一、基本情况
姓名:张莎莎
学位:博士
职称:副教授
研究方向:密码学
联系方式:amushasha@163.com
二、教育背景
2000.9-2004.6 |
湖北大学数学与计算机科学学院 |
数学与应用数学专业 |
2004.9-2009.6 |
武汉大学数学与统计学院 |
基础数学专业 |
三、工作经历
2009.7-2022.7 |
湖北大学数学与统计学学院 |
2022.7至今 |
湖北大学网络空间安全学院 |
四、教学情况
担任本科生《高等数学》《复变函数》《密码学导论》等课程的教学工作;担任研究生《密码分析》等的课程的教学工作。
五、主持项目
主持国家自然科学基金1项、其它项目3项。
六、论文情况
(1) 马俊如,张莎莎*,曾祥勇.弱APN函数的进一步研究,系统科学与数学,37(11):2301-2316,2017.
(2) 李兆晖,张莎莎*,徐运阁.一个Cluster-Tilted代数的Hochschild同调与循环同调,数学的实践与认识,47(11):199-205,2017.
(3) Shi Wang,Zejun Xiang,Xiangyong Zeng,Shasha Zhang.Improved Integral Attacks on PRESENT-80,Inscrypt 2018,Lecture Notes in Computer Science11449:163-182,2019.
(4) Siwei Chen,Zejun Xiang,Xiangyong Zeng,Shasha Zhang.Cube Attacks on Round-Reduced MORUS and Gimli,Science China Information Sciences,2022,65(1),119101.
(5) Zejun Xiang,Xiangyong Zeng,Shasha Zhang.On the Bit-Based Division Property of S-boxes,Science China Information Sciences,Science China Information Sciences,65(4),2022.
(6) Zejun Xiang,Xiangyong Zeng,Da Lin and Shasha Zhang.Optimizing Implementations of Linear Layers. IACR Transactions on Symmetric Cryptology:120-145,2020.
(7) Chunlei Hong,Shasha Zhang,Siwei Chen, Da Lin,Zejun Xiang. More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers.Inscrypt 2021:212-232,2021.
(8) Da Lin,Zejun Xiang,Xiangyong Zeng,and Shasha Zhang. A Framework to Optimize Implementations of Matrices. CT-RSA 2021.Springer,Cham,2021.
(9) Siwei Chen,Zejun Xiang,Xiangyong Zeng and Shasha Zhang.On the Relationships between Different Methods for Degree Evaluation.IACR Transactions on Symmetric Cryptology,2021(1): 411-442.
(10) Lin Yi,Xiangyong Zeng, Zimin Sun, Shasha Zhang.On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period 4p^n,Advances in Mathematics of Communications,online,2021.
(11) 林达,向泽军,张若琳,张莎莎,曾祥勇.SM4算法的量子实现.密码学报,8(6): 999-1018,2021.
(12) 刘勇,陈思维,张莎莎,向泽军,曾祥勇,Subterranean-SAE算法的条件立方攻击, 密码学报,9(1): 45–59,2022.
(13) Xiaofang Xu,Xiangyong Zeng,Shasha Zhang.Regular complete permutation polynomials over ${\mathbb {F}}_{2^{n}}$. Des. Codes Cryptogr.90(3): 545-575,2022.
(14) Siwei Chen,Zejun Xiang,Xiangyong Zeng,Shasha Zhang.Conditional Cube Attacks on Full Members of KNOT-AEAD Family.ICICS 2022:89-108.
(15) Yan Tong,Xiangyong Zeng, Shasha Zhang, Shiwei Xu,Zhengwei Ren.The estimates of trigonometric sums and new bounds on a mean value,a sequence and a cryptographic function. Designs,Codes and Cryptography,2022,https://doi.org/10.1007/s10623-022-01140-1
(16) Runqing Xu,Zejun Xiang,Da Lin,Shasha Zhang,Debiao He, Xiangyong Zeng.High-throughput block cipher implementations with SIMD,Journal of Information Security and Applications 70(2022)103333
(17) 黄明,张莎莎,洪春雷,曾乐,向泽军.分组密码复杂线性层可分性传播的MILP刻画新方法,软件学报,2023.