近期论文
查看导师最新文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
[1]JinyongChang,YanyanJi,MaozhiXu,RuiXue,GeneralTransformationsfromSingle-GenerationtoMulti-GenerationforHomomorphicMessageAuthenticationSchemesinNetworkCoding,FutureGenerationComputerSystems,vol.91,pp.416-425,2019.(SCI二区,IF:5.768)
[2]JinyongChang,HuiMa,AnlingZhang,MaozhiXu,RKASecurityofIdentity-BasedHomomorphicSignatureScheme,IEEEACCESS,vol.7,pp.50858-50868,2019.(SCI二区,IF:4.098)
[3]JinyongChang,BilinShao,AnlingZhang,GenqingBian,YanyanJi,MaozhiXu,SecurityAnalysisofanEffieicientMullSpace-BasedHomomorphicMACSchemeagainstTagPollutionAttacksinRLNC,IEEEACCESS,vol.7,pp.88393-88398,2019.(SCI二区,IF:4.098)
[4]YuChen,JiangZhang,YiDeng,JinyongChang,KDMSecurityforIdentity-BasedEncryption:ConstructionsandSeparations,InformationSciences,2019.(SCI二区,IF:5.5)
[5]JinyongChang,YanyanJi,MaozhiXu,OntheKDM-CCASecurityfromPartialTrapdoorOne-WayFamilyintheRandomOracleModel.TheComputerJournal,2019.(SCI,EI,CCFB类)
[6]YingWu,JinyongChang*,RuiXue,RuiZhang,HomomorphicMACfromAlgebraicOne-WayFunctionsforNetworkCodingwithSmallKeySize,TheComputerJournal.Vol.60(12),pp.1785-1800,2017.(SCI,EI,CCFB类)
[7]JinyongChang,HonglongDai,andMaozhiXu,TheKDM-CCASecurityofREACT,ISPEC2017,LNCS10701,pp.85-101,2017(EI).
[8]JinyongChang,HonglongDai,MaozhiXuandRuiXue,SeparationsinCircularSecurityforArbitraryLengthKeyCycles-theCCACase.SecurityandCommunicationNetworks.Vol.9(18),2016.(SCI,EI)
[9]JinyongChang,HonglongDai,MaozhiXuandRuiXue,HomomorphicNetworkCodingSignatureSchemesagainstRelated-KeyAttackintheRandomOracle.The19thAnnualInternationalConferenceonInformationSecurityandCryptology(ICISC-2016),LNCS10157,pp.239-253,2017.(EI).
[10]JinyongChang,HonglongDai,MaozhiXuandRuiXue,SecurityAnalysisofaTESLA-BasedHomomorphicMACSchemesforAuthenticationinP2PLiveStreamingSystem.SecurityandCommunicationNetworks,Vol.9(16),pp.3309-3313,Nov.2016.(SCI,EI)
[11]JinyongChangandRuiXue,PracticalKey-DependentMessageChosen-CiphertextSecurityBasedonDecisionalCompositeResiduosityandQuadraticResiduosityAssumptions.SecurityandCommunicationNetworks,Vol.8(8),pp.1525-1536,May,2015.(SCI,EI)
[12]JinyongChangandRuiXue,TheKDM-CCASecurityoftheKurosawa-DesmedtScheme.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98-A,No.4,pp.1032-1037,April,2015.(SCI,EI)
[13]JinyongChangandRuiXue,AGenericConstructionofHomomorphicMACforMulti-FileTransmissioninNetworkCoding.JournalofCommunications.Vol.10(1),pp.43-47,January,2015.(EI)
[14]HonglongDai,DingWang,JinyongChang,andMazhiXu,OntheRCCASecurityofHybridSigncryptionforInternetofThings.WirelessCommunicationsandMobileComputing,2018.(SCI三区)
[15]HonglongDai,JinyongChang,ZhenduoHou,andMaozhiXu,RelaxingEnhancedChosen-CiphertextSecurity,IEICETrans.Fund.Vol.E101-A,2018.(SCI,EI)
[16]YanyanJi,JinyongChang,HonglongDai,andMaozhiXu,OntheRKASecurityoftheStandard-Model-BasedBFKWNetworkCodingSignatureScheme,IEICETrans.Fund.Vol.E101-A,2018.(SCI,EI)
[17]YuChen,JiangZhang,YiDeng,andJinyongChang,KDMSecurityforIdentity-BasedEncryption.InformationSciences,accepted(SCI).
[18]HonglongDai,Luxuan,Zhang,YanyanJi,JinyongChang,andMaozhiXu,OntheKeyDependentMessageSecurityofDHIES,ICAIT2017,pp.322-328.(EI)
[19]HonglongDai,JinyongChang,ZhenduoHou,andMaozhiXu,TheECCASecurityofHybridEncryptions,SocialSec2017,pp.847-859.(EI)
[20]YuChen,JiangZhang,YiDeng,andJinyongChang,KDMSecurityforIdentity-BasedEncryption:ConstructionsandSeparations.IACRCryptologyePrintArchive2016:1020.
[21]BeiLiang,HongdaLiandJinyongChang,ConstrainedVerfiableRandomFunctionsfromIndistinguishabilityObfuscation.ProvSec2015.(EI)
[22]BeiLiang,HongdaLiandJinyongChang,TheGenericConstructionofAdaptivelySecureIdentity-BasedAggregateSignaturesintheRandomOracleModelfromStandardSignatures.CANS2015.(EI)
[23]BeiLiang,HongdaLiandJinyongChang,TheGenericTransformationfromStandardSignaturestoIdentity-BasedAggregateSignatures.ISC2015.(EI)
[24]HaidongLiu,ZhaoliLiuandJinyongChang,ExistenceandUniquenessofPositiveSolutionsofNonlinearSchrodingerSystems.ProceedingsoftheRoyalSocietyofEdinburgh,145A,365-390,2015.(SCI)
[25]FeiTang,HongdaLiandJinyongChang,Multi-UseUnidirectionalProxyRe-SignaturesofConstantSizeWithoutRandomOracles.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98-A,No.3,pp.898-905,2015.(SCI,EI)
[26]FeiTang,HongdaLiandJinyongChang,Multi-HopUnidirectionalProxyRe-EncryptionfromMultilinearMaps.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98-A,No.2,pp.762-766,2015.(SCI,EI)
[27]JinyongChangandRuiXue,KDM-CCASecurityoftheCramer-ShoupCryptosystem,Revisited.In11thInternationalConferenceonSecurityandCryptography,SECRYPT2014,pp.299-306,Vienna,Austria.(EI)
[28]JinyongChangandRuiXue,OntheSecurityagainstNonadaptiveChosenCiphertextAttackandKey-DependentMessageAttack.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E97-A,No.11,pp.2267-2271,November,2014.(SCI,EI)
[29]MeihuaWei,JinyongChangandLanQi,ExistenceandStatilityofPositiveSteady-StateSolutionsforaLotka-VolterraSystemwithIntraspecificCompetition.AdvancesinDifferenceEquations.May30,2014.(SCI)
[30]JinyongChangandRuiXue,GeneralConstructionofChameleonAll-But-OneTrapdoorFunctionsandTheirApplications.JournalofSoftware.Vol.9(10),pp.2557-2563,October,2014.
[31]常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性.密码学报,1(3):235-243,2014.(CSCD)
[32]JinyongChang,NoteonGroundStatesofaNonlinearSchrodingerSystem.JournalofMathematicalAnalysisandApplications.381(2),pp.957-962,September,2011.(SCI二区)
[33]JinyongChangandZhaoliLiu,GroundStatesofNonlinearSchrodingerSystems.ProceedingsoftheAmericanMathematicsSociety.138(2),pp.687-693,Feb.2010.(SCI三区)