
一、基本情況
姓名:張莎莎
學位:博士
職稱:副教授
研究方向:密碼學
聯系方式:amushasha@163.com
二、教育背景
2000.9-2004.6 |
永利數學與計算機科學學院 |
數學與應用數學專業 |
2004.9-2009.6 |
武漢大學數學與統計學院 |
基礎數學專業 |
三、工作經曆
2009.7-2022.7 |
永利數學與統計學學院 |
2022.7至今 |
yl7703永利 |
四、教學情況
擔任本科生《高等數學》《複變函數》《密碼學導論》等課程的教學工作;擔任研究生《密碼分析》等的課程的教學工作。
五、主持項目
主持國家自然科學基金1項、其它項目3項。
六、論文情況
(1)馬俊如,張莎莎*,曾祥勇.弱APN函數的進一步研究,系統科學與數學,37(11):2301-2316,2017.
(2)李兆晖,張莎莎*,徐運閣.一個Cluster-Tilted代數的Hochschild同調與循環同調,數學的實踐與認識,47(11):199-205,2017.
(3)Shi Wang,Zejun Xiang,Xiangyong Zeng,Shasha Zhang.Improved Integral Attacks on PRESENT-80,Inscrypt 2018,Lecture Notes in Computer Science11449:163-182,2019.
(4)Siwei Chen,Zejun Xiang,Xiangyong Zeng,Shasha Zhang.Cube Attacks on Round-Reduced MORUS and Gimli,Science China Information Sciences,2022,65(1),119101.
(5)Zejun Xiang,Xiangyong Zeng,Shasha Zhang.On the Bit-Based Division Property of S-boxes,Science China Information Sciences,Science China Information Sciences,65(4),2022.
(6)Zejun Xiang,Xiangyong Zeng,Da Lin andShasha Zhang.Optimizing Implementations of Linear Layers. IACR Transactions on Symmetric Cryptology:120-145,2020.
(7)Chunlei Hong,Shasha Zhang,Siwei Chen, Da Lin,Zejun Xiang. More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layers.Inscrypt 2021:212-232,2021.
(8)Da Lin,Zejun Xiang,Xiangyong Zeng,andShasha Zhang. A Framework to Optimize Implementations of Matrices. CT-RSA 2021.Springer,Cham,2021.
(9)Siwei Chen,Zejun Xiang,Xiangyong Zeng andShasha Zhang.On the Relationships between Different Methods for Degree Evaluation.IACR Transactions on Symmetric Cryptology,2021(1): 411-442.
(10)Lin Yi,Xiangyong Zeng, Zimin Sun,Shasha Zhang.On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period 4p^n,Advances in Mathematics of Communications,online,2021.
(11)林達,向澤軍,張若琳,張莎莎,曾祥勇.SM4算法的量子實現.密碼學報,8(6): 999-1018,2021.
(12)劉勇,陳思維,張莎莎,向澤軍,曾祥勇,Subterranean-SAE算法的條件立方攻擊,密碼學報,9(1): 45–59,2022.
(13)Xiaofang Xu,Xiangyong Zeng,Shasha Zhang.Regular complete permutation polynomials over ${\mathbb {F}}_{2^{n}}$. Des. Codes Cryptogr.90(3): 545-575,2022.
(14)Siwei Chen,Zejun Xiang,Xiangyong Zeng,Shasha Zhang.Conditional Cube Attacks on Full Members of KNOT-AEAD Family.ICICS 2022:89-108.
(15)Yan Tong,Xiangyong Zeng, Shasha Zhang, Shiwei Xu,Zhengwei Ren.The estimates of trigonometric sums and new bounds on a mean value,a sequence and a cryptographic function. Designs,Codes and Cryptography,2022,https://doi.org/10.1007/s10623-022-01140-1
(16)Runqing Xu,Zejun Xiang,Da Lin,Shasha Zhang,Debiao He, Xiangyong Zeng.High-throughput block cipher implementations with SIMD,Journal of Information Security and Applications 70(2022)103333
(17)黃明,張莎莎,洪春雷,曾樂,向澤軍.分組密碼複雜線性層可分性傳播的MILP刻畫新方法,軟件學報,2023.