常金勇
近期热点
资料介绍
个人简历
教育背景:2016.4-2018.3北京大学数学科学学院,博士后2012.9-2016.1中国科学院信息工程研究所,信息安全国家重点实验室,博士2006.9-2009.6首都师范大学数学科学学院,硕士2000.9-2004.7山西大学数学科学学院,学士。研究领域
信息安全,密码学近期论文
[1]JinyongChang,YanyanJi,MaozhiXu,RuiXue,GeneralTransformationsfromSingle-GenerationtoMulti-GenerationforHomomorphicMessageAuthenticationSchemesinNetworkCoding,FutureGenerationComputerSystems,vol.91,pp.416-425,2019.(SCI二区,IF:5.768)[2]JinyongChang,HuiMa,AnlingZhang,MaozhiXu,RKASecurityofIdentity-BasedHomomorphicSignatureScheme,IEEEACCESS,vol.7,pp.50858-50868,2019.(SCI二区,IF:4.098)[3]JinyongChang,BilinShao,AnlingZhang,GenqingBian,YanyanJi,MaozhiXu,SecurityAnalysisofanEffieicientMullSpace-BasedHomomorphicMACSchemeagainstTagPollutionAttacksinRLNC,IEEEACCESS,vol.7,pp.88393-88398,2019.(SCI二区,IF:4.098)[4]YuChen,JiangZhang,YiDeng,JinyongChang,KDMSecurityforIdentity-BasedEncryption:ConstructionsandSeparations,InformationSciences,2019.(SCI二区,IF:5.5)[5]JinyongChang,YanyanJi,MaozhiXu,OntheKDM-CCASecurityfromPartialTrapdoorOne-WayFamilyintheRandomOracleModel.TheComputerJournal,2019.(SCI,EI,CCFB类)[6]YingWu,JinyongChang*,RuiXue,RuiZhang,HomomorphicMACfromAlgebraicOne-WayFunctionsforNetworkCodingwithSmallKeySize,TheComputerJournal.Vol.60(12),pp.1785-1800,2017.(SCI,EI,CCFB类)[7]JinyongChang,HonglongDai,andMaozhiXu,TheKDM-CCASecurityofREACT,ISPEC2017,LNCS10701,pp.85-101,2017(EI).[8]JinyongChang,HonglongDai,MaozhiXuandRuiXue,SeparationsinCircularSecurityforArbitraryLengthKeyCycles-theCCACase.SecurityandCommunicationNetworks.Vol.9(18),2016.(SCI,EI)[9]JinyongChang,HonglongDai,MaozhiXuandRuiXue,HomomorphicNetworkCodingSignatureSchemesagainstRelated-KeyAttackintheRandomOracle.The19thAnnualInternationalConferenceonInformationSecurityandCryptology(ICISC-2016),LNCS10157,pp.239-253,2017.(EI).[10]JinyongChang,HonglongDai,MaozhiXuandRuiXue,SecurityAnalysisofaTESLA-BasedHomomorphicMACSchemesforAuthenticationinP2PLiveStreamingSystem.SecurityandCommunicationNetworks,Vol.9(16),pp.3309-3313,Nov.2016.(SCI,EI)[11]JinyongChangandRuiXue,PracticalKey-DependentMessageChosen-CiphertextSecurityBasedonDecisionalCompositeResiduosityandQuadraticResiduosityAssumptions.SecurityandCommunicationNetworks,Vol.8(8),pp.1525-1536,May,2015.(SCI,EI)[12]JinyongChangandRuiXue,TheKDM-CCASecurityoftheKurosawa-DesmedtScheme.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98-A,No.4,pp.1032-1037,April,2015.(SCI,EI)[13]JinyongChangandRuiXue,AGenericConstructionofHomomorphicMACforMulti-FileTransmissioninNetworkCoding.JournalofCommunications.Vol.10(1),pp.43-47,January,2015.(EI)[14]HonglongDai,DingWang,JinyongChang,andMazhiXu,OntheRCCASecurityofHybridSigncryptionforInternetofThings.WirelessCommunicationsandMobileComputing,2018.(SCI三区)[15]HonglongDai,JinyongChang,ZhenduoHou,andMaozhiXu,RelaxingEnhancedChosen-CiphertextSecurity,IEICETrans.Fund.Vol.E101-A,2018.(SCI,EI)[16]YanyanJi,JinyongChang,HonglongDai,andMaozhiXu,OntheRKASecurityoftheStandard-Model-BasedBFKWNetworkCodingSignatureScheme,IEICETrans.Fund.Vol.E101-A,2018.(SCI,EI)[17]YuChen,JiangZhang,YiDeng,andJinyongChang,KDMSecurityforIdentity-BasedEncryption.InformationSciences,accepted(SCI).[18]HonglongDai,Luxuan,Zhang,YanyanJi,JinyongChang,andMaozhiXu,OntheKeyDependentMessageSecurityofDHIES,ICAIT2017,pp.322-328.(EI)[19]HonglongDai,JinyongChang,ZhenduoHou,andMaozhiXu,TheECCASecurityofHybridEncryptions,SocialSec2017,pp.847-859.(EI)[20]YuChen,JiangZhang,YiDeng,andJinyongChang,KDMSecurityforIdentity-BasedEncryption:ConstructionsandSeparations.IACRCryptologyePrintArchive2016:1020.[21]BeiLiang,HongdaLiandJinyongChang,ConstrainedVerfiableRandomFunctionsfromIndistinguishabilityObfuscation.ProvSec2015.(EI)[22]BeiLiang,HongdaLiandJinyongChang,TheGenericConstructionofAdaptivelySecureIdentity-BasedAggregateSignaturesintheRandomOracleModelfromStandardSignatures.CANS2015.(EI)[23]BeiLiang,HongdaLiandJinyongChang,TheGenericTransformationfromStandardSignaturestoIdentity-BasedAggregateSignatures.ISC2015.(EI)[24]HaidongLiu,ZhaoliLiuandJinyongChang,ExistenceandUniquenessofPositiveSolutionsofNonlinearSchrodingerSystems.ProceedingsoftheRoyalSocietyofEdinburgh,145A,365-390,2015.(SCI)[25]FeiTang,HongdaLiandJinyongChang,Multi-UseUnidirectionalProxyRe-SignaturesofConstantSizeWithoutRandomOracles.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98-A,No.3,pp.898-905,2015.(SCI,EI)[26]FeiTang,HongdaLiandJinyongChang,Multi-HopUnidirectionalProxyRe-EncryptionfromMultilinearMaps.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98-A,No.2,pp.762-766,2015.(SCI,EI)[27]JinyongChangandRuiXue,KDM-CCASecurityoftheCramer-ShoupCryptosystem,Revisited.In11thInternationalConferenceonSecurityandCryptography,SECRYPT2014,pp.299-306,Vienna,Austria.(EI)[28]JinyongChangandRuiXue,OntheSecurityagainstNonadaptiveChosenCiphertextAttackandKey-DependentMessageAttack.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E97-A,No.11,pp.2267-2271,November,2014.(SCI,EI)[29]MeihuaWei,JinyongChangandLanQi,ExistenceandStatilityofPositiveSteady-StateSolutionsforaLotka-VolterraSystemwithIntraspecificCompetition.AdvancesinDifferenceEquations.May30,2014.(SCI)[30]JinyongChangandRuiXue,GeneralConstructionofChameleonAll-But-OneTrapdoorFunctionsandTheirApplications.JournalofSoftware.Vol.9(10),pp.2557-2563,October,2014.[31]常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性.密码学报,1(3):235-243,2014.(CSCD)[32]JinyongChang,NoteonGroundStatesofaNonlinearSchrodingerSystem.JournalofMathematicalAnalysisandApplications.381(2),pp.957-962,September,2011.(SCI二区)[33]JinyongChangandZhaoliLiu,GroundStatesofNonlinearSchrodingerSystems.ProceedingsoftheAmericanMathematicsSociety.138(2),pp.687-693,Feb.2010.(SCI三区)1.2014年至今,担任EI检索期刊《计算机研究与发展》审稿人。2.2015年11月至今,担任中国保密协会隐私保护专委会会员。3.2019年起,担任SCI期刊TheComputerJournal(CCFB类)审稿人。4.担任MobiSec2019国际会议PC. 相关热点
最新收录
- 武藤彩香(武藤あやか Ay 06-20
- 袁嘉敏 06-20
- 黄子佼 06-19
- 黄子佼 06-19
- 唐家三少 06-19
- 广末凉子 06-19
- 広末凉子(广末凉子 , Ryo 06-19
- 简恺乐(蝴蝶姐姐) 06-19
- 周扬青 06-19
- 东条夏( 東條なつ Tojo Na 06-17