Page 81 - profile2012.indd
P. 81
Research Faculty 研究人員
研究員 研究員
黃文良 Wen-Liang Hwang 楊柏因 Bo-Yin Yang
Research Fellow Research Fellow
Ph.D., Computer Science, New York University Ph.D., Applied Mathematics, MIT
Tel: +886-2-2788-3799 ext. 1609 Fax: +886-2-2782-4814 Tel: +886-2-2788-3799 ext. 1731 Fax: +886-2-2782-4814
Email: whwang@iis.sinica.edu.tw Email: byyang@iis.sinica.edu.tw
http://www.iis.sinica.edu.tw/pages/whwang/eindex.html http://www.iis.sinica.edu.tw/pages/byyang
● Research Fellow, IIS, Academia Sinica, Taiwan (since 2005-) ● Ph.D. in Computer Science, New York University, U.S.A.(1993) ● 1987 B.S., Physics, National Taiwan University ● 2006 Associate Research Fellow, IIS, Academia Sinica
● Associate Research Fellow, IIS, Academia Sinica, Taiwan (1999-2005) ● M.S. in Electrical Engineering, Polytechnique Institute of New York, ● 1991 Ph.D., Mathematics, Massachusetts Institute of Technology ● 2011 Research Fellow, IIS, Academia Sinica
● Assistant Research Fellow, IIS, Academia Sinica, Taiwan (1995-1999) U.S.A.(1998) ● 1992 Associate Professor of Mathematics, Tamkang University
● Post-Doctoral Researcher, Department of Mathematics, University ● B.S. in Nuclear Engineering, National Tsing Hua University, Taiwan
of California, Irvine (1993-1994) (1981)
Research Description Publications Research Description Publications
Dr. Hwang’s research areas are wavelet analysis, and signal 1. Stephane Mallat and Wen-Liang Hwang, “Singularity Detec- I am an applied cryptographer. I am interested in E ec- 1. F.-H. Liu, Y.-J. Huang, and B.-Y. Yang, Public-Key Cryptog-
and image processing. As well as co-authoring one book tion and Processing with Wavelets”, IEEE Transactions on tive Crypto Algorithms (especially for Low-Resource and raphy from New Multivariate Quadratic Assumptions, to ap-
and contributing a chapter to another book, he has had Information Theory, vol. 38, no. 2, pp. 617-645, March 1992. Pervasive Applications), Post-Quantum Cryptosystems, pear at PKC 2012 and a volume of LNCS.
several technical papers published in the leading journals 2. Chun-Liang Tu, Wen-Liang Hwang, and Jinn Ho, “Analysis of Algebraic Cryptanalysis, and other algorithmic aspects of 2. D. J. Bernstein, N. Duif, T. Lange, *P. Schwabe, and B.-Y.
and conferences, including twenty eight in IEEE Transac- Singularities from Modulus Maxima of Complex Wavelets”, Cryptology and Code Generation: Yang, High-speed high-security signatures, CHES 2011,
tions. Dr. Hwang is listed on the ISI Highly Cited Research IEEE Transactions on Information Theory, vol. 51, no. 3, pp. 1. E ective Crypto Algorithms: Embedded processors and LNCS 6917, pp. 124-142. Full version to appear in the J. of
List. In 2001, he received a national award for distinguished 1049-1062, March 2005. microcontrollers are everywhere, working invisibly. Se- Cryptographic Engineering.
junior researchers in Taiwan. 3. Rene Carmona, Wen-Liang Hwang, and Bruno Torresani, curity and privacy becomes more pressing for this ubiq- 3. P.-C. Kuo, M. Schneider, Ö. Dagdelen, J. Reichelt, J. Buch-
Dr. Hwang’s main contributions to wavelet analysis are de- “Practical Time-Frequency Analysis: Gabor and Wavelet uitous computer. RSA is simply too heavy-weight to t mann, C.-M. Cheng*, and B.-Y. Yang, Extreme Enumeration
all occasions, and ECC is “in”. On the other end, increas-
veloping various application algorithms to detect singu- Transforms with Implementation in S,” (Wavelet Analysis and ing computing resources enables attack larger prob- on GPU and in Clouds, CHES 2011 (ibid.), pp. 176-191.
larities and instantaneous frequencies in signals and im- its Applications, Vol. 9,) Academic Press, U.S.A.,1998. lems for which e ciency is imperative. Sometimes we 4. C. Bouillaguet, H.-C. K. Chen, C.-M. Cheng, T. Chou, R. Nie-
ages. Dr. Hwang’s other research achievements in the eld 4. Rene Carmona, Wen-Liang Hwang, and Bruno Torresani,” have to develop tools that produce fast assembly code. derhagen, A. Shamir, and *B.-Y. Yang, Fast Exhaustive Search
of wavelet analysis include texture and fractal analysis and Characterization of Signals by the Ridges of Their Wavelet We study topics ranging from restricted linear algebra, for Polynomial Systems in GF(2), CHES 2010, LNCS 6225,
wavelet coding algorithms. Transforms,” IEEE Transactions on Signal Processing, vol. cryptographical ASIPs and resource-limited arithmetic pp. 203-218.
45, no. 10, pp. 2586-2590, October 1997. to faster arithmetic for e cient primitives and parallel-
Dr. Hwang also studies various signal and image process- ized cryptanalysis. 5. *Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, E. L.-H. Kuo,
ing techniques for data compression and single channel 5. Rene Carmona, Wen-Liang Hwang, and Bruno Torresani, J. Lee, J. McCune, K.-H. Wang, M. Krohn, A. Perrig, B.-Y.
signal separation. For data compression, Dr. Hwang has “Multiridge Detection and Time-Frequency Reconstruction,” 2. Post-Quantum Cryptography: This is the study of cryp- Yang, H.-M. Sun, and P.-L. Lin, SPATE: Small-group PKI-less
applied the multi-objective optimization approach to IEEE Transactions on Signal Processing, vol. 47, no. 2, pp. tography that resists the advent of Quantum Comput- Authenticated Trust Establishment, IEEE Trans. on Mobile
480-492, February 1999.
Computing 9:12(2010), pp. 1666-1681 (SCI). Invited as Best
solve the bit allocation problems for scalable video co- ers. My team is a world leader in the research in MPKCs Paper at MobiSys 2009.
decs. With regard to the single channel signal separation 6. Wen-Liang Hwang and Stephane Mallat, “Characterization (Multivariate Public-Key Cryptosystems). We have pro-
problem, he develops an operator-based approach that of Self-Similar Multifractals with Wavelet Maxima,” Applied posed several analysis and improvements in the design 6. J. Ding and *B.-Y. Yang, On Multivariate Cryptosystems,
of such primitives and generally advanced the under-
can successfully extract local narrow band signals. and Computational Harmonic Analysis, vol. 1, no. 4, pp.316- chapter in Post-Quantum Cryptography, pp. 193-241, D. J.
328, September 1994. standing of the eld in both theoretical and practical Bernstein, J. Buchmann and E. Dahmen, eds., Springer 2009,
Recently, Dr. Hwang is interested in structure derivation viewpoints, including oninstances of EIP (Extended Iso- ISBN: 978-3-540-88701-0.
techniques include: (1) extracting 3D structural informa- 7. Ming-Shing Su, Wen-Liang Hwang, and Kuo-Yourn Cheng, morphism of Polynomials) and Multivariate Quadratic 7. A. I.-T. Chen, M.-S. Chen, T.-R. Chen, C.-M. Cheng, J. Ding,
“Analysis on Multiresolution Mosaic Images,” IEEE Transac-
tion from a monocular image; and (2) obtaining the 3D tions on Image Processing, vol. 13, no. 7, pp. 952-959, July problems. MPKCs are faster at comparable design secu- E. L.-H. Kuo, F. Y.-S. Lee, and *B.-Y. Yang, SSE Implementa-
structure from multiple images of the same scene. The 2004. rity because they operate on a vector of variables over tion of Multivariate PKCs on Modern x86 CPUs, CHES 2009,
rst approach is motived by the needs to derive 3D struc- a small eld which facilitates use in embedded systems pp. 33-48, LNCS 5747.
ture from the large amount of existing images captured by 8. Jian-Liang Lin and Wen-Liang Hwang, “Efficient Scalable and smart cards.
conventional camera. The second approach is motivated Video Coding Based on Matching Pursuits,” Edited by S. 3. Algebraic Cryptanalysis: We have made practical ad- 8. D. J. Bernstein, T.-R. Chen, *C.-M. Cheng, T. Lange, and B.-
Radhakrishnan, InTech - Open Access Publisher, April 2011.
Y. Yang, ECM on Video Cards, Eurocrypt 2009, LNCS 5479,
by the requirement in biological applications that the 3D vances to system-solving, which is the key step behind pp. 483-501.
structure of a biological sample must be reconstructed 9. Jengnan Tzeng, Wen-Liang Hwang, and I-Liang Chern, “An algebraic cryptanalysis. In particular we have estab-
from images taken at the same view angle. Dr. Hwang Asymmetric Subspace Watermarking Method for Copyright lished practical and asymptotic bounds for methods 9. C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. McCune, A.
also interests in developing applications by using sparse Protection,” IEEE Transactions on Signal Processing Supple- including Gröbner Bases algorithms and the related XL Perrig, *A. Studer, and B.-Y. Yang, GAnGS: Gather, Authen-
representation and compressive sensing. He is using the ment on Secure Media (Special Issue), vol. 53, no. 2, pp. 784- (eXtended Linearization) method. These have led to re- ticate ‘n Group Securely, Proc. MobiCom 2008, pp. 92-103.
approaches as well as the operator-based approach for 792, February 2005. vised estimates for many “provable security” results. 10. J. Ding, V. Dubois, *B.-Y. Yang, C.-H. O. Chen, and C.-M.
problems induced by multi-channels data collection and 10. Silong Peng and Wen-Liang Hwang, “Adaptive Signal De- 4. Other Algorithmic and Combinatorial Studies: I work on Cheng. Can SFLASH be Repaired?, ICALP 2008, LNCS
processing. composition Based on Local Narrow Band Signal”, IEEE many other combinatorial problems especially those 5126, pp. 691-701.
Transactions on Signal Processing, vol. 56, no. 7, pp. 2669- dealing with enumeration and analysis of algorithms 11. *B.-Y. Yang, C.-H. O. Chen, D. J. Bernstein, and J.-M. Chen,
2676, July 2008. that deals with iterative or recursive structures that Analysis of QUAD, FSE 2007, LNCS 4593, pp. 290-307.
can be handled by standard combinatorial methods, or
those that handle cryptography.
研究人員
80 Research Faculty
81