![]() |
个人信息Personal Information
教授 博士生导师 硕士生导师
性别:女
毕业院校:山东大学
学历:博士研究生毕业
学位:博士生
在职信息:在职
所在单位:网络空间安全学院(研究院)
入职时间:2008-07-01
学科:信息安全
办公地点:山东青岛即墨区滨海路72山东大学青岛校区
联系方式:13573147364
扫描关注
- [1] 丁江. 面向多源异构数据融合的隐私集合求交研究. 信息网络安全, 23, 86-98, 2023.
- [2] . Beyond-Birthday security for permutation-based Feistel networks. Designs, Codes, and Cryptography, 2021.
- [3] 侯庆良. Automated Meet-in-the-Middle Attack Goes to Feistel. Asiacrypt,
- [4] 董晓阳. Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. Asiacrypt, 2023.
- [5] 侯庆良. Automated Meet-in-the-Middle Attack Goes to Feistel. Asiacrypt, 2023.
- [6] 董晓阳. Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. Asiacrypt,
- [7] 侯庆良. Camellia 和 CLEFIA 的自动化中间相遇攻击. 密码学报, 2024.
- [8] Zhenzhen Guo. Attribute-Based Data Sharing Scheme Using Blockchain for 6G-enabled VANETs. IEEE Transactions on Mobile Computing , 2024.
- [9] Xiaoyang Dong . Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. 2023.
- [10] 侯庆良. Automated Meet-in-the-Middle Attack Goes to Feistel. 2023.
- [11] Zhenzhen Guo. A Multi-Factor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain. IEEE Internet of Things Journal, 2023.
- [12] . Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher MDPI. MDPI, 2023.
- [13] . 分组密码 FBC 的差分分析. 中国科学-信息科学, 2023.
- [14] . Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023.
- [15] 李艳斌. Universal forgery attack against GCM-RUP. 12006 LNCS, 15-34, 2020.
- [16] 郭淳. Beyond-birthday security for permutation-based Feistel networks. Designs, Codes, and Cryptography, 89, 407, 2021.
- [17] 郭淳. Beyond-Birthday Security for Permutation-based Feistel Networks. Designs, Codes, and Cryptography, 2021.
- [18] 王小云 and 魏普文. Simplified Design for Concurrent Statistical Zero-Knowledge Arguments. TSINGHUA SCIENCE AND TECHNOLOGY, 14, 255, 2009.
- [19] Chen, Lele. MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. COMPUTER JOURNAL, 62, 1805, 2019.
- [20] 张国艳. Cryptanalysis of JAMBU. 2015.