常用下载   /  加入收藏  
 
 
    欢迎访问!今天是2017年11月21日  星期二  十月初四      
更多»公告
    当前位置: 首页 » 科研工作 » 研究所 »  代数与密码学研究所
 上一篇:应用数学研究所
 下一篇:金融数学与风险管理研究所
代数与密码学研究所
作者:研究生工作办公室  来源:本站原创  发布时间:2014年11月19日  点击次数:2568

一、 研究所简介

代数与密码学研究所是在代数学科研团队与密码学科研团队的基础上整合而成。主要研究有限群结构、代数表示理论、非经典逻辑代数以及密码协议。针对共轭类长对有限群结构的影响、基于量子逻辑门的操作产生的量子计算逻辑及其代数结构、基于多因子的远程身份认证协议及其安全性理论进行研究,取得一系列科研成果。

研究所现有成员9人,其中教授3人,副教授3人,博士7人。目前在《Journal of Algebra,Computers & Electrical Engineering》,Soft Computing以及《中国科学:数学(英文版)》等期刊发表SCI/EI收录论文96篇。主持国家自然科学基金6项,山东省自然科学基金4项,山东省优秀中青年科学家奖励基金1项。获山东省高校优秀科研成果奖二等奖1项,三等奖3项,山东省高等学校科学技术奖三等奖1

二、 研究所负责人简介

邵长国,男,博士(),副教授,硕士研究生导师, 美国数学会数学评论评论员。 主要从事有限群及表示的研究,对有限群的共轭类长对有限群结构的影响、特征表示理论、特别是在素数幂、双素数幂阶元的共轭类长的个数为34的情形开展研究,取得系列创新性研究成果,在《Science China Mathematics》、《Israel Journal of Mathematics》、《Journal of Algebra and Its Applications》、《Bulletin of the Australian Mathematical Society》等国内外期刊上发表该领域的论文40余篇,其中被SCI收录的论文近30篇。获山东省高等学校优秀科研成果奖三等奖1项。主持山东省自然基金面上项目一项,参加国家基金多项。2016年全国群论会议(武汉)应邀做大会报告“Conjugacy class sizes and the structure of finite groups” 201311-20144月,访问University of James I(西班牙海梅一世大学)。承担高等代数、线性代数与解析几何、代数学等本科生及研究生课程教学任务。

三、主要研究成员

姓名

学位

专业技术职务

研究方向

温凤桐

博士

教授

密码协议、分组密码

张苏梅

学士

教授

代数图论

黄治琴

硕士

教授

概率论与数理统计

陈文娟

博士

副教授

非经典逻辑代数,模糊代数

吕洪波

博士

副教授

表示论

蒋琴会

博士

讲师

有限群论研究

徐承波

博士

讲师

密码协议

王秀云

博士

讲师

代数图论

四、研究方向介绍

1. 有限群及代数表示论

  2. 非经典逻辑代数,模糊代数

  3. 密码协议

  4. 分组密码

5代数图论

五、承担科研项目与获奖

项目、获奖名称

类别

获得时间

承担人

经费、等级

共轭类长的数量性质与群结构的研究

国家自然科学基金

201401-201612

蒋琴会

23

遗传代数的高维推广和高维丛倾斜

国家自然科学基金

201401-201612

吕洪波

22

基于量子逻辑门的代数系统的结构研究

国家自然科学基金

201601-201812

陈文娟

18

半弧传递图与半边传递图的研究

国家自然科学基金

2013.01-2015.12

王秀云

22

直觉模糊子双代数集合的代数结构研究

国家自然科学基金

201201-201212

陈文娟

3

复代数的倾斜理论及其在丛倾斜理论中的应用

国家自然科学基金

201201-201212

吕洪波

3

多因子远程认证协议的设计与分析

山东省自然科学基金

201310-201610

温凤桐

8

重复代数的同调性质和高维丛范畴

山东省自然科学基金

201112-201412

吕洪波

3

部分元素的共轭类长对有限群及其正规子群结构的影响

山东省自然科学基金

201407-201707

邵长国

13

Atanassov直觉模糊集的对偶及其应用

山东省优秀中青年科学家奖励基金

201107-201407

陈文娟

5

图的对称性

山东省自然科学基金

2012.7-2015.7

王秀云

4

多因子远程认证协议的研究

山东省高等学校科学技术奖

2016

温凤桐

三等

部分元素的共轭类长的数量性质对群结构的影响

山东高等学校优秀科研成果奖

2015

邵长国

三等

直觉模糊子双代数集合的结构研究

山东高等学校优秀科研成果奖

2013

陈文娟

三等

信息传输中的若干安全问题研究

山东高等学校优秀科研成果奖

2011

温凤桐

三等

图的距离标号及边覆盖染色的系列研究

山东高等学校优秀科研成果奖

2008

张苏梅

二等

 

六、代表性科研论文

1. Antonio Beltran, Changguo shao, On the number of invariant Sylow subgroups under coprime action, Journal of algebra, 2017, doi:dx.doi.org/10.1016/j.jalgebra.2017.07.005

2. Cahngguo Shao and Qinhui Jiang, On normal subgroups with consecutive G-class sizeJournal of Algebra and Its Applications, 2016, 15(8), page 8.

3. Changguo Shao, A.Beltran, Coprime action and arithmetical conditions on invariant conjugacy classes, SCIENCE CHINA Mathematics, 2015, 58(12): 2499-2504.

4. A.Beltrán, M.J.Felipe and Changguo Shao, Class sizes of prime-power order p’-elements and normal subgroups, Annali di Matematica, (4) 194 (2015), no. 5, 1527–1533.

5. Changguo Shao and Qinhui Jiang(*), An extension of a theorem of Alan Camina's on conjugacy class sizes, Israel Journal of Mathematics, 2014, 204(1):145-153 .

6. Changguo Shao and Qinhui Jiang(*), On conjugacy class sizes of primary and biprimary elements of a finite group, Sci. China Math., 57(3), pp 491-498,2014.

7. Changguo Shao and Q. H Jiang(*), A new characterization of some linear groups by nse, J. Algebra Appl. 13(2), 1350094, 2014.

8. Changguo Shao and Q.H. Jiang(*), A new characterization of PSL2(p) by NSE, J. Algebra Appl. 13(4), 1350123, 2014.

9. Changguo Shao and Qinhui Jiang(*), Finite groups with two conjugacy class sizes of π-elements of primary and biprimary orders, Monatsh. Math., 169(1), pp 105-112, 2013.

10. Qinhui Jiang and Changguo Shao* , Recognition of L2(q) by its group order and largest irreducible character degree, Monatsh Math, 2015,176:413-422.

11. Qinhui Jiang and Changguo Shao*, Solvability of finite groups with four class sizes of certain elements, Bulletin of the Australian Mathematical Society, 2014, 90: 250-256.

12. Wenjuan Chen*Yanyong Guan, The dual of generalized fuzzy subspaces , Journal of Applied Mathematics, 9pages, 2012

13. Wenjuan Chen*Yanyong Guan, The set of fuzzy points of coalgebras, Utilitas Mathematica, 89: 367-371, 2012.

14. Hongbo Lv, Global dimensions of endomorphism algebras of generator-cogenerators over m-replicated algebras, Communications in Algebra, 39(2): 560-571, 2011.

15. Hongbo Lv, Tilting mutation for m-replicated algebras, Journal of Algebra and Its Applications, 10(4), 6 pages,2011.

16.Fengtong Wen, xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering.38(2): 381-387 , 2011. (SCI,IF=0.928
17.Fengtong Wen, Willy Susilo and Guomin Yang. A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks. Wireless Personal Communications,73( 3): 993-1004, 2013 (SCI,IF=0.428)
18.Fengtong Wen, Willy Susilo and Guomin Yang. A Robust Smart Card Based Anonymous User Authentication Protocol for Wireless Communications. Security and Communication Networks,7:987-993, 2014 . (SCI,IF=0.311)
19.Fengtong Wen.A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems, 37(6):9980,2013. (SCI,IF=1.783)
20.Fengtong Wen, Dianli Guo, xuelei Li.Cryptanalysis of”a new dynamic ID-based user
authentication scheme to resist smart-card-theft attack. Applied mathematics and information sciences. 8(4):1855-1858,2014.(SCI)
21.Fengtong Wen. A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System,Journal of Medical Systems, 38(5):42,2014. (SCI,IF=1.783)
22.Fengtong Wen, Dianli Guo. An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems,Journal of Medical Systems, 38(5):26,2014. (SCI.IF=1.783)
23.Dianli Guo,FengtongWen. Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture,Wireless Personal Communications,DOI 10.1007/s11277-014-1762-7,2014.(SCI,IF=0.428)
24.Fengtong Wen,Wenling Wu,Qiaoyan Wen. Error Oracle Attacks on Several Modes of Operation. LNAI, 3802, 2005. (SCI)

25.Xu elei Li,Fengtong Wen. A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices. Applied mathematics and information sciences. 2012.6 (2). (
SCI,IF=0.731
26.Fengtong Wen, xuelei Li. Cross-realm client-to-client password-based authenticated key agreement protocol for mobile devices on elliptic curve cryptosystem, Journal of Convergence Information Technology. 2011.6(5).23 ~ 31. (EI

27.Fengtong Wen, Shenjun Cui. An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure.International Journal of Advancements in Computing Technology.3(5).2011.108~116. (EI

28 Fengtong Wen, Shenjun Cui. A New Proxy Signature Scheme with Efficient Multiple Delegations to the Same Proxy Signer. Journal of Computational Information Systems.2011.7(10).3623-3629. (EI)

29
.Fengtong Wen, Xuelei Li.An Improved DoS-resistant ID-based Password Authentication Scheme without Using Smart Card, Journal of electronics (china), 28(4-6), 2011.
30.温凤桐. 基于MISTY结构的可调分组密码的设计与分析.通信学报,317
), 76-80, 2010. (EI)
31. Fengtong Wen. On Super-Psudorandomness of MISTY-Type Tweakable Block ciphers. Proceedings of ICCSN 2010(EI

32.Fengtong Wen, Willy Susilo, Guomin YangAnalysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart CardsWireless Personal Communications804): 1747-1760(SCI).

33 Wenjuan Chen*, Bijan Davvaz, Some classes of quasi-pseudo-MV algebras, Logic Jnl IGPL, 24(5), 655-672 (2016). SCI

34 Wenjuan Chen*, Wieslaw A. DudekQuantum computational algebra with a non-commutative generalization, Mathematica Slovaca, 66(1), 19-34 (2016). SCI

35 Wenjuan Chen*, Wieslaw A. DudekThe representation of square root quasi-pseudo-MV algebras, Soft Computing, 19(2), 269-282 (2015). (SCI)

36 Wenjuan Chen*, Bijan Davvaz, Intuitionistic fuzzy subbialgebras and duality, Journal of Applied Mathematics, no.523245, 7 pages (2014). SCI

37 Muhammad AkramWenjuan Chen, Bijan DavvazOn N-hypergraphs, Journal of Intelligent & Fuzzy Systems, 26(6), 2937-2944 (2014). SCI

38 Wenjuan Chen*, Wenxu Ge, Fuzzy subbialgebras and duality, Utilitas Mathematica, 87, 13-20 (2012). SCI

39 Muhammad Akram, Wenjuan Chen*, Generalized anti fuzzy Lie algebras, Utilitas Mathematica, 87, 111-122 (2012). SCI

40 Wenjuan Chen *, Muhammad Akram, Yanyong Guan, Intuitionistic fuzzy subcoalgebras of coalgebras, Ars Combinatoria, 106, 423-434 (2012). SCI

41 Wenjuan Chen *, Intuitionistic fuzzy quotient Lie superalgebras, International Journal of Fuzzy Systems, 12(4), 330-339 (2010). SCI

42 Wenjuan Chen *, Fuzzy subcoalgebras and duality, Bulletin of the Malaysian Mathematical Sciences Society, 32(3), 283-294 (2009). (SCI)

43 Wenjuan Chen *, Shunhua Zhang, Intuitionistic fuzzy Lie sub-superalgebras and intuitionistic fuzzy ideals, Computers & Mathematics with Applications, 58(8), 1645-1661 (2009). (SCI)

44.Xiuyun Wang, Yanquan Feng. Tetravalent half-edge-transitive graphs and non-normal Cayley graphs, Journal of Graph Theory, 2012, 70(2): 197-213.

45.Xiuyun Wang, Yanquan Feng, Jinxin Zhou,Jihui Wang, Qiaoling Ma.Tetravalent half-arc-transitive graphs of order a product of three primes. Discrete Mathematics, 2016, 339(5): 1566-1573.

46.Chengbo Xu*, Zhongtian Jia, Yan Ma, A Secure and Efficient Dynamic Identity Based Authentication Scheme for Multi-Server Environment Using Smart Cards, International Journal of Future Generation Communication and Networking,  6(3), 25-40, 2013 (EI)

47.Chengbo Xu*, Zhongtian Jia, Yan Ma, A Novel Dynamic Identity Based Authentication Scheme for Multi-Server Environment Using Smart Cards, International Journal of Security and Its Applications, 7(4), 105-118, 2013  (EI)

48 Chengbo Xu*, Zhongtian Jia, Yan Ma, Cryptanalysis and Improvement of A Dynamic ID Based Remote User Authentication Scheme Using Smart Cards, Journal of Computational Information Systems, 9(14), 5513-5520, 2013 (EI)

 
» 上一篇:应用数学研究所
» 下一篇:金融数学与风险管理研究所
check_website_is_ok,made by zheng_guang_yu,Do not delete
 
Copyright 济南大学数学科学学院. All rights reserved.
地址:济南市市中区南辛庄西路336号济南大学西校区第七教学楼   邮编:250022   电话(传真):0531-82767313