个人简介
招生专业
083900-网络空间安全
招生方向
可证明安全公钥密码理论与应用,椭圆曲线密码学
教育背景
1995-03--1998-03西安电子科技大学工学博士
1986-09--1989-06兰州大学数学系理学硕士
1978-02--1981-12兰州大学数学系理学学士
工作简历
2011-12~现在,中科院信息工程研究所,科研、教学
2000-12~2011-12,中科院信息安全国家重点实验室,科研及教学
1998-04~2000-08,中科院软件所,博士后
1995-03~1998-03,西安电子科技大学,工学博士
1986-09~1989-06,兰州大学数学系,理学硕士
1978-02~1981-12,兰州大学数学系,理学学士
教授课程
椭圆曲线密码学
有限域的进一步讨论与应用
代数学基础与有限域
计算中的随机化方法
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
发表论文
(1)SpeedingupScalarMultiplicationonKoblitzCurvesUsing\mu_4Coordinates,ACISP2019,2019-07,第3作者
(2)ConstructingHyperellipticCoversforEllipticCurvesoverQuadraticExtensionFields,ACISP2019,2019-07,第3作者
(3)(Identity-based)dualreceiverencryptionfromlattice-basedprogrammablehashfunctionswithhighmin-entropy,Cybersecurity,2019-06,第4作者
(4)EfficientLeveled(Multi)Identity-BasedFullyHomomorphicEncryptionSchemes,IEEEAccess,2019-06,第5作者
(5)DeterministicIdentity-BasedEncryptionfromLattice-BasedProgrammableHashFunctionswithHighMin-Entropy,SecurityandCommunicationNetworks2019,2019-01,第3作者
(6)Preprocess-then-NTTTechniqueandItsApplicationstoKYBERandNEWHOPE,Inscrypt2018,2018-12,第6作者
(7)UnderstandingandConstructingAKEviaDouble-KeyKeyEncapsulationMechanism,AdvancesinCryptology–ASIACRYPT2018,2018-10,第3作者
(8)Coverattacksforellipticcurveswithcofactortwo.,Des.CodesCryptography86(11),2018,第2作者
(9)Lattice-BasedDualReceiverEncryptionandMore.,ACISP2018,2018,第3作者
(10)ConstructionsSecureagainstReceiverSelectiveOpeningandChosenCiphertextAttacks,CT-RSA2017,2017,第3作者
(11)KDMandSelectiveOpeningSecureIBEbasedontheLWEproblem,APKC2017,2017,第2作者
(12)NewFrameworkofPassword-BasedAuthenticatedKeyExchangefromOnly-OneLossyEncryption,ProvSec2017,2017,第2作者
(13)DeterministicIdentity-BasedEncryptionfromLatticeswithMoreCompactPublicParameters,IWSEC2017,2017,第3作者
(14)Dual-ModeCryptosystemBasedontheLearningwithErrorsProblem,ACISP(2)2017,2017,第3作者
(15)IND-PCASecureKEMIsEnoughforPassword-BasedAuthenticatedKeyExchange,IWSEC2017,2017,第2作者
(16)LossyKeyEncapsulationMechanismandItsApplications.,ICISC2016,2016,第3作者
(17)Approximate-DeterministicPublicKeyEncryptionfromHardLearningProblems,INDOCRYPT2016,,2016,第3作者
(18)(Deterministic)HierarchicalIdentity-basedEncryptionfromLearningwithRoundingoverSmallModulus,AsiaCCS2016,2016,第2作者
(19)Leakage-ResilientIND-CCAKEMfromtheExtractableHashProofswithIndistinguishabilityObfuscation,Inscrypt2016.,2016,第3作者
(20)ReceiverSelectiveOpeningSecurityfromIndistinguishabilityObfuscation,INDOCRYPT2016,2016,第3作者
(21)KDM-CCASecurityfromRKASecureAuthenticatedEncryption,Eurocrypt2015,2015,第2作者
(22)CryptanalysisofReduced-RoundWhirlwind,ACISP2015,2015,第2作者
(23)Improved(Pseudo)PreimageAttacksonReduced-RoundGOSTandGr?stl-256andStudiesonSeveralTruncationPatternsforAES-likeCompressionFunctions,IWSEC2015,2015,第2作者
(24)ModelsofCurvesfromGHSAttackinOddCharacteristics,ISPEC2015,2015,第3作者
(25)SomeEllipticSubcoversofGenus3Hyperellipticcurves,ISPEC2015,2015,第3作者
(26)AlgebraicFaultAttackontheSHA-256CompressionFunction,InternationalJournalofResearchinComputerScience,2014,第2作者
(27)ImprovedPreimageAttacksagainstReducedHAS-160,ISPEC2014,2014,第2作者
(28)对GOST和Whirlpool杂凑函数的改进分析,ImprovedCryptanalysisonReduced-RoundGOSTandWhirlpoolHashFunction,ACNS2014,2014,第2作者
(29)关于Diem的证明的一点注记,NSCRYPT2014,2014,第2作者
(30)OntheLossinessof2k-thPowerandtheInstantiabilityofRabin-OAEP,CANS2014,2014,第3作者
(31)LossyTrapdoorRelationandItsApplicationstoLossyEncryptionandAdaptiveTrapdoorRelation,ProvSec2014,2014,第3作者
(32)对HTBC杂凑函数的碰撞和第二原像攻击,计算机研究与发展,2014,第2作者
(33)混合加密方案的RKA安全性,ISC2014,2014,第2作者
(34)基于哈希证明系统的RKA安全公钥加密,IWSEC2014,2014,第2作者
(35)ImprovingtheMessage-CiphertextRateofLewko’sFullySecureIBEScheme,ImprovingtheMessage-CiphertextRateofLewko’sFullySecureIBEScheme,ISPEC2013,LNCS7863,2013,第2作者
(36)HowtoRemovetheExponentGCDinHK09,HowtoRemovetheExponentGCDinHK09,ProvSec2013,2013,第2作者
(37)EfficientLossyTrapdoorFunctionsBasedonSubgroupMembershipAssumptions,EfficientLossyTrapdoorFunctionsBasedonSubgroupMembershipAssumptions,CANS2013,2013,第2作者
(38)FirstMultidimensionalCryptanalysisonReduced-roundPRINCEcore,FirstMultidimensionalCryptanalysisonReduced-roundPRINCEcore,ICISC2013,2013,第2作者
(39)Improvedefficiencyofchosenciphertextsecureencryptionfromfactoring,Improvedefficiencyofchosenciphertextsecureencryptionfromfactoring,ISPEC2012,LNCS7232,2012,第2作者
(40)Non-malleableinstance-dependentcommitmentinthestandardmodel,Non-malleableinstance-dependentcommitmentinthestandardmodel,ACISP2012,LNCS7372,2012,第3作者
(41)EfficientCCA-SecureCDHBasedKEMBalancedbetweenCiphertextandKey,EfficientCCA-SecureCDHBasedKEMBalancedbetweenCiphertextandKey,ACISP,2011,第2作者
(42)因子分解假设的复合模广义迪菲赫尔曼问题的伪随机提取,Pseudo-randomnessExtractionforGeneralizedDiffie-HellmanProblemoverCompositeModulusunderFactoringAssumption,计算机学报,2011,第2作者
(43)ChosenCiphertextSecureEncryptionunderFactoringAssumptionRevisited,ChosenCiphertextSecureEncryptionunderFactoringAssumptionRevisited,PublicKeyCryptography2011:210-227.LNCS6571,2011,第2作者
(44)可否认群密钥协商协议的一般化构造方式,Genericconstructionofdeniablegroupkeyestablishmentfromgroupkeyestablishment,通信学报,Vol.32No.3,pp.143-149,March,2011,2011,第3作者
(45)ANewEfficientConstructionforNon-MalleableZero-KnowledgeSets,ANewEfficientConstructionforNon-MalleableZero-KnowledgeSets,WISA2010,LNCS6513,pp.31–43,2011.Springer-VerlagBerlinHeidelberg2011,2011,第3作者
(46)EncryptionSimulatabilityReconsidered,EncryptionSimulatabilityReconsidered,ISPEC2011,LNCS6672,pp.14-23,Springer-VerlagBerlinHeidelberg,2011,第2作者
(47)ADeniableGroupKeyEstablishmentProtocolintheStandardModel,ADeniableGroupKeyEstablishmentProtocolintheStandardModel,ISPEC2010,LNCS6047,pp.308–323,2010.Springer-VerlagBerlinHeidelberg,2010,第3作者
(48)Onconstant-roundzero-knowledgeproofsofknowledgeforNP-relation,Onconstant-roundzero-knowledgeproofsofknowledgeforNP-relation,SCIENCECHINAInformationSciences,April2010,Vol.53,No.4:788–799,2010,第3作者
(49)PA1andIND-CCA2DoNotGuaranteePA2:BriefExamples,PA1andIND-CCA2DoNotGuaranteePA2:BriefExamples,IWSEC2010,LNCS6434,pp.40-54,Springer-VerlagBerlinHeidelberg,2010,第2作者
(50)InstantiateRandomOraclesinOAEPwithPseudorandomFunctions,WuhanUniversityJournalofNaturalSciences,2008,(51)特征3有限域上椭圆曲线的Montgomery算法,通讯学报,2008,(52)公平的知识签名,武汉大学学报,2008,(53)标准模型下可否认的群密钥协商协议,武汉大学学报,2008,
发表著作
(1)信安全息中的数学方法与技术,清华大学出版社,2009-10