基本信息
胡磊男博导中国科学院信息工程研究所
电子邮件: hulei@iie.ac.cn
通信地址: 北京市海淀区杏石口路80号信息安全国家重点实验室
邮政编码: 100093
研究领域
招生信息
招生专业083900-网络空间安全
招生方向密码理论与技术,密码协议理论与技术
教育背景
学历
学位
工作经历
工作简历
社会兼职2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委
教授课程信息安全数学基础RFID安全算法与协议后量子密码学密码分析学代数编码
专利与奖励
奖励信息(1) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018(2) 非线性密码函数和循环码, 二等奖, 省级, 2017(3) 岗位教师考核教学单项优秀, 研究所(学校), 2017(4) XXX密码算法, 一等奖, 部委级, 2009(5) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果( 1 ) 提高有限域上乘法以及大矩阵消元的计算速度的方法, 2010, 第 1 作者, 专利号: ZL 2007 1 **.6( 2 ) 射频识别系统隐私认证方法, 2010, 第 1 作者, 专利号: ZL 2007 1 **.0( 3 ) 带隐私保护的基于口令认证的三方密钥交换方法, 2011, 第 1 作者, 专利号: ZL 1.6( 4 ) 基于稀疏树的动态密钥更新的射频识别隐私认证方法, 2011, 第 1 作者, 专利号: ZL 4.3( 5 ) 获取分组密码活跃S盒个数下界的方法, 2016, 第 1 作者, 专利号: ZL 2013 1 **.8( 6 ) 分组密码抗线性攻击安全性的评估方法, 2017, 第 1 作者, 专利号: ZL 2014 1 **.9
出版信息
发表论文(1)Lightweight Iterative MDS Matrices: How Small Can We Go?,IACR Transactions on Symmetric Cryptology (FSE),2019-12,第5作者(2)有限域上几类置换和完全置换,密码学报,2019-10,第2作者(3)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS,CRYPTO 2019,2019-08,第5作者(4)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator,CRYTO 2019,2019-08,第3作者(5)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits,IACR Transactions on Symmetric Cryptology (FSE),2019-03,第5作者(6)Unbalanced Sharing: A Threshold Implementation of SM4,SCIENCE CHINA Information Sciences,2019-01,第4作者(7)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints,Asiacrypt 2018,2018-12,第6作者(8)Three new classes of generalized almost perfect nonlinear power functions,Finite Fields and Their Applications,2018-09,第2作者(9)A construction of 1-resilient Boolean functions with good cryptographic properties,Journal of Systems Science and Complexity,2018-08,第2作者(10)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy,ISC 2018-The 21st Information Security Conference-ISC2018,2018-05,第4作者(11)On the Complexity of Impossible Differential Cryptanalysis,Security and Communication Networks,2018-04,第2作者(12)New results on permutation polynomials of the form(x^{p^m}?x+δ)^s+ x^{p^m}+x over F_{p^{2m}},Cryptography and Communications,2018-01,第2作者(13)Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.,Design, Codes Cryptography,2017-08,第3作者(14)Cryptanalysis of Dual RSA,Designs, Codes and Cryptography,2017,第2作者(15)Several Classes of Boolean Functions with FourValued Walsh Spectra,International Journal of Foundations of Computer Science (IJFCS),2017,第2作者(16)有限域上置换多项式的几种构造,密码学报,2017,第2作者(17)Further results on permutation trinomials over finite fields with even characteristic,Finite Fields and Their Applications,2017,第2作者(18)Analysis of AES, SKINNY, and Others with Constraint Programming,IACR Transactions on Symmetric Cryptology,2017,第7作者(19)Improved linear (hull) cryptanalysis of round-reduced versions of SIMON,Science China Information Sciences,2017,第2作者(20)Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}},Finite Fields and Their Applications,2016,第2作者(21)Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$,SCIENCE CHINA Mathematics,2015,第2作者(22)The weight distributions of two classes of binary cyclic codes,Finite Fields and Their Applications,2015,第3作者(23)Two Constructions of Balanced Boolean Functions with Optimal Algebraic Immunity, High Nonlinearity and Good Behavior against Fast Algebraic Attacks,Designs, Codes and Cryptography,2015,第4作者(24)The weight distributions of a class of non-primitive cyclic codes with two nonzeros,Science China Mathematics,2015,第3作者(25)Cyclotomic Constructions of Zero-Difference Balanced Functions with Applications,IEEE Transactions on Information Theory,2015,第2作者(26)The weight distribution of a family of p-ary cyclic codes,Designs, Codes and Cryptography,2015,第4作者(27)Differential Fault Attack on Zorro Block Cipher,Security and Communication Networks,2015,第2作者(28)Improved MILP modeling for automatic security evaluation and application to FOX ,IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,2015,第2作者(29)19 轮RECTANGLE-80 的相关密钥差分分析,密码学报,2015,第2作者(30)Constructing permutations and complete permutations over finite fields via subfield-valued polynomials,Finite Fields and Their Applications,2015,第2作者(31)Constructing permutation polynomials from piecewise permutations, Finite Fields and Their Applications,2014,第2作者(32)A generic homomorphic MAC construction for authentication in network coding,Security and Communication Networks ,2014,第2作者(33)Constructing new APN functions from known PN functions,International Journal of Foundations of Computer Science,2014,第2作者(34) Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences, Chinese Journal of Electronics,2014,第3作者(35)模背包向量问题的实际复杂度与基于格密码体制的实际安全性,密码学报,2014,第2作者(36)Quadratic Bent and Semi-Bent Functions over Finite Fields of Odd Characteristic,Chinese Journal of Electronics,2014,第3作者(37)Projective Interpolation of Polynomial Vectors and Improved Key Recovery Attack on SFLASH,Designs, Codes and Cryptography,2014,第2作者(38)Cryptanalysis of two cryptosystems based on multiple intractability assumptions,IET Communications,2014,第2作者(39)Cryptanalysis of Countermeasures Against Multiple Transmission Attacks on NTRU,IET Communications,2014,第2作者(40)New constructions of APN polynomial functions in odd characteristic,Applicable Algebra in Engineering, Communication and Computing,2014,第2作者(41)The weight distributions of two classes of p-ary cyclic codes,Finite Fields and Their Applications,2014,第3作者(42)Cryptographic Properties of Nested Functions and Algebraic Immunity of the Boolean Function in Hitag2 Stream Cipher,Cryptography and Communications,2014,第2作者(43)The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs,IEEE Transactions on Information Theory,2014,第11作者(44)Several classes of complete permutation polynomials, Finite Fields and Their Applications,2014,第3作者(45)Constructing new differentially 4-uniform permutations from the inverse function, Finite Fields and Their Applications,2014,第2作者(46)Periods of Polynomials over a Galois Ring,SCIENCE CHINA Mathematics,2013,第2作者(47)Permutation polynomials with low differential uniformity over finite fields of odd characteristic,SCIENCE CHINA Mathematics,2013,第11作者(48)New Optimal Frequency Hopping Sequence Sets from Balanced Nested Difference Packings of Partition-Type,International Journal of Foundations of Computer Science,2013,第4作者(49)Analysis of Two Knapsack Public Key Cryptosystems,IET Communications,2013,第2作者(50)On a class of binomial bent functions over the finite fields of odd characteristic,Applicable Algebra in Engineering, Communication and Computing,2013,第3作者(51)Efficient bidirectional proxy re-encryption with direct chosen-ciphertext Security,Computers and Mathematics with Applications,2012,第2作者(52)A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions,Finite Fields and Their Applications,2012,第3作者(53)On the reducibility of some composite polynomials over finite fields,Designs, Codes and Cryptography,2012,第2作者(54)Two Classes of Permutation Polynomials over Finite Fields,Finite Fields and Their Applications,2012,第2作者(55)A matrix construction of Boolean functions with maximum algebraic immunity,Journal of Systems Science and Complexity,2012,第2作者(56)Cryptanalysis of a multivariate public key encryption scheme with internal perturbation structure,Chinese Journal of Electronics,2011,第1作者(57)On the correlation distributions of optimal quaternary sequence Family U and optimal binary sequence family V,IEEE Transactions on Information Theory,2011,第4作者(58)Tr(x^{2^{n/2}+2^{n/2-1}+1})的二阶非线性度下界,通信学报,2011,第3作者(59)Construction of 1-resilient Boolean functions with optimum algebraic immunity,International Journal of Computer Mathematics,2011,第3作者(60)对psFlash扰动公钥密码的一个实际攻击,计算机学报,2011,第1作者(61)New Methods for Generating Permutation Polynomials over Finite Fields,Finite Fields and Their Applications,2011,第2作者(62)Boolean Functions with Two Distinct Walsh Coefficients,Applicable Algebra in Engineering, Communication and Computing (AAECC),2011,第4作者(63)A Family of p-ary Binomial Bent Functions. ,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2011,第3作者(64)Aperiodic correlation of Kasami sequences in the small set,Applicable Algebra in Engineering, Communication and Computing (AAECC),2011,第4作者(65)A construction of hyperbent functions with polynomial trace form,Science China Mathematics,2011,第2作者(66)诚实发送者承诺与诚实接收者承诺电子与信息学报,,电子与信息学报,2011,第2作者(67)More Balanced Boolean Functions with Optimal Algebraic Immunity, and Good Nonlinearity and Resistance to Fast Algebraic Attacks,IEEE Transactions on Information Theory,2011,第4作者(68)Bent函数的一种迭代构造,电子学报,2010,第2作者(69)一类具有极低相关性的CDMA序列,电子学报,2010,第2作者(70)A Class of Binary Cyclic Codes with Five Weights,SCIENCE CHINA Mathematics,2010,第3作者(71)An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model,中国科学院研究生院学报,2010,第2作者(72)The large set of p-ary Kasami sequences, Int. J. Comput. Math,2010,第3作者(73)A class of binary cyclic codes with five weights,Science in China (Series A),2010,(74)一类具有极低相关性的CDMA序列,电子学报,2010,第2作者(75)Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks,IEEE Communications Letters,2010,(76)Weight Distribution of A p-ary Cyclic Code,Finite Fields and Their Applications,2010,(77)Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n},Appl. Algebra Eng. Commun. Comput. ,2010,(78)Further crosscorrelation properties of sequences with the decimation factor d=(pn+1)/(p+1)-(pn-1)/2,Applicable Algebra in Engineering, Communication and Computing,2010,(79)On the generalized large set of Kasami sequences,Applicable Algebra in Engineering, Communication and Computing,2010,(80)WEP数据加密协议的两种改进攻击,通信学报,2010,(81)GMW sequences over Galois rings and their linear complexities,FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA,2009,第2作者(82)Further properties of several classes of Boolean functions with optimum algebraic immunity,Designs, Codes and Cryptography,2009,第3作者(83)New Optimal Quadriphase Sequences With Larger Linear Span,IEEE TRANSACTIONS ON INFORMATION THEORY,2009,(84)Some results on skew Hadamard difference sets,Des. Codes Cryptogr.,2009,(85)Period-Different m-Sequences With at Most Four-Valued Cross Correlation,IEEE TRANSACTIONS ON INFORMATION THEORY,2009,(86)Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences,IEEE TRANSACTIONS ON INFORMATION THEORY,2009,(87)Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols,IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,2008,(88)New Family of Binary Sequences with Low Correlation,Applicable Algebra in Engineering, Communication and Computing (AAECC),2008,
发表著作( 1 ) 信息安全中的数学方法与技术,清华大学出版社,2009-10,
科研活动
科研项目( 1 ) 国家自然科学基金, 主持,国家级,2015-01--2018-12( 2 ) 有限域上代数方程算法问题研究, 主持,国家级,2013-01--2017-08( 3 ) 保密课题, 主持,研究所(学校),2017-05--2017-12( 4 ) 保密项目, 参与,研究所(学校),2017-01--2017-12( 5 ) 量子安全的轻量级密码与安全协议, 主持,国家级,2018-01--2022-12( 6 ) 保密课题, 主持,研究所(学校),2017-07--2019-12( 7 ) 基于自动化搜索与深度学习的密码分析与设计, 主持,国家级,2019-11--2024-10
参与会议(1)Lightweight Iterative MDS Matrices: How Small Can We Go2020-03-16(2)Automatic Demirci-Sel?uk Meet-in-the-Middle Attack on SKINNY with Key-bridging2019-12-15(3)Convolutional Neural Network based Side-Channel Attacks with Customized Filters2019-12-15(4)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS2019-08-19(5)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator2019-08-19(6)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits2019-03-18(7)Boomerang Connectivity Table Revisited2019-03-18(8)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints2018-12-04(9)A Deterministic Algorithm for Computing Divisors in an Interval2018-07-11(10)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy2018-05-02(11)Improved Results on Cryptanalysis of Prime Power RSA2016-11-30(12)An Improved Analysis on Three Variants of the RSA Cryptosystem2016-11-04(13)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR2016-09-28(14)Related-key Impossible Differential Analysis of Full \emph{Khudra}2016-09-12(15)Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption2016-09-07(16)Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication2016-09-07(17)MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck2016-03-20(18)Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents2015-11-28(19)Recovering a Sum of Two Squares Decomposition Revisited2015-11-01(20)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s2015-09-07(21)Implicit Factorization of RSA Moduli Revisited2015-09-07(22)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis2015-08-27(23)Improved Differential Analysis of Block Cipher PRIDEQianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan and Xiaoshuang Ma2015-05-18(24)Partial Prime Factor Exposure Attacks on RSA and Its Takag VariantLiqiang Peng, Lei Hu, Jun Xu and Zhangjie Huang2015-05-18(25)Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers[12]Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song2014-12-09(26)Attacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationZhangjie Huang, Lei Hu and Jun Xu2014-10-21(27)Tighter Security Bound of MIBS Block Cipher Against Differential AttackXiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan2014-10-10(28)Error-Tolerant Algebraic Side-Channel Attacks Uing BEELing Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi and Ronglin Hao2014-08-29(29)Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block CiphersLing Song, Lei Hu, Bingke Ma and Danping Shi2014-07-18(30)Partial Key Exposure Attacks on Takagi Variant of RSAZhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie2014-06-10(31) Further Improvement of Factoring RSA Moduli with Implicit HintLiqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie2014-05-27(32)Modular Inversion Hidden Number Problem RevisitedJun Xu, Lei Hu, Zhangjie Huang and Liqiang Peng2014-05-05(33)Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack[21]Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang2013-11-27(34)Improved Algebraic and Differential Fault Attacks on the KATAN Block CipherLing Song and Lei Hu2013-05-12(35)Differential Fault Attack on the PRINCE Block CipherLing Song and Lei Hu2013-05-05(36)Cryptanalysis of a Lattice-Knapsack Mixed Public Key CryptosystemJun Xu, Lei Hu, Siwei Sun, Ping Wang2012-12-12(37)Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key CryptosystemJun Xu, Lei Hu, Siwei Sun2012-10-30(38)Cube Cryptanalysis of Hitag2 Stream CipherSiwei Sun, Lei Hu, Yonghong Xie and Xiangyong Zeng2011-12-16(39)A New Family of Quadriphase Sequences with Low CorrelationJie Li, Xiangyong Zeng, Lei Hu2011-05-30(40)Kipnis-Shamir Attack on Unbalanced Oil-Vinegar SchemeWeiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin2011-05-29(41)How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange ProtocolsWeijia Wang, Lei Hu, Yong Li2010-10-20(42)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme第三届国际后量子密码学会议Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding2010-05-25(43)A Class of Boolean Functions With Four-Valued Walsh SpectraYonghong Xie, Lei Hu, Wenfeng Jiang, XiangyongZeng2009-10-08(44)Cryptanalysis of A Multivariate Public Key Encryption Scheme With Internal Perturbation StructureWeiwei Cao, Lei Hu2009-08-25(45)Constructing Linear Transformations of MPKCs By Generalized Central Symmetric MatricesXin Jiang, Lei Hu, Jintai Ding 2009-08-22(46)Algebraic Attack of SMS4 and the Comparison with AES,Wen Ji, Lei Hu, Haiwen Ou2009-08-18(47)Period-Different m-Sequences With At Most Four-Valued Cross CorrelationLei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang2008-11-19(48)ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilienceFen Liu, Lei Hu2008-10-15
合作情况
项目协作单位
指导学生
删除或更新信息,请邮件至freekaoyan#163.com(#换成@)
中国科学院大学研究生导师教师师资介绍简介-胡磊
本站小编 Free考研考试/2020-04-27
相关话题/中国科学院大学 师资
中国科学院大学研究生导师教师师资介绍简介-胡乃军
...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡瑞林
基本信息胡瑞林男博导中国科学院地质与地球物理研究所电子邮件:hurl@mail.iggcas.ac.cn通信地址:北京市昌平区天通东苑东二区2#161邮政编码:100029研究领域招生信息招生专业081803-地质工程招生方向工程地质,地质灾害教育背景1999-09--2000-07香港大学土木工程学院访问1998-09--2000-12中国科学院地质研究所博士后1995-09--1998-07中 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡容海
基本信息胡容海男资源与环境学院电子邮件:huronghai(at)ucas.edu.cn通信地址:北京市石景山区玉泉路19号甲资源与环境学院邮政编码:100049研究领域定量遥感:植被结构参数反演(叶面积指数)、激光雷达遥感(地基、机载、星载)、冠层聚集效应、尺度效应生态遥感:森林、草地、湿地生态系统时空格局遥感监测招生信息招生专业070503-地图学与地理信息系统081602-摄影测量与遥感招生 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡齐芽
基本信息胡齐芽男博导数学与系统科学研究院电子邮件:hqy@lsec.cc.ac.cn通信地址:北京中关村东路55号中科院数学与系统科学研究院邮政编码:100190研究概况研究方向1.积分方程和积-微分方程的高精度算法;2.偏微分方程的区域分解方法;3.有限元与边界元的耦合方法;4.鞍点问题的迭代算法;5.电磁场问题的高效算法.成果影响已在国内外核心期刊上发表论文50多篇,其中SIAM系列等国际计算 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡圣标
基本信息胡圣标男博导中国科学院地质与地球物理研究所电子邮件:sbhu@mail.iggcas.ac.cn通信地址:北京9825信箱中国科学院地质与地球物理研究所邮政编码:100029研究领域招生信息招生专业070904-构造地质学070820-地球动力学081801-矿产普查与勘探招生方向岩石圈热结构,地热地质学盆地热史恢复地热资源评价教育背景2001-06--2002-06澳大利亚墨尔本大学地学 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡瑞忠
个人信息胡瑞忠男博导地球化学研究所电子邮件:hunagzhilong@vip.gyig.ac.cn通信地址:贵阳市南明区观水路46号邮政编码:550002部门/实验室:矿床室研究领域矿床地球化学岩石地球化学成矿预测理论与方法招生信息硕士研究生:1名博士研究生:1名招生专业070902-地球化学070901-矿物学、岩石学、矿床学招生方向教育背景学历博士后学位博士工作经历工作简历社会兼职教授课程专利 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡涛
基本信息胡涛男博导中国科学院高能物理研究所电子邮件:hut@ihep.ac.cn通信地址:中国科学院高能物理研究所实验物理中心邮政编码:100049部门/实验室:实验物理中心研究领域招生信息招生专业070202-粒子物理与原子核物理招生方向粒子物理实验,探测器物理教育背景1996-09--1999-06中国科学院高能物理研究所理学博士1987-09--1990-06中国科学技术大学理学硕士1982 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡松年
基本信息胡松年男博导中国科学院微生物研究所电子邮件:husn@im.ac.cn通信地址:北京市朝阳区北辰西路1号院3号邮政编码:100101研究领域招生信息招生专业071007-遗传学0710J3-生物信息学0710Z1-基因组学招生方向复杂基因组的精细结构解析药物基因组学与精准用药指导生物信息学工具开发与数据库构建教育背景1991-09--1996-07中国农业大学生物化学专业获理学博士学位19 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡卫国
基本信息胡卫国男国家纳米科学中心电子邮件:huweiguo@binn.cas.cn通信地址:北京市海淀区学院路30号天工大厦C座邮政编码:100083部门/实验室:纳米与技术学院研究领域招生信息招生专业080903-微电子学与固体电子学080901-物理电子学080822-能源与电工新材料招生方向III-V化合物半导体材料与器件压电电子/光电子学太阳能电池教育背景2004-09--2007-07中 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27中国科学院大学研究生导师教师师资介绍简介-胡伟武
基本信息胡伟武男博导计算技术研究所电子邮件:通信地址:北京市海淀区中关村科学院南路6号邮政编码:100190研究领域计算机体系结构、集成电路设计教育背景学位中科院计算所1991.09--1996.03工学博士学位出国学习工作工作经历工作简历1996.3-1997.6,中国科学院计算技术研究所,助研1997.7-2000.2,中国科学院计算技术研究所,副研2000.3-至今,中国科学院计算技术研究所 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-27