一、基本信息

研究领域:密码学

办公地点:计算机楼609B

办公电话:13828439968

电子邮箱:kelishan@gzhu.edu.cn                                             


二、个人简介

广州大学专任教师,本硕博士毕业于广州大学,师从原中国密码学会理事长裴定一教授,研究方向为密码学。截止目前,发表学术论文十余篇,主持广东省自然科学基金项目1项(项目编号:2018A030310071 ),广东省自筹经费类科技计划项目1项(项目编号:2017ZC0349),获广州大学第十届青年教师教学竞赛二等奖、广东省第五届青年教师教学竞赛二等奖。


二、教育背景

2012/09-2015/07,  广州大学,数学与信息科学学院,博士;

2009/09-2012/07,  广州大学,数学与信息科学学院,硕士;

2005/09-2009/07, 广州大学,数学与信息科学学院,学士。


三、职业经历

2015年博士毕业后在广州大学任教至今。


四、教授课程

信息安全基础数学、近世代数、数学分析、奥林匹克数学、数学方法论与解题研究、初等数论及其前沿应用、高等数学、线性代数


五、近期发表的期刊文章

[1] Lishan Ke, Zongxiang Yi, and Yan Ren. Improved Broadcast Encryption Schemes with Enhanced Security. Journal of Ambient Intelligence and Humanized Com- puting, 6(1):121- 129, 2015.

[2] Lishan Ke, and Zhiqiang Lin. On the collision problem of ring FCSR[J]. Journal of Computational Information Systems, 11(10): 3799-3807, 2015.

[3] Lishan Ke, and Zhiqiang Lin. Distribution properties and 2-adic complexity of clock-controlled FCSR sequences[C]. 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, pp. 386-389, 2015.

[4] Zhiqiang Lin, Lishan Ke, Dongdai lin. On the LFSRization of a Class of FCSR Automata[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015, 98(1): 434-440.

[5] Yuyin Yu, Lishan Ke, Zhiqiang Lin, and Qiuyan Wang. Permutation Polynomials overand Their Randomness[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 100(3): 913-915, 2017.

[6] Khaled Riad, and Lishan Ke. Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval[J]. Wireless Communications & Mobile Comput- ing, pp. 5452463:1-5452463:8, 2018.

[7] Khaled Riad, and Lishan Ke. RoughDroid: Operative Scheme for Functional And- roid Malware Detection[J]. Security and Communication Networks, pp. 8087303: 1-80 87303:10, 2018.

[8] Zongxiang Yi, Zhiqiang Lin, and Lishan Ke. A Generic Method to Construct Zero-difference Balanced Functions[J]. Cryptography and Communications, 10(4): 591-609, 2018.

[9] .Jingang Liu, and Lishan Ke. New Efficient Identity Based Encryption without Pairings[J]. Journal of Ambient Intelligence and Humanized Computing, 10.4 : 1561- 1570, 2019.

[10] Behnam Zahednejad, Lishan Ke, and Jing Li. A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols [J]. Security and Communication Networks, pp. 1-15, 2020.

[11] Chunhui Wu, Lishan Ke, and Yusong Du. Quantum Resistant Key-exposure Free Chameleon Hash and Applications in Redactable Block-chain[J]. Information Sciences, 548(1):438-449, 2021.

[12] Wenjuan Li, Lishan Ke, Weizhi Meng, and Jinguang Han. An Empirical Study of Supervised Email Classification in Internet of Things: Practical performance and key influencing factors[J]. International Journal of Intelligent Systems, 37(1): 287-304, 2022.