加入24年中科院考研群 加入24年中科大考研群
中国科学院信息工程研究所胡磊 男 博导
 

科院考研推荐链接:

考研资料:中科院考研真题  

考研信息:找个直系学长,咨询考研问题   

考研一对一:学长带队,复习不累

研究领域

   

招生信息

   
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术

教育背景

   
学历
   
学位
   

工作经历

   
工作简历
   
社会兼职
2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委, 
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委

教授课程

信息安全数学基础
RFID安全算法与协议
后量子密码学
密码分析学
代数编码

专利与奖励

   
奖励信息
(1) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018
(2) 非线性密码函数和循环码, 二等奖, 省级, 2017
(3) 岗位教师考核教学单项优秀, 研究所(学校), 2017
(4) XXX密码算法, 一等奖, 部委级, 2009
(5) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果
( 1 ) 提高有限域上乘法以及大矩阵消元的计算速度的方法, 2010, 第 1 作者, 专利号: ZL 2007 1 0003362.6
( 2 ) 射频识别系统隐私认证方法, 2010, 第 1 作者, 专利号: ZL 2007 1 0003363.0
( 3 ) 带隐私保护的基于口令认证的三方密钥交换方法, 2011, 第 1 作者, 专利号: ZL 200710087551.6
( 4 ) 基于稀疏树的动态密钥更新的射频识别隐私认证方法, 2011, 第 1 作者, 专利号: ZL 200710079614.3
( 5 ) 获取分组密码活跃S盒个数下界的方法, 2016, 第 1 作者, 专利号: ZL 2013 1 0368578.8
( 6 ) 分组密码抗线性攻击安全性的评估方法, 2017, 第 1 作者, 专利号: ZL 2014 1 0331997.9

出版信息

   
发表论文
(1) Lightweight Iterative MDS Matrices: How Small Can We Go?, IACR Transactions on Symmetric Cryptology (FSE), 2019-12, 第 5 作者
(2) 有限域上几类置换和完全置换, 密码学报, 2019-10, 第 2 作者
(3) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, CRYPTO 2019, 2019-08, 第 5 作者
(4) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, CRYTO 2019, 2019-08, 第 3 作者
(5) Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits, IACR Transactions on Symmetric Cryptology (FSE), 2019-03, 第 5 作者
(6) Unbalanced Sharing: A Threshold Implementation of SM4, SCIENCE CHINA Information Sciences, 2019-01, 第 4 作者
(7) Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints, Asiacrypt 2018, 2018-12, 第 6 作者
(8) Three new classes of generalized almost perfect nonlinear power functions, Finite Fields and Their Applications, 2018-09, 第 2 作者
(9) A construction of 1-resilient Boolean functions with good cryptographic properties, Journal of Systems Science and Complexity, 2018-08, 第 2 作者
(10) Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy, ISC 2018-The 21st Information Security Conference-ISC2018, 2018-05, 第 4 作者
(11) On the Complexity of Impossible Differential Cryptanalysis, Security and Communication Networks, 2018-04, 第 2 作者
(12) New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}, Cryptography and Communications, 2018-01, 第 2 作者
(13) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., Design, Codes Cryptography, 2017-08, 第 3 作者
(14) Cryptanalysis of Dual RSA, Designs, Codes and Cryptography, 2017, 第 2 作者
(15) Several Classes of Boolean Functions with FourValued Walsh Spectra, International Journal of Foundations of Computer Science (IJFCS), 2017, 第 2 作者
(16) 有限域上置换多项式的几种构造, 密码学报, 2017, 第 2 作者
(17) Further results on permutation trinomials over finite fields with even characteristic, Finite Fields and Their Applications, 2017, 第 2 作者
(18) Analysis of AES, SKINNY, and Others with Constraint Programming, IACR Transactions on Symmetric Cryptology, 2017, 第 7 作者
(19) Improved linear (hull) cryptanalysis of round-reduced versions of SIMON, Science China Information Sciences, 2017, 第 2 作者
(20) Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}, Finite Fields and Their Applications, 2016, 第 2 作者
(21) Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$, SCIENCE CHINA Mathematics, 2015, 第 2 作者
(22) The weight distributions of two classes of binary cyclic codes, Finite Fields and Their Applications, 2015, 第 3 作者
(23) Two Constructions of Balanced Boolean Functions with Optimal Algebraic Immunity, High Nonlinearity and Good Behavior against Fast Algebraic Attacks, Designs, Codes and Cryptography, 2015, 第 4 作者
(24) The weight distributions of a class of non-primitive cyclic codes with two nonzeros, Science China Mathematics, 2015, 第 3 作者
(25) Cyclotomic Constructions of Zero-Difference Balanced Functions with Applications, IEEE Transactions on Information Theory, 2015, 第 2 作者
(26) The weight distribution of a family of p-ary cyclic codes, Designs, Codes and Cryptography, 2015, 第 4 作者
(27) Differential Fault Attack on Zorro Block Cipher, Security and Communication Networks, 2015, 第 2 作者
(28) Improved MILP modeling for automatic security evaluation and application to FOX , IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2015, 第 2 作者
(29) 19 轮RECTANGLE-80 的相关密钥差分分析, 密码学报, 2015, 第 2 作者
(30) Constructing permutations and complete permutations over finite fields via subfield-valued polynomials, Finite Fields and Their Applications, 2015, 第 2 作者
(31) Constructing permutation polynomials from piecewise permutations,  Finite Fields and Their Applications, 2014, 第 2 作者
(32) A generic homomorphic MAC construction for authentication in network coding, Security and Communication Networks , 2014, 第 2 作者
(33) Constructing new APN functions from known PN functions, International Journal of Foundations of Computer Science, 2014, 第 2 作者
(34)  Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences,  Chinese Journal of Electronics, 2014, 第 3 作者
(35) 模背包向量问题的实际复杂度与基于格密码体制的实际安全性, 密码学报, 2014, 第 2 作者
(36) Quadratic Bent and Semi-Bent Functions over Finite Fields of Odd Characteristic, Chinese Journal of Electronics, 2014, 第 3 作者
(37) Projective Interpolation of Polynomial Vectors and Improved Key Recovery Attack on SFLASH, Designs, Codes and Cryptography, 2014, 第 2 作者
(38) Cryptanalysis of two cryptosystems based on multiple intractability assumptions, IET Communications, 2014, 第 2 作者
(39) Cryptanalysis of Countermeasures Against Multiple Transmission Attacks on NTRU, IET Communications, 2014, 第 2 作者
(40) New constructions of APN polynomial functions in odd characteristic, Applicable Algebra in Engineering, Communication and Computing, 2014, 第 2 作者
(41) The weight distributions of two classes of p-ary cyclic codes, Finite Fields and Their Applications, 2014, 第 3 作者
(42) Cryptographic Properties of Nested Functions and Algebraic Immunity of the Boolean Function in Hitag2 Stream Cipher, Cryptography and Communications, 2014, 第 2 作者
(43) The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs, IEEE Transactions on Information Theory, 2014, 第 11 作者
(44) Several classes of complete permutation polynomials,  Finite Fields and Their Applications, 2014, 第 3 作者
(45) Constructing new differentially 4-uniform permutations from the inverse function,  Finite Fields and Their Applications, 2014, 第 2 作者
(46) Periods of Polynomials over a Galois Ring, SCIENCE CHINA Mathematics, 2013, 第 2 作者
(47) Permutation polynomials with low differential uniformity over finite fields of odd characteristic, SCIENCE CHINA Mathematics, 2013, 第 11 作者
(48) New Optimal Frequency Hopping Sequence Sets from Balanced Nested Difference Packings of Partition-Type, International Journal of Foundations of Computer Science, 2013, 第 4 作者
(49) Analysis of Two Knapsack Public Key Cryptosystems, IET Communications, 2013, 第 2 作者
(50) On a class of binomial bent functions over the finite fields of odd characteristic, Applicable Algebra in Engineering, Communication and Computing, 2013, 第 3 作者
(51) Efficient bidirectional proxy re-encryption with direct chosen-ciphertext Security, Computers and Mathematics with Applications, 2012, 第 2 作者
(52) A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions, Finite Fields and Their Applications, 2012, 第 3 作者
(53) On the reducibility of some composite polynomials over finite fields, Designs, Codes and Cryptography, 2012, 第 2 作者
(54) Two Classes of Permutation Polynomials over Finite Fields, Finite Fields and Their Applications, 2012, 第 2 作者
(55) A matrix construction of Boolean functions with maximum algebraic immunity, Journal of Systems Science and Complexity, 2012, 第 2 作者
(56) Cryptanalysis of a multivariate public key encryption scheme with internal perturbation structure, Chinese Journal of Electronics, 2011, 第 1 作者
(57) On the correlation distributions of optimal quaternary sequence Family U and optimal binary sequence family V, IEEE Transactions on Information Theory, 2011, 第 4 作者
(58) Tr(x^{2^{n/2}+2^{n/2-1}+1})的二阶非线性度下界, 通信学报, 2011, 第 3 作者
(59) Construction of 1-resilient Boolean functions with optimum algebraic immunity, International Journal of Computer Mathematics, 2011, 第 3 作者
(60) 对psFlash扰动公钥密码的一个实际攻击, 计算机学报, 2011, 第 1 作者

 

 


 

 

 

 
 
上一篇:外语系胡骏 男 下一篇:数学与系统科学研究院胡齐芽 男 博导

在线咨询

进入QQ咨询

王老师

微信咨询

杨老师

进入20中科院QQ群

709867297

进入20中科大QQ群

680149146

友情链接

科大科院考研网版权所有 © 2020-2022 皖ICP备2021018242号