一、研究所简介
代数与密码学研究所现有成员7人,其中教授2人,副教授3人,都具有博士学位。主要研究有限群结构、代数表示理论、非经典逻辑代数、混沌密码学以及密码协议。针对共轭类长对有限群结构的影响、基于量子逻辑门的操作产生的量子计算逻辑及其代数结构、基于混沌理论的密码方案设计与分析、基于多因子的远程身份认证协议及其安全性理论进行研究,取得一系列科研成果。
目前在《Journal of Algebra》,《Computers & Electrical Engineering》,《Soft Computing》,《Applied Mathematics and Computation》,《Optics and Lasers in Engineering》,《Signal Processing》以及《中国科学:数学(英文版)》,《数学年刊》,《通信学报》等期刊发表SCI/EI收录论文100余篇。主持国家自然科学基金6项,山东省自然科学基金6项。获山东省高校优秀科研成果奖三等奖3项,山东省高等学校科学技术奖三等奖1项。
二、研究所负责人简介
温凤桐,男,博士、教授、硕士生导师,获买球平台官方网站优秀教师、买球平台官方网站优秀班主任等荣誉称号。主要从事密码协议理论方面的研究,主持山东省自然科学基金三项,获山东省高等学校优秀科研成果奖三等奖两项,在《Computers and Electrical Engineering》,《Wireless Personal Communications》,《Security and Communication Networks》,《Multimedia Tools and Applications》,《Soft Computing》等国内外期刊发表高水平学术论文40余篇,SCI论文引用超过210次。培养硕士研究生10余名。
三、主要成员
姓名 |
学位 |
专业技术职务 |
研究方向 |
陈文娟 |
博士 |
教授 |
非经典逻辑代数,模糊代数 |
刘红军 |
博士 |
副教授 |
混沌密码学和后量子密码学 |
邵长国 |
博士 |
副教授 |
有限群及表示 |
吕洪波 |
博士 |
副教授 |
表示论 |
蒋琴会 |
博士 |
副教授 |
有限群论研究 |
徐承波 |
博士 |
讲师 |
密码协议 |
四、研究方向介绍
1.有限群及代数表示论
2.非经典逻辑代数,模糊代数
3.密码协议
4.混沌理论、混沌密码学
五、承担科研项目与获奖
项目、获奖名称 |
类别 |
获得时间 |
承担人 |
经费、等级 |
有限群的共轭类和有限群的结构 |
国家自然科学基金面上项目 |
2021.01-2024.12 |
邵长国 |
52 |
共轭类长的数量性质与群结构的研究 |
国家自然科学基金 |
201401-201612 |
蒋琴会 |
23 |
遗传代数的高维推广和高维丛倾斜 |
国家自然科学基金 |
201401-201612 |
吕洪波 |
22 |
基于量子逻辑门的代数系统的结构研究 |
国家自然科学基金 |
201601-201812 |
陈文娟 |
18 |
直觉模糊子双代数集合的代数结构研究 |
国家自然科学基金 |
201201-201212 |
陈文娟 |
3 |
复代数的倾斜理论及其在丛倾斜理论中的应用 |
国家自然科学基金 |
201201-201212 |
吕洪波 |
3 |
多因子远程认证协议的设计与分析 |
山东省自然科学基金 |
201310-201610 |
温凤桐 |
8 |
重复代数的同调性质和高维丛范畴 |
山东省自然科学基金 |
201112-201412 |
吕洪波 |
3 |
元素的共轭类长对有限群及正规子群的结构的影响 |
山东省自然科学基金 |
2019.7-2022.6 |
蒋琴会 |
14 |
部分元素的共轭类长对有限群及其正规子群结构的影响 |
山东省自然科学基金 |
201407-201707 |
邵长国 |
13 |
基于车载自组网络认证协议的研究 |
山东省自然科学基金 |
2018.4-2020.12 |
温凤桐 |
5 |
Atanassov直觉模糊集的对偶及其应用 |
山东省优秀中青年科学家奖励基金 |
201107-201407 |
陈文娟 |
5 |
多因子远程认证协议的研究 |
山东省高等学校科学技术奖 |
2016 |
温凤桐 |
三等 |
部分元素的共轭类长的数量性质对群结构的影响 |
山东高等学校优秀科研成果奖 |
2015 |
邵长国 |
三等 |
直觉模糊子双代数集合的结构研究 |
山东高等学校优秀科研成果奖 |
2013 |
陈文娟 |
三等 |
信息传输中的若干安全问题研究 |
山东高等学校优秀科研成果奖 |
2011 |
温凤桐 |
三等 |
六、代表性科研论文
1. Antonio Beltran, Changguo shao, On the number of invariant Sylow subgroups under coprime action, Journal of algebra, 2017, doi:dx.doi.org/10.1016/j.jalgebra.2017.07.005
2. Cahngguo Shao and Qinhui Jiang, On normal subgroups with consecutive G-class size,Journal of Algebra and Its Applications, 2016, 15(8), page 8.
3. Changguo Shao, A.Beltran,Coprime action and arithmetical conditions on invariant conjugacy classes, SCIENCE CHINA Mathematics,2015, 58(12): 2499-2504.
4. A.Beltrán,M.J.Felipe andChangguo Shao, Class sizes of prime-power order p’-elements and normal subgroups, Annali di Matematica, (4) 194 (2015), no. 5, 1527–1533.
5. Changguo Shao and Qinhui Jiang(*), An extension of a theorem of Alan Camina's on conjugacy class sizes, Israel Journal of Mathematics, 2014,204(1):145-153.
6. Changguo Shao and Qinhui Jiang(*), On conjugacy class sizes of primary and biprimary elements of a finite group, Sci. China Math., 57(3), pp 491-498,2014.
7. Changguo Shao and Q. H Jiang(*), A new characterization of some linear groups by nse, J. Algebra Appl. 13(2), 1350094, 2014.
8. Changguo Shao and Q.H. Jiang(*), A new characterization of PSL2(p) by NSE, J. Algebra Appl. 13(4), 1350123, 2014.
9. Changguo Shao and Qinhui Jiang(*), Finite groups with two conjugacy class sizes of π-elements of primary and biprimary orders, Monatsh. Math., 169(1), pp 105-112, 2013.
10. Qinhui Jiang and Changguo Shao*, Recognition of L2(q) by its group order and largest irreducible character degree, Monatsh Math, 2015,176:413-422.
11. Qinhui Jiang andChangguo Shao*, Solvability of finite groups with four class sizes of certain elements, Bulletin of the Australian Mathematical Society,2014,90: 250-256.
12. Wenjuan Chen*,Yanyong Guan, The dual of generalized fuzzy subspaces , Journal of Applied Mathematics, 9pages, 2012
13. Wenjuan Chen*,Yanyong Guan, The set of fuzzy points of coalgebras, Utilitas Mathematica, 89: 367-371, 2012.
14. Hongbo Lv, Global dimensions of endomorphism algebras of generator-cogenerators over m-replicated algebras, Communications in Algebra, 39(2): 560-571, 2011.
15. Hongbo Lv, Tilting mutation for m-replicated algebras, Journal of Algebra and Its Applications, 10(4), 6 pages,2011.
16.Fengtong Wen, xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering.38(2): 381-387 , 2011. (SCI,IF=0.928)
17.Fengtong Wen, Willy Susilo and Guomin Yang. A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks. Wireless Personal Communications,73( 3): 993-1004, 2013 (SCI,IF=0.428)
18.Fengtong Wen, Willy Susilo and Guomin Yang. A Robust Smart Card Based Anonymous User Authentication Protocol for Wireless Communications. Security and Communication Networks,7:987-993, 2014 .(SCI,IF=0.311)
19.Fengtong Wen.A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems, 37(6):9980,2013. (SCI,IF=1.783)
20.Fengtong Wen. A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System,Journal of Medical Systems, 38(5):42,2014. (SCI,IF=1.783)
21.Fengtong Wen, Dianli Guo. An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems,Journal of Medical Systems, 38(5):26,2014. (SCI.IF=1.783)
22.Dianli Guo,FengtongWen. Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture,Wireless Personal Communications,DOI 10.1007/s11277-014-1762-7, 2014.(SCI,IF=0.428)
23.Fengtong Wen,Willy Susilo,Guomin Yang,Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards,Wireless Personal Communications,80(4):1747-1760(SCI).
24 Wenjuan Chen*, Bijan Davvaz, Some classes of quasi-pseudo-MV algebras, Logic Jnl IGPL, 24(5), 655-672 (2016).(SCI)
25 Wenjuan Chen*, Wieslaw A. Dudek,Quantum computational algebra with a non-commutative generalization, Mathematica Slovaca, 66(1), 19-34 (2016).(SCI)
26 Wenjuan Chen*, Wieslaw A. Dudek,The representation of square root quasi-pseudo-MV algebras, Soft Computing, 19(2), 269-282 (2015). (SCI)
27 Wenjuan Chen*, Bijan Davvaz, Intuitionistic fuzzy subbialgebras and duality, Journal of Applied Mathematics, no.523245, 7 pages (2014).(SCI)
28 Muhammad Akram,Wenjuan Chen, Bijan Davvaz,On N-hypergraphs, Journal of Intelligent & Fuzzy Systems, 26(6), 2937-2944 (2014).(SCI)
29 Wenjuan Chen*, Wenxu Ge, Fuzzy subbialgebras and duality, Utilitas Mathematica, 87, 13-20 (2012).(SCI)
30 Muhammad Akram, Wenjuan Chen*, Generalized anti fuzzy Lie algebras, Utilitas Mathematica, 87, 111-122 (2012).(SCI)
31 Wenjuan Chen*, Muhammad Akram, Yanyong Guan, Intuitionistic fuzzy subcoalgebras of coalgebras, Ars Combinatoria, 106, 423-434 (2012).(SCI)
32 Wenjuan Chen*, Intuitionistic fuzzy quotient Lie superalgebras, International Journal of Fuzzy Systems, 12(4), 330-339 (2010).(SCI)
33Wenjuan Chen*, Fuzzy subcoalgebras and duality,Bulletin of the Malaysian Mathematical Sciences Society, 32(3), 283-294 (2009). (SCI)
34Wenjuan Chen*, Shunhua Zhang, Intuitionistic fuzzy Lie sub-superalgebras and intuitionistic fuzzy ideals,Computers & Mathematics with Applications, 58(8), 1645-1661 (2009). (SCI)
35 Hongjun Liu, Xingyuan Wang. Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 2010, 59(10): 3320-3327. (2区, ESI Top 1%).
36 Hongjun Liu, Xingyuan Wang, Quanlong Zhu. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching. Physics Letters A, 2011, 375(30): 2828-2835. (SCI, 3区)
37 Hongjun Liu, Xingyuan Wang. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 2011, 284(16): 3895-3903. (SCI, ESI Top 1%)
38 Hongjun Liu, Xingyuan Wang, Abdurahman Kadir. Image encryption using DNA complementary rule and chaotic maps. Applied Soft Computing, 2012, 12(5): 1457-1466. (2区, ESI Top 1%)
39 Guoyan Liu, Hongjun Liu(*), Abdurahman Kadir. Wavelet-Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity, Computational and Mathematical Methods in Medicine, Volume, 2012, doi:10.1155/2012/406349 (SCI)
40 Hongjun Liu, Xingyuan Wang. Triple-image encryption scheme based on one-time key stream generated by chaos and plain images, Journal of Systems and Software, 2013, 86(3): 826-834. (SCI)
41 Hongjun Liu, Xingyuan Wang, Abdurahman Kadir. Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik - International Journal for Light and Electron Optics, 2013, 124(18): 3527-3533. (SCI)
42 Hongjun Liu(*), Da Lin, Abdurahman Kadir. A novel data hiding method based on deoxyribonucleic acid coding. Computers & Electrical Engineering, 2013, 39(4): 1164-1173. (SCI)
43 Hongjun Liu, Xingyuan Wang, Abdurahman Kadir. Chaos-based Color image encryption using one-time keys and Choquet fuzzy integral. International Journal of Nonlinear Sciences and Numerical Simulation. 2014, 15(1): 1-10. (SCI)
44 Guoyan Liu, Jie Li, Hongjun Liu(*). Chaos-based color pathological image encryption scheme using one-time keys. Computers in Biology and Medicine, 2014, 45: 111-117. (SCI)
45 Hongjun Liu(*), Abdurahman Kadir, Yujun Niu. Chaos-based color image block encryption scheme using S-box. AEU-International Journal of Electronics and Communications. 2014, 68(7): 676-686. (SCI)
46 Guoyan Liu, Hongjun Liu(*), Abdurahman Kadir. Hiding message into DNA sequence through DNA coding and chaotic maps. Medical & Biological Engineering & Computing. 2014, 52(9): 741-747. (SCI)
47 Hongjun Liu(*), Abdurahman Kadir, Pijuan Gong. A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Optics Communications, 2015, 338: 340-347. (SCI)
48 Hongjun Liu(*), Abdurahman Kadir. Asymmetric color image encryption scheme using 2D discrete-time map. Signal Processing, 2015, 113: 104-112.(SCI, 2区)
49 Liu Guoyan, Kadir Abdurahman, Liu Hongun(*). Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Computing and Applications, 2016, 27(3): 687-697. (SCI)
50Hongjun Liu(*), Abdurahman Kadir, Yanling Li. Asymmetric color pathological image encryption scheme based on complex hyper chaotic system. Optik-International Journal for Light and Electron Optics, 2016, 127(15): 5812-5819. (SCI)
51 Hongjun Liu(*), Abdurahman Kadir, Yanling Li. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik-International Journal for Light and Electron Optics, 2016, 127(19): 7431-7438. (SCI)
52 Hongjun Liu(*), Abdurahman Kadir, Xiaobo Sun. Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Processing, 2017, 11(5): 324-332. (SCI)
53 Hongjun Liu(*), Abdurahman Kadir, Xiaobo Sun, Yanling Li. Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimedia Tools and Applications, 2018: 77(1): 1391-1407. (SCI)
54 Hongjun Liu(*), Fengtong Wen, Abdurahman Kadir. Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimedia Tools and Applications, 2019, 78(12): 15997-16010. (SCI)
55 Hongjun Liu(*), Abdurahman Kadir, Jian Liu. Keyed hash function using hyper chaotic system with time-varying parameters perturbation. IEEE Access, 2019, 7(1): 37211-37219. (SCI, 2区)
56 Liu Hongjun(*), ZhangYingqian, Kadir Abdurahman, Xu Yanqiu. Image encryption using complex hyper chaotic system by injecting impulse into parameters. Applied Mathematics and Computation, 2019, 360: 83-93. (SCI, 1区, Top期刊)
57 Liu Hongjun(*), Kadir Abdurahman, Liu Jian. Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system[J]. Optics and Lasers in Engineering, 2019, 122: 123-133. (SCI, 2区)
58 Liu Hongjun(*), Kadir Abdurahman, Xu Chengbo. Cryptanalysis and constructing S-Box based on chaotic map and backtracking[J]. Applied Mathematics and Computation, 2020, 376: 125153.(SCI, 1区, Top期刊)
59 Liu Hongjun(*), Kadir Abdurahman, Xu Chengbo. Color image encryption with cipher feedback and coupling chaotic map. International Journal of Bifurcation and Chaos, 2020. DOI:10.1142/S0218127420501734. (SCI, 2区)