 429-431 24-27 September, 1990, Hong Kong.
  11. Tzonelih Hwang, Y. Wang, 1990, “On the Parallel Decode of the (23, 12, 7) Golay Code for VLSI Implementation”, Proceedings of the 1990 International Symposium on Information Theory and Its Applications, Vol. 1, pp. 79-82. Nov. 27-30, 1990, Hawaii, USA.
  12. C.S. Laih, M.D. Lin and Tzonelih Hwang, 1990, “A New Threshold Scheme with Detecting Forged Shadows”, Proceedings of the 1990 International Symposium on Information Theory and Its Applications. Vol. 2, pp. 1053-1056, Nov. 27-30, 1990, Hawaii, USA.
  13. Tzonelih Hwang, 1990, “Group Oriented Secret Sharing”, Proceeding of the First Conference on Information Security, pp. 175-207, Dec. 27, 1990, Chiayi, Taiwan, ROC.
  14. C.S. Laih and Tzonelih Hwang, 1991, “A Branch Oriented Key Management Solution to Dynamic Access Control in a Hoerarchy”, 1191 Symposium on Applied Computing. Pp. 422-429, April 3-5, 1991, Kansas city, Missouri, USA.
  15. Hung-Min Sun and Tzonelih Hwang, 1991, October, "Public-Key ID-Based Cryptosystem", Proceedings of 1991 IEEE International Carnahan Conference on Security Technology, pp 142-144, October 1-3.
  16. Hung-Min Sun and Tzonelih Hwang, 1991, “An Efficient Probabilistic Public-key Block Encryption and Signature Scheme Based on El-Gamal’s Scheme”, Proceeding of the 1991 IEEE International Carnahan Conference on Security Technology, pp. 145-148, Oct. 1991, Taipei, Taiwan, ROC.
  17. Hung-Min Sun and Tzonelih Hwang, 1991, December, "Group-Oriented Threshold Schemes" Proceedings of the International Conference on Information Engineering, pp. 485-493, December 2-5.
  18. Tzonelih Hwang and Hung-Min Sun, 1991, December, "Key Management of the Threshold Schemes", Proceedings of International Symposium on Communications, pp. 602-605, December 9-13.
  19. Tzonelih Hwang and Yihfuh Wang, 1991, “On the Design of Parallel Decoder for the (32, 16, 7) Quadratic Residue Code”, Proceeding of the 1991 International Symposium on Communications, pp. 44-47, 9-13 December 1991, Tainan, Taiwan, ROC.
  20. Tzonelih Hwang, 1992, “On the security of Okamoto and Tanaka’s One-way ID-based Key Distribution System”, Proceeding of the Second Conference on Information Security, pp. 139-148, May 6, 1992, Tainan, Taiwan, ROC.
  21. Tzonelih Hwang, “Scheme for Security Digital Mobile Communication Based on Symmetric Key Cryptography”, TENCON’ 92, Nov. 11-13, 1992, Melbourne, Australia.
  22. Tzonelih Hwang and Jau Liang Chen, 1992, “Identity-based Conference Key Broadcast System with User Authentication”, Proceeding of the 1992 National Symposium on Telecommunications, pp. 1-4, Dec. 23-24, 1992, ROC.
  23. Tzonelih Hwang and Su Ya Hwang, 1992, December, “New Decoding Algorithm for the Binary BCH Codes,” Proceedings of 1992 National Symposium on Telecommunications, pp. 155-158.
  24. Yih-Lan Song, Tzonelih Hwang, and Ching-sung Lu, 1992, December, “Comment on Shamir’s ID-based Signature Scheme”, Proceedings of 1992 National Symposium on Telecommunications, pp. 434-436.
  25. J.L. Lin and Tzonelih Hwang, 1992, May, “User Authentication for Open Distributed Systems”, Proceedings of Soft Pro. Conference, pp. A13-1-025.
  26. Ming-Yung Ko, Tzonelih Hwang, and C.C. Chang, 1993, “Attacks on ID-based Signature Scheme based on Rabin’s Public Key Cryptosystem” Proceedings of the 1993 IEEE International Carnahan Conference on Security Technology.
  27. Jau-Liang Chen and Tzonelih Hwang, 1993, May, “How to Thwart the Mafia Attack”, Proceedings of the third Conference on Information Security, pp. C.2-3.
  28. Ming-Yung Ko and Tzonelih Hwang, 1993, December, “Scheme for Remote User Authentication”, International Symposium on Communications.
  29. N.Y. Lee and Tzonelih Hwang, 1993, “A Pseudo-Key Scheme to Dynamic Access Control in a Hierarchy”, International Symposium on Communications
  30. Chuan-Ming Li and Tzonelih Hwang, 1993, “A New System for Dynamic Access Control”, 1993 International Symposium on Communications.
  31. Chuan-Ming Li, Tzonelih Hwang and Narn-Yih Lee, 1993, “Remark on the Threshold RSA Signature Scheme”, CRYPTO’93: 413-420.
  32. Tzonelih Hwang, Narn-Yih Lee, M.Y. Ko, C.M. Li, and Y.H. Chen, 1993, “On the security of Blundo et al.’s Perfectly-Secure Key Distribution for Dynamic Conferences”, Presented at Rump Section of CRYPTO’93.
  33. Tzonelih Hwang, H.D. Chu and W.C. Ku, 1993, “A Logic-Based Verification Framework for Network Security protocols”, The 8th International Joint Workshop on Computer Communication (JWCC-8).
  34. Tzonelih Hwang, 1993, “Access Controls in Distributed Computer Systems”, International Conference on Parallel and Distributed Systems.
  35. Chuan-Ming Li, Tzonelih Hwang and Narn-Yih Lee, 1994, “Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders”, EUROCRYPT’94: 194-204.
  36. Narn-Yih Lee, Tzonelih Hwang and Chuan-Ming Li, 1994, “Remarks in Yen and Laih’s Digital Signature Scheme”, The fourth Information Security Conference, pp. 139-141.
  37. Tzonelih Hwang and Chuan-Ming Li, 1994, “A New Scheme for Two-way Authentication and Key Distribution”, The fourth Information Security Conference.
  38. Tzonelih Hwang and Narn-Yih Lee, 1995, “Yet another efficient access control for user hierarchy”, IEEE International Carnahan Conference on Security Technology.
  39. Chih-Hung Wang, Tzonelih Hwang and Jiun-Jang Tsai, 1995, “On the Matsumoto and Imai's Human Identification Scheme”, EUROCRYPT’95: 382-392.
  40. Narn-Yih Lee and Tzonelih Hwang, 1995, “On the Security of He and Kiesler’s Signature Schemes”, The fifth Information Security Conference.
  41. Tzonelih Hwang and J.L. Chen, 1995, “ID-based conference key broadcast systems”, The fifth Information Security Conference.
  42. Narn-Yih Lee, Tzonelih Hwang, and C.H. Wang, 1996, “Comment on Cryptanalysis of the blind signatures based on the discrete logarithm problem”, The fourth National Defense Management Conference.
  43. Narn-Yih Lee and Tzonelih Hwang, 1996, “On the security of Park et al.’s key distribution protocol for digital mobile communications”, The Sixth Information Security Conference, pp. 78-82.
  44. F.F. Su and Tzonelih Hwang, 1996, “Comments on Iterative Modular Multiplication without Magnitute Comparison”, The Sixth Information Security Conference, pp. 21-22.
  45. J.J. Tsai, Tzonelih Hwang and C.H. Wang, 1996, “New Generalized Group-Oriented Cryptosystem based on Diffie-Hellman Scheme”, The Sixth Information Security Conference, pp. 17-20.
  46. Tzonelih Hwang, N.Y. Lee and C.C. Chang, 1996, “On the Security of Chang et al.’s Cryptographic Key Assignment Scheme for Access Control in a Hierarchy”, International Computer Symposium, pp. 75-81.
  47. N.Y. Lee and Tzonelih Hwang, 1997, “A New Multistage Secret Sharing Scheme”, The 12th National Simposium on Technological and professional Education, pp. 141-145.
  48. Tzonelih Hwang and Chih-Hung Wang, 1997, “Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders”, ISW’97: 266-272.
  49. N.Y. Lee and Tzonelih Hwang, 1997 “On the Security of Fair Blind Signature Scheme Using Oblivious Transfer”, National Information Security Conference, pp. 116-123.
  50. Chih-Hung Wang and Tzonelih Hwang, 1997 “Threshold and Generalized DSS Signatures without a Trusted Party”, ACSAC’97: 221-226.
  51. N.Y. Lee and Tzonelih Hwang, 1998 “Group-Oriented undeniable signature schemes without a trusted center”, 1998 National Information Security Conference, pp. 233-242.
  52. N.Y. Lee, Tzonelih Hwang, and C.H. Wang, 1998 “On Zhang’s Nonrepudiable Proxy Signature Schemes”, the Third Australasian Conference on Information Security and Privacy, pp. 415-422.
  53. C.H. Wang and Tzonelih Hwang, 1998 “(t,m) Threshold and Generalized ID-based Conference Key Distribution System”, 1998 National Information Security Conference, pp. 311-320.
  54. M. Joye,N.Y. Lee and Tzonelih Hwang, 1999, "On the security of the Lee-Chang group signature scheme and its derivatives", 1999 Information Security Workshop (ISW'99), Japan . LECTURE NOTES IN COMPUTER SCIENCE, Vol. 1729, pp.47-51.
  55. Hung-Min Sun, N. Y. Lee, and Tzonelih Hwang, 1999, May, “Nonrepudiable Threshold Proxy Signatures”, Ninth National Conference on Information Security, May 14-15.
  56. N.Y. Lee, and Tzonelih Hwang, 2000, April, “New digital signature scheme with (t,n) shared verification”, the 15th Technological and Vocational Education Conference of R.O.C. pp. 77-80.
  57. H.A. Wen, H-M Sun and Tzonelih Hwang, 2000, May, “Optimal Key Exchange and Authentication Protocol Secure Against Dictionary and Replay Attacks”, Information Security Conference 2000, May 5-6.
  58. H.T. Yeh, H-M Sun, and Tzonelih Hwang, 2000, May, “Effcicient Three-party Key Agreement Protocols Resistant to Password Guessing Attacks”, Information Security Conference 2000, May 5-6.
  59. B. C. Chen, H. M. Sun, and Tzonelih Hwang, 2001, May, “An Improved Group Signature Scheme Using Proxy Provers”, Information Security Conference 2001, May 4-5.
  60. H. T. Yeh, H. M. Sun, and Tzonelih Hwang, 2001, May, “Improvement of Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks”, Information Security Conference 2001, May 4-5.
  61. H. T. Yeh, H. M. Sun, and Tzonelih Hwang, 2001, December, “Cryptanalysis of Authenticated Key Agreement Protocols”, National Computer Symposium, December 20-21.
  62. Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang and C. T. Lin, 2002, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol”, Information Security Conference 2002, pp. 41-43.
  63. Hung-Min Sun, Bin-Tsan Hsieh, Tzonelih Hwang and C. T. Lin, 2002, "Analysis of A Blind Signature Scheme Based on ElGamal Signature", Symposium on Digital Life and Internet Technologies.
  64. Chi-Chao Chang and Tzonelih Hwang, 2005, May, “Anonymous Proof of Membership with Ring Signature”, IEEE Conference on Electro/Information Technologies 2005, Lincoln, NE, USA, May 22-25.
  65. Tian-Fu Lee and Tzonelih Hwang, 2006, June, “Improvement of the Round-Optimal Conference Key Agreement Protocol”, The 16th Information Security Conference 2006, pp.98-102, June 8-9.
  66. Chuan-Ming Li and Tzonelih Hwang, 2007, June, “m-Secure (t,n) Threshold-multisignature Schemes”, The 17th Information Security Conference 2007, pp.3-12, June 7-8.
  67. J.T. Chung, Chuan-Ming Li and Tzonelih Hwang, 2007, December, “On the Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers”, 2007 National Computer Symposium, pp. 796-802, December 20-21.
  68. C.W. Tsai, S.K. Chong, and Tzonelih Hwang, “Comment on “Quantum Key Agreement Protocol with Maximally Entangled States”, Cryptology and Information Security Conference 2010, May 27-28, 2010, NCTU, Hsinchu, Taiwan.
  69. Jung-Lun Hsu, Chia-Wei Tsai, and Tzonelih Hwang, "Secure Unknown Quantum State Transmission Using GHZ Class State via Collective Noise Channel," Cryptology and Information Security Conference 2011, May 26-27, 2011, NFU, Yunlin, Taiwan
  70. Ching-Ying Lin, Song-Kong Chong, and Tzonelih Hwang, "Comment on ''Quantum Asymmetric Cryptography with Symmetric Keys''," Cryptology and Information Security Conference 2011, May 26-27, 2011, NFU, Yunlin, Taiwan
  71. Chun-Wei Yang and Tzonelih Hwang, "Modification Attack on Ge and Liu's QSDC Protocol and the Improvement," National Computer Symposium, Dec 2-3, NCYU, ChiaYi, Taiwan.
  72. Shih-Hung Kao, Tzonelih Hwang, and Chia-Wei Tsai "Comment on “Secure Four-site Distribution and Quantum Communication of χ-type Entangled States”," National Computer Symposium, Dec 2-3, NCYU, ChiaYi, Taiwan.
  73. Chia-Wei Tsai and Tzonelih Hwang, "On “Quantum Key Agreement Protocol”," National Computer Symposium, Dec 2-3, NCYU, ChiaYi, Taiwan.
  74. Ching-Ying Lin and Tzonelih Hwang, "Improving Gao's Quantum Dialogue Protocols in Qubit Efficiency," National Computer Symposium, Dec 2-3, NCYU, ChiaYi, Taiwan.
  75. Ching-Ying Lin and Tzonelih Hwang, "Comment on “Bidirectional Quantum Secure Communication Scheme Based on Bell States and Auxiliary Particles”," Cryptology and Information Security Conference 2012, May 30-31, NCHU, Taichung, Taiwan
  76. Tzonelih Hwang and Yi-Ping Luo, "簽署量子態之仲裁式量子簽章," Cryptology and Information Security Conference 2012, May 30-31, NCHU, Taichung, Taiwan
  77. Shih-Hung Kao and Tzonelih Hwang, "On Controlled Quantum Teleportation and Secure Direct Communication" 2012 International Conference on Information Security and Intelligent Control, August 14-16, National Yunlin University of Science and Technology, Yunlin, Taiwan
  78. Ching-Ying Lin and Tzonelih Hwang, "Improved Bidirectional Quantum Secure Communication Protocol" 2012 International Conference on Information Security and Intelligent Control, August 14-16, National Yunlin University of Science and Technology, Yunlin, Taiwan
  79. Tzu-Han Lin and Tzonelih Hwang "Man in the middle attack on Quantum Secure Communications with Authentication," Cryptology and Information Security Conference 2013, May 23-24, 2013, STUST, Tainan, Taiwan.
  80. Yu-Ting Chen and Tzonelih Hwang, "Multiparty Quantum Remote Control," Cryptology and Information Security Conference 2013, May 23-24, 2013, STUST, Tainan, Taiwan.
  81. Chun-Wei Yang and Tzonelih Hwang, "Intercept-and-resend Attack on Kang and Fang's Quantum Direct Communication Protocol," Cryptology and Information Security Conference 2013, May 23-24, 2013, STUST, Tainan, Taiwan.
  82. Tzonelih Hwang and Prosanta Gope, "Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity," International Conference on Information, Communications and Signal Processing, 2013, Dec 10-13, 2013, Nanyang Technological University, Tainan, Taiwan.
  83. Yu-Ting Chen and Tzonelih Hwang, "Quantum private comparison based on entanglement swapping among EPR pairs" National Computer Symposium (NCS 2013), Dec 13-14, 2013, Asia University, Taichung, Taiwan.
  84. Shih-Hung Kao and Tzonelih Hwang, "Comment on: Secure Quantum Dialogue Protocol Based on W States Without Information Leakage" 24th Cryptology and Information Security Conference, May 30-31, 2014, National Chengchi University, Taipei, Taiwan.
  85. Chih-Hung Chang, Yi-Ping Luo, Chun-Wei Yang and Tzonelih Hwang, "Intercept-and-resend attack on controlled bidirectional quantum direct communication" 24th Cryptology and Information Security Conference, May 30-31, 2014, National Chengchi University, Taipei, Taiwan.
  86. Sheng-Liang Huang, Prosanta Gope, Tzonelih Hwang, "Comment on “Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state”" 24th Cryptology and Information Security Conference, May 30-31, 2014, National Chengchi University, Taipei, Taiwan.
  87. Prosanta Gope and Tzonelih Hwang, "Security Weaknesses On A Mutual Authentication And Key Agreement Scheme In Global Mobile Networks," Fourth International Conference on Computational Science, Engineering and Information Technology (CCSEIT 2014), August 9 2014, Pune, India
  88. Shih Min Hung, Tzonelih Hwang, "Quantum Private Comparison Protocol with a Malicious Third-Party" Cryptology and Information Security Conference 2015 (CISC2015), May 28-29, 2015, National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan.
  89. Guan-Lin Huang, Tzonelih Hwang, "Multi-layer Hierarchical Quantum Secret Sharing" Cryptology and Information Security Conference 2015 (CISC2015), May 28-29, 2015, National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan.
  90. Shih-Hung Kao、Chun-Wei Yang、Tzonelih Hwang, "Fault-tolerant Controlled Quantum Secure Direct Communication using Greenberger–Horne–Zeilinger states against Collective Noises" Cryptology and Information Security Conference 2015 (CISC2015), May 28-29, 2015, National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan.
  91. Jun Gu、Tzonelih Hwang, "Semi-quantum Key Agreement " Cryptology and Information Security Conference 2015 (CISC2015), May 28-29, 2015, National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan.
  92. Yi-Ping Luo, Tzonelih Hwang, Chun-Wei Yang, "One-step Authenticated Quantum State Transmission for Off-line Communicants" Cryptology and Information Security Conference 2015 (CISC2015), May 28-29, 2015, National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan.
  93. 許婷婷, 黃宗立, "文學密碼與修辭學", 第26屆全國資訊安全會議, 2016/5/26~2016/5/27, 亞洲大學, 台中, 台灣.
  94. 黃宗立, 高士閎, "文學密碼與資訊理論", 第26屆全國資訊安全會議, 2016/5/26~2016/5/27, 亞洲大學, 台中, 台灣.
  95. Yu-Ho Fu, Shih-Hung Kao, Tzonelih Hwang, "Comment on "Efficient controller quantum secure direct communication based on GHZ-like states"", Cryptology and Information Security Conference 2016, May 26~May 27, Asia University, Taichung, Taiwan.
  96. Jun Gu, Chih-Yun Ho, Tzonelih Hwang, Statistics Attack on "Quantum private comparison with a malicious third party", Cryptology and Information Security Conference 2016 (CISC2016), May 26-27, 2016, Asia University, Taichung, Taiwan.
  97. Zhi-Rou Liu and Tzonelih Hwang, Intercept-and-resend Attack on "Semi-quantum Information Splitting Using GHZ-type States", Cryptology and Information Security Conference 2016 (CISC2016), May 26-27, 2016, Asia University, Taichung, Taiwan.
  98. Tsai-Chen Lin and Tzonelih Hwang, On "A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation", Cryptology and Information Security Conference 2016 (CISC2016), May 26-27, 2016, Asia University, Taichung, Taiwan.
  99. Yi-Ping Luo, Prosanta Gope, Zhi-Rou Liu, Tzonelih Hwang, "Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System", Computer Symposium (ICS), 2016 International, 15-17 Dec. 2016 , Chiayi, Taiwan.
  100. Jun Gu, Tzonelih Hwang, "Comment on 'Multiparty Quantum Key Agreement with GHZ State'", Computer Symposium (ICS), 2016 International, 15-17 Dec. 2016, Chiayi, Taiwan.
  101. Jun Gu, Chih-Yung Ho, Tzonelih Hwang, "Improvement on the fairness of ‘Two-party quantum key agreement against collective noise’", 27 屆資訊安全會議
  102. Shih-Hao Lung, Shih-Hung Kao, Tzonelih Hwang, "應用區塊鏈技術於 P2P 借貸平台之探討", 第十六屆離島資訊技術與應用研討會
Other Publications
  1. Tzonelih Hwang, 1988, “Secret Error-Correcting Codes and Algebraic-Code Cryptosystems”, Ph.D. Dissertation, Univ. of SW Louisiana.
Implementation Systems
  1. Tzonelih Hwang, J.L. Lin, W.C. Ku, S.G. Hwang, From 1990 to 1991, “Secure Data Network System (SDNS)”.
  2. Tzonelih Hwang, K.Z. Ho and J.H. Lin, From 1995 to 1996, “Gate Security Systems”.
  3. Tzonelih Hwang, Panda Lin and Terence Chang, From 1996 to 1998, “Smart Talk”.
  4. Tzonelih Hwang and Students, From 1991 to 1997, “Don’t Worry Internet Security System”.
  5. Tzonelih Hwang and Anddy Liu, From 1997 to 1998, “PC File Protection System”.
Patent
  1. Tzonelih Hwang, “BCH Parallel decoder of binary code”, Patent 56285 , R.O.C.
  2. J.L. Chang and Tzonelih Hwang, “Intelligent burglarproofing System of Mobile Phone ”, Patent 60204 , R.O.C.
  3. Tzonelih Hwang, “IC card Application System” ,Patent 64353 , R.O.C.
  4. Tzonelih Hwang and F. Hwang, “貼換式車用標竿”, R.O.C.