图片展示

图片展示

图片展示
图片展示

姓名: 可可 性别: 

学历: 博士 职称: 副教授

毕业: 中国科学院 英语: 六级

政治: 中共党员 籍贯: 江西·九江


邬可可2010年博士毕业于中国科学院–计算技术研究所,2008年在澳大利亚新南威尔士大学(UNSW)做访问学者,现任深圳信息职业技术学院副教授,国家密码管理局外聘专家,广东省自然科学基金项目评审专家,深圳市科技创新委员会专家库成员。研究领域包括区块链技术、密码芯片的侧信道分析技术。作为重要成员参与863计划、国家自然科学基金等多项密码芯片领域的研究课题;主持广东省自然科学基金项目2项,主持深圳市基础研究项目2项。发表论文31篇,申请发明专利10项。


研究方向 1) 区块链系统去中心化程度评估准则研究;

2)基于图论拓扑结构的区块链系统交易行为的预警与评判机制研究;

3)基于区块链公链数据的密钥生成机制与一次一密机制的算法研究;

4)金融安全芯片中密码算法引擎的计算效率与安全性研究。


研究成果 发表论文31篇,其中4SCI检索、22EI检索;申请发明专利10项。


留学经历 2008年(博士) 访问学者

澳大利亚·新南威尔士大学(UNSW 指导老师:Max.Ott

研究方向:信息安全、椭圆曲线密码算法设计


教育经历 2007 – 2010(博士)

中国科学院·计算技术研究所 专业:计算机系统结构

研究方向:信息安全 指导老师:樊建平、李慧云

学位论文:抵御侧信道攻击的快速安全椭圆曲线密码设计


主持项目

  1. 2018 – 2021 广东省自然科学基金项目:防御物理攻击的密码芯片安全算法设计与研究(编号:2018A030313746,在研,主持,单位:深圳信息职业技术学院。
  2. 2018 – 2020 深圳市基础研究项目商用密码芯片中防御物理攻击的算法安全与芯片安全(编号:JCYJ20170817114239348,在研,主持,单位:深圳信息职业技术学院。
  3. 2015 – 2018 广东省自然科学基金项目:金融安全芯片中ECC密码算法引擎的计算效率与安全性研究(编号:2014A030310299,已结题,主持,单位:深圳信息职业技术学院。
  4. 2016 – 2018 深圳市基础研究项目:信息安全芯片中基于椭圆曲线代数结构理论的侧信道防御技术研究(编号:JCYJ20160415113927863,已结题,主持,单位:深圳信息职业技术学院。


参与项目

2007 – 2009 国家863计划项目:密码设备的侧信道分析技术(编号:2007AA01Z459),单位:中国科学院·深圳先进技术研究院; 本人排名:第4

2010 – 2012 国家自然科学基金-青年科学基金项目:在设计阶段验证密码芯片安全程度的方法(编号:60901052),单位:中国科学院·深圳先进技术研究院; 本人排名:第3

2010 – 2012 深圳市科技研发资金项目:在设计阶段验证密码芯片安全程度的方法( 编号:ZYC201006170398A),单位:中国科学院·深圳先进技术研究院; 本人排名:第2

2009 – 2011 深圳市基础研究项目:移动支付安全芯片的测评与设计技术 (编号:JC200903160412A),单位:中国科学院·深圳先进技术研究院;本人排名:第3


申请发明专利

  1. 发明人:邬可可,林福祥。发明专利,“一种无线局域网的自动接入方法及装置”。已授权。申请号:201010609308.8,申请日:2010-12-28。公开号:102572835A授权公告号:CN102572835B授权日期:2015-09-16
  2. 发明人:邬可可,胡光武,黄国伟。发明专利,“椭圆曲线加密的点乘方法、装置及计算机可读存储介质”。申请号:201810335786.0,申请日期:2018-04-13。申请公布号:CN 108512663 A,公开日期:2018.09.07
  3. 发明人:邬可可。发明专利,“一种椭圆曲线标量乘方法”。申请号:201710298620.1,申请日期:2017-04-27。申请公布号:CN 107248916 A,公开日期:2017.10.13
  4. 发明人:邬可可,李慧云,徐国卿。发明专利,“椭圆曲线标量乘的并行处理方法及系统”。申请号:201110279971.0,申请日期:2011-09-20。公开号:CN102446088A,公开日期:2012-05-09
  5. 发明人:邬可可,李慧云,于峰崎。发明专利,“密码保护方法和系统”。申请号:200910105557.0申请日:2009-02-24。公开号:CN101488846,公开日期:2009-07-22
  6. 发明人:陈廷定,李慧云,邬可可。发明专利,“抗侧信道攻击的椭圆曲线密码系统实现方法”。申请号:200910106941.2申请日:2009-05-06。公开号:CN101562522,公开日期:2009-10-21
  7. 发明人:孔令晶、黄国伟、邬可可。发明专利,“网络流应用类型识别的方法、装置及计算机可读存储介质”。申请号:201810407503.9,申请日期:2018-04-28。申请公布号:CN 108667747 A,公开日期:2018.10.16
  8. 发明人:闫立军、刘星明、潘正祥、唐琪、邬可可。发明专利,“基于L2,1范数的脑电信号特征选择方法”。申请号:201810488071.9,申请日期:2018-05-21。申请公布号:CN 108764094 A,公开日期:2018.11.06
  9. 发明人:白雪峰、蔡铁、闫立军、刘星明、邬可可。发明专利,“基于多特征点判别分析的特征提取方法”。申请号:201810487526.5,申请日期:2018-05-21。申请公布号:CN 108764318 A,公开日期:2018.11.06
  10. 发明人:闫立军、周莹、潘正祥、刘星明、邬可可。发明专利,“基于分数阶特征线分析的特征提取方法”。申请号:201810488357.7,申请日期:2018-05-21。申请公布号:CN 108764320 A,公开日期:2018.11.06

发表论文31篇,其中4SCI22EI4篇中文核心)


第一作者:

  1. Keke Wu, “Flexible Parallel Computing for Elliptic Curve Scalar Multiplication with Resistance against Simple Side-Channel Attacks”, Journal of Computers (Taiwan), Vol. 28, No. 6, December, 2017, pp. 64-78. ISSN: 1991-1599, doi:10.3966/199115992017122806006, Computer Society of the Republic of China. (EI期刊)
  2. Keke Wu, Huiyun Li, Dingju Zhu, “Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems”, Security and Communication Networks, Volume.5, Issue 6, pp.648–657, June 2012, Wiley-Blackwell, ISSN: 1939-0114. (SCI / EI)
  3. Keke Wu, Huiyun Li, Dingju Zhu, Fengqi Yu, “Efficient solution to secure ECC against side-channel attacks”, Chinese Journal of Electronics, Volume 20, Issue 3, 2011, pp. 471–475, Technology Exchange Limited Hong Kong, ISSN: 1022-4653. (SCI)
  4. Keke Wu, Huiyun Li, Xucheng Yin, Guoqing Xu, “Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks”, The 7th International Conference on Computational Intelligence and Security (CIS2011), December 3-4, 2011, Sanya, China, IEEE Computer Society Press. (EI / ISTP)
  5. 邬可可,李慧云,闫立军,“一种防御差分功耗分析的ECC同种映射模型”,《计算机工程》,2017年第10期,43(10)p.115-119。(北大中文核心期刊,中科院CSCD核心期刊)
  6. 邬可可,高月芳,闫立军,“一种抵御差分侧信道分析的椭圆曲线同构方法”,《计算机与现代化》,2017年第10期,266(10)p.105-110。(中国科技核心)
  7. 邬可可,黄国伟,孔令晶,“一种灵活的椭圆曲线密码并行化方法”,《计算机与现代化》,2018年第2期,270(2)p.71-75。(中国科技核心)
  8. 邬可可,李慧云,于峰崎,“可防御侧信道攻击的高效椭圆曲线标量乘方法”,《高技术通讯》,2011215, pp. 495–502国内刊号:CN 11-2770/N, ISSN: 1002-0470(EI /中文核心)
  9. Keke Wu, Huiyun Li, Fengqi Yu, “Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks”, Journal of Computers, Volume 5, Issue 12, 2010, pp. 1878–1884, ISSN: 1796-203X, Academy Publisher. (EI)
  10. 邬可可,李慧云,于峰崎,“对同步流密码设备的相关性功耗分析(CPA)攻击”,《高技术通讯》,20091911期,pp. 1142–1147国内刊号:CN 11-2770/N, ISSN: 1002-0470(EI /中文核心)
  11. Keke Wu, Dawei Li, Huiyun Li, Tingding Chen, Fengqi Yu, “Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems”, The Fifteenth International Conference on Parallel and Distributed Systems (ICPADS 2009), 2009.12.09- 12.11, IEEE Computer Society Press. (EI)
  12. Keke Wu, Huiyun Li, Tingding Chen, Fengqi Yu, “Electromagnetic Analysis on Elliptic Curve Cryptosystems: Measures and Counter-Measures for Smart Cards”, 2009 International Symposium on Intelligent Information Technology Application (IITA 2009), IEEE Computer Society Press. (EI / ISTP)
  13. Keke Wu, Huiyun Li, Tingding Chen, Fengqi Yu, “Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work”, The Second International Symposium on Electronic Commerce and Security (ISECS 2009), IEEE Computer Society Press. (EI)
  14. Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu, “Correlation Power Analysis Attack against Synchronous Stream Cipher”, The 9th International Conference for Young Computer Scientists (ICYCS 2008), IEEE Computer Society Press. (EI / ISTP)
  15. 邬可可,张平安,延霞,“椭圆曲线密码芯片安全与效率的博弈”,《深圳信息职业技术学院学报》,2014123期,pp.18-23


第二作者:

  1. 程东升,邬可可,刘志勇,“基于混沌伪随机匹配移位的图像加密算法”,《信息通信》,pp. 7-92016年第8期。
  2. Huiyun Li, Keke Wu, Fengqi Yu, “Enhanced Correlation Power Analysis Attack against Trusted Systems”, Security and Communication Networks; Volume.4, Issue 1, 2011, pp. 3–10, Wiley-Blackwell. (SCI / EI)
  3. 张翌维,邬可可,陈佳佩,“一种抵御侵入式分析的密码芯片存储总线”,小型微型计算机系统,第33卷,第4期,20124月,pp. 785-788, CN: 21-1106/TP, ISSN: 1000-1220。(中文核心)
  4. Huiyun Li, Keke Wu, Guoqing Xu, Hai Yuan and Peng Luo, “Simple Power Analysis Attacks Using Chosen Message against ECC Hardware Implementations”, World Congress on Internet Security (WorldCIS-2011), Feb 21-23, 2011, UK, IEEE Computer Society Press. (EI / ISTP)
  5. Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan, “Evaluation Metrics of Physical Non-Invasive Security”, Fourth Workshop in Information Security Theory and Practice (WISTP 2010): Security and Privacy of Pervasive Systems and Smart DevicesApril 13-14, Passau, Germany, Springer: LNCS (EI)
  6. Huiyun Li, Keke Wu, Fengqi Yu, “Enhanced Correlation Power Analysis Attack on Smart Card”, The 9th International Conference for Young Computer Scientists (ICYCS 2008), IEEE Computer Society Press. (EI / ISTP)


第三作者:

  1. Lingjing Kong, Guowei Huang, Keke Wu, “Identification of Abnormal Network Traffic Using Support Vector Machine”, International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2017), Taipei Taiwan, December 18-20, 2017. (EI)
  2. Guowei Huang, Lingjing Kong, Keke Wu, Zhi Chen, “A Bandwidth Allocation Policy for Helpers in Cloud-assisted P2PVideo-on-demand Systems”, 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD 2017), August 13-16, Shanghai, China. (EI)
  3. Guowei Huang, Lingjing Kong, Keke Wu, Zhi Chen, “A Service Scheduling Policy for Improving Playback Quality of Mesh-based P2P VoD Systems”, The 16th IEEE International Conference on Ubiquitous Computing and Communications, December 12-15, 2017. (EI)
  4. Guowei Huang, Lingjing Kong, Keke Wu, “An Incentive scheme based on Bitrate Adaptation for Cloud-Assisted P2P Video-on-demand Streaming Systems”, the 3rd IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), April 20-22, 2018, Chengdu, China, ICCCBDA 2018 Conference Proceedings. (EI)
  5. Huiyun Li, Tingding Chen, Keke Wu, Fengqi Yu, “Quantitative Evaluation of Side-channel Security”, 2009 Asia-Pacific Conference on Information Processing (APCIP 2009), IEEE Computer Society Press. (EI / ISTP)
  6. Huiyun Li, Tingding Chen, Keke Wu, Fengqi Yu, “Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems”, 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication 2009 (ICASID 2009), IEEE Computer Society Press. (EI / ISTP)
  7. Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu, “Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure”, 2009 Asia-Pacific Conference on Information Processing (APCIP 2009), IEEE Computer Society Press. (EI / ISTP)
  8. Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu, “Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices”, 2009 International Conference on Computer and Communications Security (ICCCS 2009), IEEE Computer Society Press. (EI / ISTP)


第四作者:

  1. Ying Zhou, Jiahai Wang, Ziyan Wu, Keke Wu, “A multi-objective tabu search algorithm based on decomposition for multi-objective unconstrained binary quadratic programming problem”, Knowledge-Based Systems, Volume 141, 1 February 2018, Pages 18–30. (SCI)
  2. Jeng-Shyang Pan, Lijun Yan, Xingming Liu, Keke Wu, “Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification”, Journal of Information Hiding and Multimedia Signal Processing, Volume 7, Number 6, November 2016, ISSN 2073-4212, pp. 1337-1344. (EI)



CONTACT US 联系我们

sz_insilico

 

insilicochina

 

insilicochina

SilicoDesign/Blockchain-Tech

 

0755-8653 4493

 silico@silico.design

深圳市南山区科技南十二路18号长虹科技大厦2306室

图片展示

Copyright © 2018-2028 www.insil.co All Rights Reserved 深圳市芯链科技有限公司 粤ICP备15041489号