Zhou Yue

Zhou Yue (周岳) (died 893), courtesy name Junzhao (峻昭),[1] was a warlord late in the Chinese dynasty Tang Dynasty, who controlled Wu'an Circuit (武安, headquartered in modern Changsha, Hunan) from 886 to 893.

Background and takeover of Heng Prefecture

It is not known when Zhou Yue was born, and not much is known about his background, as there was no biography for him in either of the official histories of Tang Dynasty (the Old Book of Tang and the New Book of Tang). It is known that he was from Zouxi (陬溪, in modern Changde, Hunan), and likely of non-Han extraction, for he was an associate of the non-Han Lei Man and hunted with Lei. On one occasion when they hunted together, they fought over the distribution of the meat, and he tried to kill Lei but could not.[2]

In 881, Lei gathered a group of men and attacked and captured Lang Prefecture (朗州, in modern Changde), which Zouxi belonged to. Zhou, hearing this news, gathered a group of men as well and attacked Heng Prefecture (modern Hengyang in Hunan), expelling the prefect Xu Hao (徐顥). Then-reigning Emperor Xizong, then facing the major rebellion of the agrarian rebel Huang Chao, commissioned Zhou as the prefect of Heng.[2]

Takeover of Wu'an Circuit

In 886, Zhou Yue attacked Tan Prefecture (in modern Changsha), which was then the capital of Qinhua Circuit. The military governor (Jiedushi) of Qinhua, Min Xu, invited Huang Hao (黃皓), a general of the warlord Qin Zongquan, who had claimed imperial title at Cai Prefecture (蔡州, in modern Zhumadian, Henan), into Tan Prefecture to help him defend it. Instead, Huang killed Min and took over Tan Prefecture. Zhou then arrived, defeated Huang, and executed him, taking over Tan Prefecture. Emperor Xizong then commissioned Zhou as military governor and changed the name of the circuit from Qinhua to Wu'an.[3] In 891, Emperor Xizong's brother and successor Emperor Zhaozong commissioned Zhou to be the military governor of Lingnan West Circuit (嶺南西道, headquartered in modern Nanning, Guangxi). (It is not clear whether the commission was intended to give Zhou an extra circuit, or for him to transfer to Lingnan West; in any case, it appeared that Zhou never actually went to Lingnan West.)[4]

Death

Zhou Yue's rule of Wu'an Circuit was not uncontested, however. Deng Chune the prefect of Shao Prefecture (邵州, in modern Shaoyang, Hunan) had long claimed that Zhou was responsible for Min Xu's death and called for his soldiers to follow him in avenging Min's death. In 893, Deng allied with Lei, and they attacked Tan Prefecture together. They captured it and killed Zhou. Deng then took over as acting military governor.[5]

Notes and references

  1. New Book of Tang, vol. 186.
  2. Zizhi Tongjian, vol. 254.
  3. Zizhi Tongjian, vol. 256.
  4. Zizhi Tongjian, vol. 258.
  5. Zizhi Tongjian, vol. 259.
gollark: Specifically, 22 bytes for the private key and 21 for the public key on ccecc.py and 25 and 32 on the actual ingame one.
gollark: <@!206233133228490752> Sorry to bother you, but keypairs generated by `ccecc.py` and the ECC library in use in potatOS appear to have different-length private and public keys, which is a problem.EDIT: okay, apparently it's because I've been accidentally using a *different* ECC thing from SMT or something, and it has these parameters instead:```---- Elliptic Curve Arithmetic---- About the Curve Itself-- Field Size: 192 bits-- Field Modulus (p): 65533 * 2^176 + 3-- Equation: x^2 + y^2 = 1 + 108 * x^2 * y^2-- Parameters: Edwards Curve with c = 1, and d = 108-- Curve Order (n): 4 * 1569203598118192102418711808268118358122924911136798015831-- Cofactor (h): 4-- Generator Order (q): 1569203598118192102418711808268118358122924911136798015831---- About the Curve's Security-- Current best attack security: 94.822 bits (Pollard's Rho)-- Rho Security: log2(0.884 * sqrt(q)) = 94.822-- Transfer Security? Yes: p ~= q; k > 20-- Field Discriminant Security? Yes: t = 67602300638727286331433024168; s = 2^2; |D| = 5134296629560551493299993292204775496868940529592107064435 > 2^100-- Rigidity? A little, the parameters are somewhat small.-- XZ/YZ Ladder Security? No: Single coordinate ladders are insecure, so they can't be used.-- Small Subgroup Security? Yes: Secret keys are calculated modulo 4q.-- Invalid Curve Security? Yes: Any point to be multiplied is checked beforehand.-- Invalid Curve Twist Security? No: The curve is not protected against single coordinate ladder attacks, so don't use them.-- Completeness? Yes: The curve is an Edwards Curve with non-square d and square a, so the curve is complete.-- Indistinguishability? No: The curve does not support indistinguishability maps.```so I might just have to ship *two* versions to keep compatibility with old signatures.
gollark: > 2. precompilation to lua bytecode and compressionThis was considered, but the furthest I went was having some programs compressed on disk.
gollark: > 1. multiple layers of sandboxing (a "system" layer that implements a few things, a "features" layer that implements most of potatOS's inter-sandboxing API and some features, a "process manager" layer which has inter-process separation and ways for processes to communicate, and a "BIOS" layer that implements features like PotatoBIOS)Seems impractical, although it probably *could* fix a lot of problems
gollark: There's a list.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.