首页| English| 中国科学院
当前位置:首页>讨论班

信息安全的数学理论-张志芳 邓映蒲 冯秀涛 潘彦斌 刘卓军

副标题:

时间:2014-10-09  来源:数学机械化重点实验室

团队介绍

研究团队—“信息安全的数学理论”成立于2002年,由中国科学院研究基金支持,依托于中科院数学与系统科学研究院数学机械化重点实验室。团队致力于信息安全及相关领域(包括密码,编码,网络空间安全等)的数学理论研究,重点解决公钥密码,对称密码,差错控制编码中的关键数学问题。

团队成员

邓映蒲 研究员

张志芳 研究员

刘卓军 研究员

冯秀涛 副研究员

潘彦斌 副研究员

研究方向

公钥密码,对称密码,差错控制编码,计算数论

发表论文

[1]    Yanbin Pan, Jun Xu, Nick Wadleigh, Qi ChengOn the ideal shortest vector problem over random rational primes. In Proc. of Eurocrypt 2021, Part I, LNCS 12696, 559–583, 2021.

[2]    Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai DingA Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. In Proc. of Asiacrypt 2021, Part IV, LNCS 13093, pp. 92–121, 2021.

[3]    Yaqian Zhang, Zhifang Zhang, Scalar MSCR Codes via the Product Matrix Construction, IEEE Trans. Inf. Theory 66(2), 995-1006 (2020).

[4]    Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan: New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. In Proc. of Crypto 2019. Springer, LNCS 11692, 297-321, 2019.

[5]    Anyu Wang, Zhifang Zhang, Dongdai Lin, Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach. IEEE Trans. Inf. Theory 65(7): 4167-4179 (2019).

[6]    Zhifang Zhang, Jingke Xu, The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes with Colluding Servers. IEEE Trans. Inf. Theory 65(5) : 2723-2735, (2019).

[7]    Shihui Fu, Xiutao Feng, Qiang Wang, Claude Carlet: On the Derivative Imbalance and Ambiguity of Functions. IEEE Trans. Information Theory 65(9): 5833-5845 (2019)

[8]    Guanju Xiao, Lixia Luo, Yingpu Deng, Constructing cycles in isogeny graphs of supersingular elliptic curves, Journal of Mathematical Cryptology, 2021.

[9]    Lixia Luo, Guanju Xiao, Yingpu Deng, On Two Problems About Isogenies of Elliptic Curves Over Finite Fields, Communications in Mathematical Research, 2020.

[10] Shihui Fu, Xiutao Feng, Involutory differentially 4-uniform permutations from known constructions. Des. Codes Cryptogr. 87(1): 31-56 (2019)

[11]  Dandan Huang, Yingpu Deng, An algorithm for computing the factor ring of an ideal in a Dedekind domain with finite rank, Science China. Mathematics, 2018.

[12] Chang Lv, Junchao Shentu, Yingpu Deng, On the integral representation of binary quadratic forms and the Artin condition, Tokyo Journal of Mathematics, 2018.

[13] Wang LiBo, Wu BaoFeng, Liu ZhuoJun, Lin DongDai, Three new infinite families of bent functions, SCIENCE CHINA Information Sciences 61(3) (2018) 032104:1 – 032104:14.

[14] Jiangshuai Yang, Yingpu Deng, Combinatorial Sums $\sum_{k\equiv r(\mbox{mod }m)}{n\choose k}a^k$ and Lucas Quotients (II), Journal of Combinatorics and Number Theory, 2018.

[15] Jingke Xu, Zhifang Zhang, On sub-packetization and access number of capacity-achievingPIR schemes for MDS coded non-colluding servers. SCIENCE CHINA Information Sciences 61(10), 100306, (2018).

[16] Zhuosheng Lin, Simin Yu, Xiutao Feng, Jinhu Lü: Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme. I. J. Bifurcation and Chaos 28(7): 1850086 (2018).

[17] Shihui Fu, Xiutao Feng, Baofeng Wu: Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. IACR Trans. Symmetric Cryptol. 2017(2): 228-249 (2017).

[18] Anyu Wang, Zhifang Zhang, An Integer Programming-Based Bound for Locally Repairable Codes. IEEE Trans. Inf. Theory 61(10): 5280-5294 (2015).

[19] Anyu Wang, Zhifang Zhang, Repair Locality With Multiple Erasure Tolerance. IEEE Trans. Inf. Theory 60(11): 6979-6987 (2014).

[20] Zhifang Zhang, Mulan Liu, Rational secret sharing as extensive games. SCIENCE CHINA Information Sciences 56(3): 1-13 (2013).

[21] Anyu Wang, Zhifang Zhang, Exact Cooperative Regenerating Codes with Minimum Repair-Bandwidth for Distributed Storage, INFOCOM 2013.

[22] Feng Zhang, Yanbin Pan, Gengran Hu: A Three-Level Sieve Algorithm for the Shortest Vector Problem. In Proc. of SAC 2013. Springer, LNCS vol. 8282, pp. 29 - 47, 2013.

相关附件
相关文档