加入25年中科院考研群 加入25年中科大考研群
中国科学院信息工程研究所 胡磊 男 博导
 

科院考研推荐链接:

考研资料:中科院考研真题  

考研信息:找个直系学长,咨询考研问题   

考研一对一:学长带队,复习不累

研究领域

   

招生信息

   
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术

教育背景

   
学历
   
学位
   

工作经历

   
工作简历
   
社会兼职
2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委, 
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委

教授课程

信息安全数学基础
RFID安全算法与协议
后量子密码学
密码分析学
代数编码

专利与奖励

   
奖励信息
(1) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018
(2) 非线性密码函数和循环码, 二等奖, 省级, 2017
(3) 岗位教师考核教学单项优秀, 研究所(学校), 2017
(4) XXX密码算法, 一等奖, 部委级, 2009
(5) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果
( 1 ) 提高有限域上乘法以及大矩阵消元的计算速度的方法, 2010, 第 1 作者, 专利号: ZL 2007 1 0003362.6
( 2 ) 射频识别系统隐私认证方法, 2010, 第 1 作者, 专利号: ZL 2007 1 0003363.0
( 3 ) 带隐私保护的基于口令认证的三方密钥交换方法, 2011, 第 1 作者, 专利号: ZL 200710087551.6
( 4 ) 基于稀疏树的动态密钥更新的射频识别隐私认证方法, 2011, 第 1 作者, 专利号: ZL 200710079614.3
( 5 ) 获取分组密码活跃S盒个数下界的方法, 2016, 第 1 作者, 专利号: ZL 2013 1 0368578.8
( 6 ) 分组密码抗线性攻击安全性的评估方法, 2017, 第 1 作者, 专利号: ZL 2014 1 0331997.9

出版信息

   
发表论文
(1) Lightweight Iterative MDS Matrices: How Small Can We Go?, IACR Transactions on Symmetric Cryptology (FSE), 2019-12, 第 5 作者
(2) 有限域上几类置换和完全置换, 密码学报, 2019-10, 第 2 作者
(3) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, CRYPTO 2019, 2019-08, 第 5 作者
(4) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator, CRYTO 2019, 2019-08, 第 3 作者
(5) Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits, IACR Transactions on Symmetric Cryptology (FSE), 2019-03, 第 5 作者
(6) Unbalanced Sharing: A Threshold Implementation of SM4, SCIENCE CHINA Information Sciences, 2019-01, 第 4 作者
(7) Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints, Asiacrypt 2018, 2018-12, 第 6 作者
(8) Three new classes of generalized almost perfect nonlinear power functions, Finite Fields and Their Applications, 2018-09, 第 2 作者
(9) A construction of 1-resilient Boolean functions with good cryptographic properties, Journal of Systems Science and Complexity, 2018-08, 第 2 作者
(10) Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy, ISC 2018-The 21st Information Security Conference-ISC2018, 2018-05, 第 4 作者
(11) On the Complexity of Impossible Differential Cryptanalysis, Security and Communication Networks, 2018-04, 第 2 作者
(12) New results on permutation polynomials of the form(x^{p^m}−x+δ)^s+ x^{p^m}+x over F_{p^{2m}}, Cryptography and Communications, 2018-01, 第 2 作者
(13) Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., Design, Codes Cryptography, 2017-08, 第 3 作者
(14) Cryptanalysis of Dual RSA, Designs, Codes and Cryptography, 2017, 第 2 作者
(15) Several Classes of Boolean Functions with FourValued Walsh Spectra, International Journal of Foundations of Computer Science (IJFCS), 2017, 第 2 作者
(16) 有限域上置换多项式的几种构造, 密码学报, 2017, 第 2 作者
(17) Further results on permutation trinomials over finite fields with even characteristic, Finite Fields and Their Applications, 2017, 第 2 作者
(18) Analysis of AES, SKINNY, and Others with Constraint Programming, IACR Transactions on Symmetric Cryptology, 2017, 第 7 作者
(19) Improved linear (hull) cryptanalysis of round-reduced versions of SIMON, Science China Information Sciences, 2017, 第 2 作者
(20) Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}}, Finite Fields and Their Applications, 2016, 第 2 作者
(21) Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$, SCIENCE CHINA Mathematics, 2015, 第 2 作者
(22) The weight distributions of two classes of binary cyclic codes, Finite Fields and Their Applications, 2015, 第 3 作者
(23) Two Constructions of Balanced Boolean Functions with Optimal Algebraic Immunity, High Nonlinearity and Good Behavior against Fast Algebraic Attacks, Designs, Codes and Cryptography, 2015, 第 4 作者
(24) The weight distributions of a class of non-primitive cyclic codes with two nonzeros, Science China Mathematics, 2015, 第 3 作者
(25) Cyclotomic Constructions of Zero-Difference Balanced Functions with Applications, IEEE Transactions on Information Theory, 2015, 第 2 作者
(26) The weight distribution of a family of p-ary cyclic codes, Designs, Codes and Cryptography, 2015, 第 4 作者
(27) Differential Fault Attack on Zorro Block Cipher, Security and Communication Networks, 2015, 第 2 作者
(28) Improved MILP modeling for automatic security evaluation and application to FOX , IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2015, 第 2 作者
(29) 19 轮RECTANGLE-80 的相关密钥差分分析, 密码学报, 2015, 第 2 作者
(30) Constructing permutations and complete permutations over finite fields via subfield-valued polynomials, Finite Fields and Their Applications, 2015, 第 2 作者
(31) Constructing permutation polynomials from piecewise permutations,  Finite Fields and Their Applications, 2014, 第 2 作者
(32) A generic homomorphic MAC construction for authentication in network coding, Security and Communication Networks , 2014, 第 2 作者
(33) Constructing new APN functions from known PN functions, International Journal of Foundations of Computer Science, 2014, 第 2 作者
(34)  Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences,  Chinese Journal of Electronics, 2014, 第 3 作者
(35) 模背包向量问题的实际复杂度与基于格密码体制的实际安全性, 密码学报, 2014, 第 2 作者
(36) Quadratic Bent and Semi-Bent Functions over Finite Fields of Odd Characteristic, Chinese Journal of Electronics, 2014, 第 3 作者
(37) Projective Interpolation of Polynomial Vectors and Improved Key Recovery Attack on SFLASH, Designs, Codes and Cryptography, 2014, 第 2 作者
(38) Cryptanalysis of two cryptosystems based on multiple intractability assumptions, IET Communications, 2014, 第 2 作者
(39) Cryptanalysis of Countermeasures Against Multiple Transmission Attacks on NTRU, IET Communications, 2014, 第 2 作者
(40) New constructions of APN polynomial functions in odd characteristic, Applicable Algebra in Engineering, Communication and Computing, 2014, 第 2 作者
(41) The weight distributions of two classes of p-ary cyclic codes, Finite Fields and Their Applications, 2014, 第 3 作者
(42) Cryptographic Properties of Nested Functions and Algebraic Immunity of the Boolean Function in Hitag2 Stream Cipher, Cryptography and Communications, 2014, 第 2 作者
(43) The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs, IEEE Transactions on Information Theory, 2014, 第 11 作者
(44) Several classes of complete permutation polynomials,  Finite Fields and Their Applications, 2014, 第 3 作者
(45) Constructing new differentially 4-uniform permutations from the inverse function,  Finite Fields and Their Applications, 2014, 第 2 作者
(46) Periods of Polynomials over a Galois Ring, SCIENCE CHINA Mathematics, 2013, 第 2 作者
(47) Permutation polynomials with low differential uniformity over finite fields of odd characteristic, SCIENCE CHINA Mathematics, 2013, 第 11 作者
(48) New Optimal Frequency Hopping Sequence Sets from Balanced Nested Difference Packings of Partition-Type, International Journal of Foundations of Computer Science, 2013, 第 4 作者
(49) Analysis of Two Knapsack Public Key Cryptosystems, IET Communications, 2013, 第 2 作者
(50) On a class of binomial bent functions over the finite fields of odd characteristic, Applicable Algebra in Engineering, Communication and Computing, 2013, 第 3 作者
(51) Efficient bidirectional proxy re-encryption with direct chosen-ciphertext Security, Computers and Mathematics with Applications, 2012, 第 2 作者
(52) A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions, Finite Fields and Their Applications, 2012, 第 3 作者
(53) On the reducibility of some composite polynomials over finite fields, Designs, Codes and Cryptography, 2012, 第 2 作者
(54) Two Classes of Permutation Polynomials over Finite Fields, Finite Fields and Their Applications, 2012, 第 2 作者
(55) A matrix construction of Boolean functions with maximum algebraic immunity, Journal of Systems Science and Complexity, 2012, 第 2 作者
(56) Cryptanalysis of a multivariate public key encryption scheme with internal perturbation structure, Chinese Journal of Electronics, 2011, 第 1 作者
(57) On the correlation distributions of optimal quaternary sequence Family U and optimal binary sequence family V, IEEE Transactions on Information Theory, 2011, 第 4 作者
(58) Tr(x^{2^{n/2}+2^{n/2-1}+1})的二阶非线性度下界, 通信学报, 2011, 第 3 作者
(59) Construction of 1-resilient Boolean functions with optimum algebraic immunity, International Journal of Computer Mathematics, 2011, 第 3 作者
(60) 对psFlash扰动公钥密码的一个实际攻击, 计算机学报, 2011, 第 1 作者
(61) New Methods for Generating Permutation Polynomials over Finite Fields, Finite Fields and Their Applications, 2011, 第 2 作者
(62) Boolean Functions with Two Distinct Walsh Coefficients, Applicable Algebra in Engineering, Communication and Computing (AAECC), 2011, 第 4 作者
(63) A Family of p-ary Binomial Bent Functions. , IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011, 第 3 作者
(64) Aperiodic correlation of Kasami sequences in the small set, Applicable Algebra in Engineering, Communication and Computing (AAECC), 2011, 第 4 作者
(65) A construction of hyperbent functions with polynomial trace form, Science China Mathematics, 2011, 第 2 作者
(66) 诚实发送者承诺与诚实接收者承诺电子与信息学报,, 电子与信息学报, 2011, 第 2 作者
(67) More Balanced Boolean Functions with Optimal Algebraic Immunity, and Good Nonlinearity and Resistance to Fast Algebraic Attacks, IEEE Transactions on Information Theory, 2011, 第 4 作者
(68) Bent函数的一种迭代构造, 电子学报, 2010, 第 2 作者
(69) 一类具有极低相关性的CDMA序列, 电子学报, 2010, 第 2 作者
(70) A Class of Binary Cyclic Codes with Five Weights, SCIENCE CHINA Mathematics, 2010, 第 3 作者
(71) An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model, 中国科学院研究生院学报, 2010, 第 2 作者
(72) The large set of p-ary Kasami sequences,  Int. J. Comput. Math, 2010, 第 3 作者
(73) A class of binary cyclic codes with five weights, Science in China (Series A), 2010, (74) 一类具有极低相关性的CDMA序列, 电子学报, 2010, 第 2 作者
(75) Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks, IEEE Communications Letters, 2010, (76) Weight Distribution of A p-ary Cyclic Code, Finite Fields and Their Applications, 2010, (77) Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n}, Appl. Algebra Eng. Commun. Comput. , 2010, (78) Further crosscorrelation properties of sequences with the decimation factor d=(pn+1)/(p+1)-(pn-1)/2, Applicable Algebra in Engineering, Communication and Computing, 2010, (79) On the generalized large set of Kasami sequences, Applicable Algebra in Engineering, Communication and Computing, 2010, (80) WEP数据加密协议的两种改进攻击, 通信学报, 2010, (81) GMW sequences over Galois rings and their linear complexities, FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA, 2009, 第 2 作者
(82) Further properties of several classes of Boolean functions with optimum algebraic immunity, Designs, Codes and Cryptography, 2009, 第 3 作者
(83) New Optimal Quadriphase Sequences With Larger Linear Span, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, (84) Some results on skew Hadamard difference sets, Des. Codes Cryptogr., 2009, (85) Period-Different m-Sequences With at Most Four-Valued Cross Correlation, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, (86) Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences, IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, (87) Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, (88) New Family of Binary Sequences with Low Correlation, Applicable Algebra in Engineering, Communication and Computing (AAECC), 2008, 
发表著作
( 1 ) 信息安全中的数学方法与技术, 清华大学出版社, 2009-10, 

科研活动

   
科研项目
( 1 ) 国家自然科学基金, 主持, 国家级, 2015-01--2018-12
( 2 ) 有限域上代数方程算法问题研究, 主持, 国家级, 2013-01--2017-08
( 3 ) 保密课题, 主持, 研究所(学校), 2017-05--2017-12
( 4 ) 保密项目, 参与, 研究所(学校), 2017-01--2017-12
( 5 ) 量子安全的轻量级密码与安全协议, 主持, 国家级, 2018-01--2022-12
( 6 ) 保密课题, 主持, 研究所(学校), 2017-07--2019-12
( 7 ) 基于自动化搜索与深度学习的密码分析与设计, 主持, 国家级, 2019-11--2024-10

 

 


 

 

 

 
 
上一篇: 中国科学院沈阳自动化研究所 胡琨元 男 博导 下一篇:中国科学院心理研究所 胡理 男 博导

在线咨询

进入QQ咨询

王老师

微信咨询

杨老师

进入20中科院QQ群

709867297

进入20中科大QQ群

680149146

友情链接

科大科院考研网版权所有 © 2020-2022 皖ICP备2021018242号