科研工作
首页 >> 科研工作 >> 研究所 >> 正文

代数与密码学研究所

发布日期:2018/01/12    点击:

一、研究所简介

代数与密码学研究所现有成员7人,其中教授2人,副教授3人,都具有博士学位。主要研究有限群结构、代数表示理论、非经典逻辑代数、混沌密码学以及密码协议。针对共轭类长对有限群结构的影响、基于量子逻辑门的操作产生的量子计算逻辑及其代数结构、基于混沌理论的密码方案设计与分析、基于多因子的远程身份认证协议及其安全性理论进行研究,取得一系列科研成果。

目前在《Journal of Algebra,Computers & Electrical Engineering》,《Soft Computing》,《Applied Mathematics and Computation,《Optics and Lasers in Engineering,《Signal Processing以及《中国科学:数学(英文版)》,《数学年刊》,《通信学报》等期刊发表SCI/EI收录论文100余篇。主持国家自然科学基金6项,山东省自然科学基金6项。获山东省高校优秀科研成果奖三等奖3项,山东省高等学校科学技术奖三等奖1项。

二、研究所负责人简介

温凤桐,男,博士、教授、硕士生导师,获59599aa美高梅|NO.1 - 百度百科优秀教师、59599aa美高梅|NO.1 - 百度百科优秀班主任等荣誉称号。主要从事密码协议理论方面的研究,主持山东省自然科学基金三项,获山东省高等学校优秀科研成果奖三等奖两项,在《Computers and Electrical Engineering》,《Wireless Personal Communications》,《Security and Communication Networks》,《Multimedia Tools and Applications》,《Soft Computing》等国内外期刊发表高水平学术论文40余篇,SCI论文引用超过210次。培养硕士研究生10余名。

三、主要成员

姓名

学位

专业技术职务

研究方向

陈文娟

博士

教授

非经典逻辑代数,模糊代数

刘红军

博士

副教授

混沌密码学和后量子密码学

邵长国

博士

副教授

有限群及表示

吕洪波

博士

副教授

表示论

蒋琴会

博士

副教授

有限群论研究

徐承波

博士

讲师

密码协议

四、研究方向介绍

1.有限群及代数表示论

2.非经典逻辑代数,模糊代数

3.密码协议

4.混沌理论、混沌密码学

五、承担科研项目与获奖

项目、获奖名称

类别

获得时间

承担人

经费、等级

有限群的共轭类和有限群的结构

国家自然科学基金面上项目

2021.01-2024.12

邵长国

52

共轭类长的数量性质与群结构的研究

国家自然科学基金

201401-201612

蒋琴会

23

遗传代数的高维推广和高维丛倾斜

国家自然科学基金

201401-201612

吕洪波

22

基于量子逻辑门的代数系统的结构研究

国家自然科学基金

201601-201812

陈文娟

18

直觉模糊子双代数集合的代数结构研究

国家自然科学基金

201201-201212

陈文娟

3

复代数的倾斜理论及其在丛倾斜理论中的应用

国家自然科学基金

201201-201212

吕洪波

3

多因子远程认证协议的设计与分析

山东省自然科学基金

201310-201610

温凤桐

8

重复代数的同调性质和高维丛范畴

山东省自然科学基金

201112-201412

吕洪波

3

元素的共轭类长对有限群及正规子群的结构的影响

山东省自然科学基金

2019.7-2022.6

蒋琴会

14

部分元素的共轭类长对有限群及其正规子群结构的影响

山东省自然科学基金

201407-201707

邵长国

13

基于车载自组网络认证协议的研究

山东省自然科学基金

2018.4-2020.12

温凤桐

5

Atanassov直觉模糊集的对偶及其应用

山东省优秀中青年科学家奖励基金

201107-201407

陈文娟

5

多因子远程认证协议的研究

山东省高等学校科学技术奖

2016

温凤桐

三等

部分元素的共轭类长的数量性质对群结构的影响

山东高等学校优秀科研成果奖

2015

邵长国

三等

直觉模糊子双代数集合的结构研究

山东高等学校优秀科研成果奖

2013

陈文娟

三等

信息传输中的若干安全问题研究

山东高等学校优秀科研成果奖

2011

温凤桐

三等

六、代表性科研论文

1. Antonio Beltran, Changguo shao, On the number of invariant Sylow subgroups under coprime action, Journal of algebra, 2017, doi:dx.doi.org/10.1016/j.jalgebra.2017.07.005

2. Cahngguo Shao and Qinhui Jiang, On normal subgroups with consecutive G-class sizeJournal of Algebra and Its Applications, 2016, 15(8), page 8.

3. Changguo Shao, A.Beltran,Coprime action and arithmetical conditions on invariant conjugacy classes, SCIENCE CHINA Mathematics,2015, 58(12): 2499-2504.

4. A.Beltrán,M.J.Felipe andChangguo Shao, Class sizes of prime-power order p’-elements and normal subgroups, Annali di Matematica, (4) 194 (2015), no. 5, 1527–1533.

5. Changguo Shao and Qinhui Jiang(*), An extension of a theorem of Alan Camina's on conjugacy class sizes, Israel Journal of Mathematics, 2014,204(1):145-153.

6. Changguo Shao and Qinhui Jiang(*), On conjugacy class sizes of primary and biprimary elements of a finite group, Sci. China Math., 57(3), pp 491-498,2014.

7. Changguo Shao and Q. H Jiang(*), A new characterization of some linear groups by nse, J. Algebra Appl. 13(2), 1350094, 2014.

8. Changguo Shao and Q.H. Jiang(*), A new characterization of PSL2(p) by NSE, J. Algebra Appl. 13(4), 1350123, 2014.

9. Changguo Shao and Qinhui Jiang(*), Finite groups with two conjugacy class sizes of π-elements of primary and biprimary orders, Monatsh. Math., 169(1), pp 105-112, 2013.

10. Qinhui Jiang and Changguo Shao*, Recognition of L2(q) by its group order and largest irreducible character degree, Monatsh Math, 2015,176:413-422.

11. Qinhui Jiang andChangguo Shao*, Solvability of finite groups with four class sizes of certain elements, Bulletin of the Australian Mathematical Society,2014,90: 250-256.

12. Wenjuan Chen*Yanyong Guan, The dual of generalized fuzzy subspaces , Journal of Applied Mathematics, 9pages, 2012

13. Wenjuan Chen*Yanyong Guan, The set of fuzzy points of coalgebras, Utilitas Mathematica, 89: 367-371, 2012.

14. Hongbo Lv, Global dimensions of endomorphism algebras of generator-cogenerators over m-replicated algebras, Communications in Algebra, 39(2): 560-571, 2011.

15. Hongbo Lv, Tilting mutation for m-replicated algebras, Journal of Algebra and Its Applications, 10(4), 6 pages,2011.

16.Fengtong Wen, xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering.38(2): 381-387 , 2011. (SCI,IF=0.928

17.Fengtong Wen, Willy Susilo and Guomin Yang. A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks. Wireless Personal Communications,73( 3): 993-1004, 2013 (SCI,IF=0.428)

18.Fengtong Wen, Willy Susilo and Guomin Yang. A Robust Smart Card Based Anonymous User Authentication Protocol for Wireless Communications. Security and Communication Networks,7:987-993, 2014 .(SCI,IF=0.311)

19.Fengtong Wen.A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems, 37(6):9980,2013. (SCI,IF=1.783)

20.Fengtong Wen. A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System,Journal of Medical Systems, 38(5):42,2014. (SCI,IF=1.783)

21.Fengtong Wen, Dianli Guo. An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems,Journal of Medical Systems, 38(5):26,2014. (SCI.IF=1.783)

22.Dianli Guo,FengtongWen. Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture,Wireless Personal Communications,DOI 10.1007/s11277-014-1762-7, 2014.(SCI,IF=0.428)

23.Fengtong Wen,Willy Susilo,Guomin YangAnalysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart CardsWireless Personal Communications804):1747-1760(SCI).

24 Wenjuan Chen*, Bijan Davvaz, Some classes of quasi-pseudo-MV algebras, Logic Jnl IGPL, 24(5), 655-672 (2016).SCI

25 Wenjuan Chen*, Wieslaw A. DudekQuantum computational algebra with a non-commutative generalization, Mathematica Slovaca, 66(1), 19-34 (2016).SCI

26 Wenjuan Chen*, Wieslaw A. DudekThe representation of square root quasi-pseudo-MV algebras, Soft Computing, 19(2), 269-282 (2015). (SCI)

27 Wenjuan Chen*, Bijan Davvaz, Intuitionistic fuzzy subbialgebras and duality, Journal of Applied Mathematics, no.523245, 7 pages (2014).SCI

28 Muhammad AkramWenjuan Chen, Bijan DavvazOn N-hypergraphs, Journal of Intelligent & Fuzzy Systems, 26(6), 2937-2944 (2014).SCI

29 Wenjuan Chen*, Wenxu Ge, Fuzzy subbialgebras and duality, Utilitas Mathematica, 87, 13-20 (2012).SCI

30 Muhammad Akram, Wenjuan Chen*, Generalized anti fuzzy Lie algebras, Utilitas Mathematica, 87, 111-122 (2012).SCI

31 Wenjuan Chen*, Muhammad Akram, Yanyong Guan, Intuitionistic fuzzy subcoalgebras of coalgebras, Ars Combinatoria, 106, 423-434 (2012).SCI

32 Wenjuan Chen*, Intuitionistic fuzzy quotient Lie superalgebras, International Journal of Fuzzy Systems, 12(4), 330-339 (2010).SCI

33Wenjuan Chen*, Fuzzy subcoalgebras and duality,Bulletin of the Malaysian Mathematical Sciences Society, 32(3), 283-294 (2009). (SCI)

34Wenjuan Chen*, Shunhua Zhang, Intuitionistic fuzzy Lie sub-superalgebras and intuitionistic fuzzy ideals,Computers & Mathematics with Applications, 58(8), 1645-1661 (2009). (SCI)

35 Hongjun Liu, Xingyuan Wang. Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 2010, 59(10): 3320-3327. (2, ESI Top 1%).

36 Hongjun Liu, Xingyuan Wang, Quanlong Zhu. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching. Physics Letters A, 2011, 375(30): 2828-2835. (SCI, 3)

37 Hongjun Liu, Xingyuan Wang. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 2011, 284(16): 3895-3903. (SCI, ESI Top 1%)

38 Hongjun Liu, Xingyuan Wang, Abdurahman Kadir. Image encryption using DNA complementary rule and chaotic maps. Applied Soft Computing, 2012, 12(5): 1457-1466. (2, ESI Top 1%)

39 Guoyan Liu, Hongjun Liu(*), Abdurahman Kadir. Wavelet-Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity, Computational and Mathematical Methods in Medicine, Volume, 2012, doi:10.1155/2012/406349 (SCI)

40 Hongjun Liu, Xingyuan Wang. Triple-image encryption scheme based on one-time key stream generated by chaos and plain images, Journal of Systems and Software, 2013, 86(3): 826-834. (SCI)

41 Hongjun Liu, Xingyuan Wang, Abdurahman Kadir. Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik - International Journal for Light and Electron Optics, 2013, 124(18): 3527-3533. (SCI)

42 Hongjun Liu(*), Da Lin, Abdurahman Kadir. A novel data hiding method based on deoxyribonucleic acid coding. Computers & Electrical Engineering, 2013, 39(4): 1164-1173. (SCI)

43 Hongjun Liu, Xingyuan Wang, Abdurahman Kadir. Chaos-based Color image encryption using one-time keys and Choquet fuzzy integral. International Journal of Nonlinear Sciences and Numerical Simulation. 2014, 15(1): 1-10. (SCI)

44 Guoyan Liu, Jie Li, Hongjun Liu(*). Chaos-based color pathological image encryption scheme using one-time keys. Computers in Biology and Medicine, 2014, 45: 111-117. (SCI)

45 Hongjun Liu(*), Abdurahman Kadir, Yujun Niu. Chaos-based color image block encryption scheme using S-box. AEU-International Journal of Electronics and Communications. 2014, 68(7): 676-686. (SCI)

46 Guoyan Liu, Hongjun Liu(*), Abdurahman Kadir. Hiding message into DNA sequence through DNA coding and chaotic maps. Medical & Biological Engineering & Computing. 2014, 52(9): 741-747. (SCI)

47 Hongjun Liu(*), Abdurahman Kadir, Pijuan Gong. A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Optics Communications, 2015, 338: 340-347. (SCI)

48 Hongjun Liu(*), Abdurahman Kadir. Asymmetric color image encryption scheme using 2D discrete-time map. Signal Processing, 2015, 113: 104-112.(SCI, 2)

49 Liu Guoyan, Kadir Abdurahman, Liu Hongun(*). Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Computing and Applications, 2016, 27(3): 687-697. (SCI)

50Hongjun Liu(*), Abdurahman Kadir, Yanling Li. Asymmetric color pathological image encryption scheme based on complex hyper chaotic system. Optik-International Journal for Light and Electron Optics, 2016, 127(15): 5812-5819. (SCI)

51 Hongjun Liu(*), Abdurahman Kadir, Yanling Li. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik-International Journal for Light and Electron Optics, 2016, 127(19): 7431-7438. (SCI)

52 Hongjun Liu(*), Abdurahman Kadir, Xiaobo Sun. Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Processing, 2017, 11(5): 324-332. (SCI)

53 Hongjun Liu(*), Abdurahman Kadir, Xiaobo Sun, Yanling Li. Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimedia Tools and Applications, 2018: 77(1): 1391-1407. (SCI)

54 Hongjun Liu(*), Fengtong Wen, Abdurahman Kadir. Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimedia Tools and Applications, 2019, 78(12): 15997-16010. (SCI)

55 Hongjun Liu(*), Abdurahman Kadir, Jian Liu. Keyed hash function using hyper chaotic system with time-varying parameters perturbation. IEEE Access, 2019, 7(1): 37211-37219. (SCI, 2)

56 Liu Hongjun(*), ZhangYingqian, Kadir Abdurahman, Xu Yanqiu. Image encryption using complex hyper chaotic system by injecting impulse into parameters. Applied Mathematics and Computation, 2019, 360: 83-93. (SCI, 1, Top期刊)

57 Liu Hongjun(*), Kadir Abdurahman, Liu Jian. Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system[J]. Optics and Lasers in Engineering, 2019, 122: 123-133. (SCI, 2)

58 Liu Hongjun(*), Kadir Abdurahman, Xu Chengbo. Cryptanalysis and constructing S-Box based on chaotic map and backtracking[J]. Applied Mathematics and Computation, 2020, 376: 125153.(SCI, 1, Top期刊)

59 Liu Hongjun(*), Kadir Abdurahman, Xu Chengbo. Color image encryption with cipher feedback and coupling chaotic map. International Journal of Bifurcation and Chaos, 2020. DOI:10.1142/S0218127420501734. (SCI, 2)

上一条:金融数学与风险管理研究所

下一条:应用数学研究所