研究成果
[1]JinyongChang,YanyanJi,MaozhiXu,RuiXue,GeneralTransformationsfromSingleGenerationtoMultiGenerationforHomomorphicMessageAuthenticationSchemesinNetworkCoding,FutureGenerationComputerSystems,vol.91,pp.416425,2019.(SCI二区,IF:5.768)
[2]JinyongChang,HuiMa,AnlingZhang,MaozhiXu,RKASecurityofIdentityBasedHomomorphicSignatureScheme,IEEEACCESS,vol.7,pp.5085850868,2019.(SCI二区,IF:4.098)
[3]JinyongChang,BilinShao,AnlingZhang,GenqingBian,YanyanJi,MaozhiXu,SecurityAnalysisofanEffieicientMullSpaceBasedHomomorphicMACSchemeagainstTagPollutionAttacksinRLNC,IEEEACCESS,vol.7,pp.8839388398,2019.(SCI二区,IF:4.098)
[4]YuChen,JiangZhang,YiDeng,JinyongChang,KDMSecurityforIdentityBasedEncryption:ConstructionsandSeparations,InformationSciences,2019.(SCI二区,IF:5.5)
[5]JinyongChang,YanyanJi,MaozhiXu,OntheKDMCCASecurityfromPartialTrapdoorOneWayFamilyintheRandomOracleModel.TheComputerJournal,2019.(SCI,EI,CCFB类)
[6]YingWu,JinyongChang*,RuiXue,RuiZhang,HomomorphicMACfromAlgebraicOneWayFunctionsforNetworkCodingwithSmallKeySize,TheComputerJournal.Vol.60(12),pp.17851800,2017.(SCI,EI,CCFB类)
[7]JinyongChang,HonglongDai,andMaozhiXu,TheKDMCCASecurityofREACT,ISPEC2017,LNCS10701,pp.85101,2017(EI).
[8]JinyongChang,HonglongDai,MaozhiXuandRuiXue,SeparationsinCircularSecurityforArbitraryLengthKeyCyclestheCCACase.SecurityandCommunicationNetworks.Vol.9(18),2016.(SCI,EI)
[9]JinyongChang,HonglongDai,MaozhiXuandRuiXue,HomomorphicNetworkCodingSignatureSchemesagainstRelatedKeyAttackintheRandomOracle.The19thAnnualInternationalConferenceonInformationSecurityandCryptology(ICISC2016),LNCS10157,pp.239253,2017.(EI).
[10]JinyongChang,HonglongDai,MaozhiXuandRuiXue,SecurityAnalysisofaTESLABasedHomomorphicMACSchemesforAuthenticationinP2PLiveStreamingSystem.SecurityandCommunicationNetworks,Vol.9(16),pp.33093313,Nov.2016.(SCI,EI)
[11]JinyongChangandRuiXue,PracticalKeyDependentMessageChosenCiphertextSecurityBasedonDecisionalCompositeResiduosityandQuadraticResiduosityAssumptions.SecurityandCommunicationNetworks,Vol.8(8),pp.15251536,May,2015.(SCI,EI)
[12]JinyongChangandRuiXue,TheKDMCCASecurityoftheKurosawaDesmedtScheme.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98A,No.4,pp.10321037,April,2015.(SCI,EI)
[13]JinyongChangandRuiXue,AGenericConstructionofHomomorphicMACforMultiFileTransmissioninNetworkCoding.JournalofCommunications.Vol.10(1),pp.4347,January,2015.(EI)
[14]HonglongDai,DingWang,JinyongChang,andMazhiXu,OntheRCCASecurityofHybridSigncryptionforInternetofThings.WirelessCommunicationsandMobileComputing,2018.(SCI三区)
[15]HonglongDai,JinyongChang,ZhenduoHou,andMaozhiXu,RelaxingEnhancedChosenCiphertextSecurity,IEICETrans.Fund.Vol.E101A,2018.(SCI,EI)
[16]YanyanJi,JinyongChang,HonglongDai,andMaozhiXu,OntheRKASecurityoftheStandardModelBasedBFKWNetworkCodingSignatureScheme,IEICETrans.Fund.Vol.E101A,2018.(SCI,EI)
[17]YuChen,JiangZhang,YiDeng,andJinyongChang,KDMSecurityforIdentityBasedEncryption.InformationSciences,accepted(SCI).
[18]HonglongDai,Luxuan,Zhang,YanyanJi,JinyongChang,andMaozhiXu,OntheKeyDependentMessageSecurityofDHIES,ICAIT2017,pp.322328.(EI)
[19]HonglongDai,JinyongChang,ZhenduoHou,andMaozhiXu,TheECCASecurityofHybridEncryptions,SocialSec2017,pp.847859.(EI)
[20]YuChen,JiangZhang,YiDeng,andJinyongChang,KDMSecurityforIdentityBasedEncryption:ConstructionsandSeparations.IACRCryptologyePrintArchive2016:1020.
[21]BeiLiang,HongdaLiandJinyongChang,ConstrainedVerfiableRandomFunctionsfromIndistinguishabilityObfuscation.ProvSec2015.(EI)
[22]BeiLiang,HongdaLiandJinyongChang,TheGenericConstructionofAdaptivelySecureIdentityBasedAggregateSignaturesintheRandomOracleModelfromStandardSignatures.CANS2015.(EI)
[23]BeiLiang,HongdaLiandJinyongChang,TheGenericTransformationfromStandardSignaturestoIdentityBasedAggregateSignatures.ISC2015.(EI)
[24]HaidongLiu,ZhaoliLiuandJinyongChang,ExistenceandUniquenessofPositiveSolutionsofNonlinearSchrodingerSystems.ProceedingsoftheRoyalSocietyofEdinburgh,145A,365390,2015.(SCI)
[25]FeiTang,HongdaLiandJinyongChang,MultiUseUnidirectionalProxyReSignaturesofConstantSizeWithoutRandomOracles.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98A,No.3,pp.898905,2015.(SCI,EI)
[26]FeiTang,HongdaLiandJinyongChang,MultiHopUnidirectionalProxyReEncryptionfromMultilinearMaps.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E98A,No.2,pp.762766,2015.(SCI,EI)
[27]JinyongChangandRuiXue,KDMCCASecurityoftheCramerShoupCryptosystem,Revisited.In11thInternationalConferenceonSecurityandCryptography,SECRYPT2014,pp.299306,Vienna,Austria.(EI)
[28]JinyongChangandRuiXue,OntheSecurityagainstNonadaptiveChosenCiphertextAttackandKeyDependentMessageAttack.IEICETransactionsonFundamentalsofElectronics,CommunicationsandComputerSciences.Vol.E97A,No.11,pp.22672271,November,2014.(SCI,EI)
[29]MeihuaWei,JinyongChangandLanQi,ExistenceandStatilityofPositiveSteadyStateSolutionsforaLotkaVolterraSystemwithIntraspecificCompetition.AdvancesinDifferenceEquations.May30,2014.(SCI)
[30]JinyongChangandRuiXue,GeneralConstructionofChameleonAllButOneTrapdoorFunctionsandTheirApplications.JournalofSoftware.Vol.9(10),pp.25572563,October,2014.
[31]常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性.密码学报,1(3):235243,2014.(CSCD)
[32]JinyongChang,NoteonGroundStatesofaNonlinearSchrodingerSystem.JournalofMathematicalAnalysisandApplications.381(2),pp.957962,September,2011.(SCI二区)
[33]JinyongChangandZhaoliLiu,GroundStatesofNonlinearSchrodingerSystems.ProceedingsoftheAmericanMathematicsSociety.138(2),pp.687693,Feb.2010.(SCI三区)