基本信息
胡磊男博导中国科学院信息工程研究所
电子邮件: hulei@iie.ac.cn
通信地址: 北京市海淀区杏石口路80号信息安全国家重点实验室
邮政编码: 100093
研究领域
招生信息
招生专业083900-网络空间安全
招生方向密码理论与技术,密码协议理论与技术
教育背景
学历
学位
工作经历
工作简历
社会兼职2015-03-01-今,中国密码学会理事, 理事
2013-10-01-今,《密码学报》副主编, 副主编
2010-09-01-今,《中国科学院研究生院学报》编委,
2010-01-01-今,《系统科学与数学》编委, 编委
2010-01-01-今,《J. of Systems Science and Complexity》编委, 编委
教授课程信息安全数学基础RFID安全算法与协议后量子密码学密码分析学代数编码
专利与奖励
奖励信息(1) 岗位教师考核讲义单项优秀, , 研究所(学校), 2018(2) 非线性密码函数和循环码, 二等奖, 省级, 2017(3) 岗位教师考核教学单项优秀, 研究所(学校), 2017(4) XXX密码算法, 一等奖, 部委级, 2009(5) ×××的密码学特性及其构造, 二等奖, 部委级, 2002
专利成果( 1 ) 提高有限域上乘法以及大矩阵消元的计算速度的方法, 2010, 第 1 作者, 专利号: ZL 2007 1 **.6( 2 ) 射频识别系统隐私认证方法, 2010, 第 1 作者, 专利号: ZL 2007 1 **.0( 3 ) 带隐私保护的基于口令认证的三方密钥交换方法, 2011, 第 1 作者, 专利号: ZL 1.6( 4 ) 基于稀疏树的动态密钥更新的射频识别隐私认证方法, 2011, 第 1 作者, 专利号: ZL 4.3( 5 ) 获取分组密码活跃S盒个数下界的方法, 2016, 第 1 作者, 专利号: ZL 2013 1 **.8( 6 ) 分组密码抗线性攻击安全性的评估方法, 2017, 第 1 作者, 专利号: ZL 2014 1 **.9
出版信息
发表论文(1)Lightweight Iterative MDS Matrices: How Small Can We Go?,IACR Transactions on Symmetric Cryptology (FSE),2019-12,第5作者(2)有限域上几类置换和完全置换,密码学报,2019-10,第2作者(3)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS,CRYPTO 2019,2019-08,第5作者(4)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator,CRYTO 2019,2019-08,第3作者(5)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits,IACR Transactions on Symmetric Cryptology (FSE),2019-03,第5作者(6)Unbalanced Sharing: A Threshold Implementation of SM4,SCIENCE CHINA Information Sciences,2019-01,第4作者(7)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints,Asiacrypt 2018,2018-12,第6作者(8)Three new classes of generalized almost perfect nonlinear power functions,Finite Fields and Their Applications,2018-09,第2作者(9)A construction of 1-resilient Boolean functions with good cryptographic properties,Journal of Systems Science and Complexity,2018-08,第2作者(10)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy,ISC 2018-The 21st Information Security Conference-ISC2018,2018-05,第4作者(11)On the Complexity of Impossible Differential Cryptanalysis,Security and Communication Networks,2018-04,第2作者(12)New results on permutation polynomials of the form(x^{p^m}?x+δ)^s+ x^{p^m}+x over F_{p^{2m}},Cryptography and Communications,2018-01,第2作者(13)Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.,Design, Codes Cryptography,2017-08,第3作者(14)Cryptanalysis of Dual RSA,Designs, Codes and Cryptography,2017,第2作者(15)Several Classes of Boolean Functions with FourValued Walsh Spectra,International Journal of Foundations of Computer Science (IJFCS),2017,第2作者(16)有限域上置换多项式的几种构造,密码学报,2017,第2作者(17)Further results on permutation trinomials over finite fields with even characteristic,Finite Fields and Their Applications,2017,第2作者(18)Analysis of AES, SKINNY, and Others with Constraint Programming,IACR Transactions on Symmetric Cryptology,2017,第7作者(19)Improved linear (hull) cryptanalysis of round-reduced versions of SIMON,Science China Information Sciences,2017,第2作者(20)Some classes of permutation polynomials of the form (x^{p^m}-x+δ)^s+x over F_{p^{2m}},Finite Fields and Their Applications,2016,第2作者(21)Further results on differentially 4-uniform permutations over $\F_{2^{2m}}$,SCIENCE CHINA Mathematics,2015,第2作者(22)The weight distributions of two classes of binary cyclic codes,Finite Fields and Their Applications,2015,第3作者(23)Two Constructions of Balanced Boolean Functions with Optimal Algebraic Immunity, High Nonlinearity and Good Behavior against Fast Algebraic Attacks,Designs, Codes and Cryptography,2015,第4作者(24)The weight distributions of a class of non-primitive cyclic codes with two nonzeros,Science China Mathematics,2015,第3作者(25)Cyclotomic Constructions of Zero-Difference Balanced Functions with Applications,IEEE Transactions on Information Theory,2015,第2作者(26)The weight distribution of a family of p-ary cyclic codes,Designs, Codes and Cryptography,2015,第4作者(27)Differential Fault Attack on Zorro Block Cipher,Security and Communication Networks,2015,第2作者(28)Improved MILP modeling for automatic security evaluation and application to FOX ,IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,2015,第2作者(29)19 轮RECTANGLE-80 的相关密钥差分分析,密码学报,2015,第2作者(30)Constructing permutations and complete permutations over finite fields via subfield-valued polynomials,Finite Fields and Their Applications,2015,第2作者(31)Constructing permutation polynomials from piecewise permutations, Finite Fields and Their Applications,2014,第2作者(32)A generic homomorphic MAC construction for authentication in network coding,Security and Communication Networks ,2014,第2作者(33)Constructing new APN functions from known PN functions,International Journal of Foundations of Computer Science,2014,第2作者(34) Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences, Chinese Journal of Electronics,2014,第3作者(35)模背包向量问题的实际复杂度与基于格密码体制的实际安全性,密码学报,2014,第2作者(36)Quadratic Bent and Semi-Bent Functions over Finite Fields of Odd Characteristic,Chinese Journal of Electronics,2014,第3作者(37)Projective Interpolation of Polynomial Vectors and Improved Key Recovery Attack on SFLASH,Designs, Codes and Cryptography,2014,第2作者(38)Cryptanalysis of two cryptosystems based on multiple intractability assumptions,IET Communications,2014,第2作者(39)Cryptanalysis of Countermeasures Against Multiple Transmission Attacks on NTRU,IET Communications,2014,第2作者(40)New constructions of APN polynomial functions in odd characteristic,Applicable Algebra in Engineering, Communication and Computing,2014,第2作者(41)The weight distributions of two classes of p-ary cyclic codes,Finite Fields and Their Applications,2014,第3作者(42)Cryptographic Properties of Nested Functions and Algebraic Immunity of the Boolean Function in Hitag2 Stream Cipher,Cryptography and Communications,2014,第2作者(43)The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs,IEEE Transactions on Information Theory,2014,第11作者(44)Several classes of complete permutation polynomials, Finite Fields and Their Applications,2014,第3作者(45)Constructing new differentially 4-uniform permutations from the inverse function, Finite Fields and Their Applications,2014,第2作者(46)Periods of Polynomials over a Galois Ring,SCIENCE CHINA Mathematics,2013,第2作者(47)Permutation polynomials with low differential uniformity over finite fields of odd characteristic,SCIENCE CHINA Mathematics,2013,第11作者(48)New Optimal Frequency Hopping Sequence Sets from Balanced Nested Difference Packings of Partition-Type,International Journal of Foundations of Computer Science,2013,第4作者(49)Analysis of Two Knapsack Public Key Cryptosystems,IET Communications,2013,第2作者(50)On a class of binomial bent functions over the finite fields of odd characteristic,Applicable Algebra in Engineering, Communication and Computing,2013,第3作者(51)Efficient bidirectional proxy re-encryption with direct chosen-ciphertext Security,Computers and Mathematics with Applications,2012,第2作者(52)A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions,Finite Fields and Their Applications,2012,第3作者(53)On the reducibility of some composite polynomials over finite fields,Designs, Codes and Cryptography,2012,第2作者(54)Two Classes of Permutation Polynomials over Finite Fields,Finite Fields and Their Applications,2012,第2作者(55)A matrix construction of Boolean functions with maximum algebraic immunity,Journal of Systems Science and Complexity,2012,第2作者(56)Cryptanalysis of a multivariate public key encryption scheme with internal perturbation structure,Chinese Journal of Electronics,2011,第1作者(57)On the correlation distributions of optimal quaternary sequence Family U and optimal binary sequence family V,IEEE Transactions on Information Theory,2011,第4作者(58)Tr(x^{2^{n/2}+2^{n/2-1}+1})的二阶非线性度下界,通信学报,2011,第3作者(59)Construction of 1-resilient Boolean functions with optimum algebraic immunity,International Journal of Computer Mathematics,2011,第3作者(60)对psFlash扰动公钥密码的一个实际攻击,计算机学报,2011,第1作者(61)New Methods for Generating Permutation Polynomials over Finite Fields,Finite Fields and Their Applications,2011,第2作者(62)Boolean Functions with Two Distinct Walsh Coefficients,Applicable Algebra in Engineering, Communication and Computing (AAECC),2011,第4作者(63)A Family of p-ary Binomial Bent Functions. ,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2011,第3作者(64)Aperiodic correlation of Kasami sequences in the small set,Applicable Algebra in Engineering, Communication and Computing (AAECC),2011,第4作者(65)A construction of hyperbent functions with polynomial trace form,Science China Mathematics,2011,第2作者(66)诚实发送者承诺与诚实接收者承诺电子与信息学报,,电子与信息学报,2011,第2作者(67)More Balanced Boolean Functions with Optimal Algebraic Immunity, and Good Nonlinearity and Resistance to Fast Algebraic Attacks,IEEE Transactions on Information Theory,2011,第4作者(68)Bent函数的一种迭代构造,电子学报,2010,第2作者(69)一类具有极低相关性的CDMA序列,电子学报,2010,第2作者(70)A Class of Binary Cyclic Codes with Five Weights,SCIENCE CHINA Mathematics,2010,第3作者(71)An Efficient Compiler from Sigma-Protocol to Deniable Zero Knowledge in the CRS Model,中国科学院研究生院学报,2010,第2作者(72)The large set of p-ary Kasami sequences, Int. J. Comput. Math,2010,第3作者(73)A class of binary cyclic codes with five weights,Science in China (Series A),2010,(74)一类具有极低相关性的CDMA序列,电子学报,2010,第2作者(75)Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks,IEEE Communications Letters,2010,(76)Weight Distribution of A p-ary Cyclic Code,Finite Fields and Their Applications,2010,(77)Two new permutation polynomials with the form (x^{2^k}+x+d)^s+x over F_{2^n},Appl. Algebra Eng. Commun. Comput. ,2010,(78)Further crosscorrelation properties of sequences with the decimation factor d=(pn+1)/(p+1)-(pn-1)/2,Applicable Algebra in Engineering, Communication and Computing,2010,(79)On the generalized large set of Kasami sequences,Applicable Algebra in Engineering, Communication and Computing,2010,(80)WEP数据加密协议的两种改进攻击,通信学报,2010,(81)GMW sequences over Galois rings and their linear complexities,FRONTIERS OF ELECTRICAL AND ELECTRONIC ENGINEERING IN CHINA,2009,第2作者(82)Further properties of several classes of Boolean functions with optimum algebraic immunity,Designs, Codes and Cryptography,2009,第3作者(83)New Optimal Quadriphase Sequences With Larger Linear Span,IEEE TRANSACTIONS ON INFORMATION THEORY,2009,(84)Some results on skew Hadamard difference sets,Des. Codes Cryptogr.,2009,(85)Period-Different m-Sequences With at Most Four-Valued Cross Correlation,IEEE TRANSACTIONS ON INFORMATION THEORY,2009,(86)Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences,IEEE TRANSACTIONS ON INFORMATION THEORY,2009,(87)Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols,IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,2008,(88)New Family of Binary Sequences with Low Correlation,Applicable Algebra in Engineering, Communication and Computing (AAECC),2008,
发表著作( 1 ) 信息安全中的数学方法与技术,清华大学出版社,2009-10,
科研活动
科研项目( 1 ) 国家自然科学基金, 主持,国家级,2015-01--2018-12( 2 ) 有限域上代数方程算法问题研究, 主持,国家级,2013-01--2017-08( 3 ) 保密课题, 主持,研究所(学校),2017-05--2017-12( 4 ) 保密项目, 参与,研究所(学校),2017-01--2017-12( 5 ) 量子安全的轻量级密码与安全协议, 主持,国家级,2018-01--2022-12( 6 ) 保密课题, 主持,研究所(学校),2017-07--2019-12( 7 ) 基于自动化搜索与深度学习的密码分析与设计, 主持,国家级,2019-11--2024-10
参与会议(1)Lightweight Iterative MDS Matrices: How Small Can We Go2020-03-16(2)Automatic Demirci-Sel?uk Meet-in-the-Middle Attack on SKINNY with Key-bridging2019-12-15(3)Convolutional Neural Network based Side-Channel Attacks with Customized Filters2019-12-15(4)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS2019-08-19(5)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator2019-08-19(6)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits2019-03-18(7)Boomerang Connectivity Table Revisited2019-03-18(8)Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints2018-12-04(9)A Deterministic Algorithm for Computing Divisors in an Interval2018-07-11(10)Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy2018-05-02(11)Improved Results on Cryptanalysis of Prime Power RSA2016-11-30(12)An Improved Analysis on Three Variants of the RSA Cryptosystem2016-11-04(13)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR2016-09-28(14)Related-key Impossible Differential Analysis of Full \emph{Khudra}2016-09-12(15)Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption2016-09-07(16)Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication2016-09-07(17)MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck2016-03-20(18)Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents2015-11-28(19)Recovering a Sum of Two Squares Decomposition Revisited2015-11-01(20)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s2015-09-07(21)Implicit Factorization of RSA Moduli Revisited2015-09-07(22)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis2015-08-27(23)Improved Differential Analysis of Block Cipher PRIDEQianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan and Xiaoshuang Ma2015-05-18(24)Partial Prime Factor Exposure Attacks on RSA and Its Takag VariantLiqiang Peng, Lei Hu, Jun Xu and Zhangjie Huang2015-05-18(25)Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers[12]Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song2014-12-09(26)Attacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationZhangjie Huang, Lei Hu and Jun Xu2014-10-21(27)Tighter Security Bound of MIBS Block Cipher Against Differential AttackXiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan2014-10-10(28)Error-Tolerant Algebraic Side-Channel Attacks Uing BEELing Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi and Ronglin Hao2014-08-29(29)Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block CiphersLing Song, Lei Hu, Bingke Ma and Danping Shi2014-07-18(30)Partial Key Exposure Attacks on Takagi Variant of RSAZhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie2014-06-10(31) Further Improvement of Factoring RSA Moduli with Implicit HintLiqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie2014-05-27(32)Modular Inversion Hidden Number Problem RevisitedJun Xu, Lei Hu, Zhangjie Huang and Liqiang Peng2014-05-05(33)Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack[21]Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang2013-11-27(34)Improved Algebraic and Differential Fault Attacks on the KATAN Block CipherLing Song and Lei Hu2013-05-12(35)Differential Fault Attack on the PRINCE Block CipherLing Song and Lei Hu2013-05-05(36)Cryptanalysis of a Lattice-Knapsack Mixed Public Key CryptosystemJun Xu, Lei Hu, Siwei Sun, Ping Wang2012-12-12(37)Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key CryptosystemJun Xu, Lei Hu, Siwei Sun2012-10-30(38)Cube Cryptanalysis of Hitag2 Stream CipherSiwei Sun, Lei Hu, Yonghong Xie and Xiangyong Zeng2011-12-16(39)A New Family of Quadriphase Sequences with Low CorrelationJie Li, Xiangyong Zeng, Lei Hu2011-05-30(40)Kipnis-Shamir Attack on Unbalanced Oil-Vinegar SchemeWeiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin2011-05-29(41)How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange ProtocolsWeijia Wang, Lei Hu, Yong Li2010-10-20(42)Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme第三届国际后量子密码学会议Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding2010-05-25(43)A Class of Boolean Functions With Four-Valued Walsh SpectraYonghong Xie, Lei Hu, Wenfeng Jiang, XiangyongZeng2009-10-08(44)Cryptanalysis of A Multivariate Public Key Encryption Scheme With Internal Perturbation StructureWeiwei Cao, Lei Hu2009-08-25(45)Constructing Linear Transformations of MPKCs By Generalized Central Symmetric MatricesXin Jiang, Lei Hu, Jintai Ding 2009-08-22(46)Algebraic Attack of SMS4 and the Comparison with AES,Wen Ji, Lei Hu, Haiwen Ou2009-08-18(47)Period-Different m-Sequences With At Most Four-Valued Cross CorrelationLei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang2008-11-19(48)ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilienceFen Liu, Lei Hu2008-10-15
合作情况
项目协作单位
指导学生
删除或更新信息,请邮件至freekaoyan#163.com(#换成@)
中国科学院大学研究生导师教师师资介绍简介-胡磊
本站小编 Free考研考试/2020-04-28
相关话题/中国科学院大学 师资
中国科学院大学研究生导师教师师资介绍简介-胡凯衡
基本信息胡凯衡男博导中国科学院成都山地灾害与环境研究所电子邮件:khhu@imde.ac.cn通信地址:四川省成都市人民南路四段九号邮政编码:610041研究领域山地灾害动力学过程和数值模拟山地灾害风险评估招生信息招生专业081401-岩土工程085213-建筑与土木工程070501-自然地理学招生方向山地灾害及其动力过程山地灾害防治工程山地灾害环境效应教育背景2002-09--2006-07北京 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡琨元
基本信息胡琨元男博导中国科学院沈阳自动化研究所电子邮件:hukunyuan@sia.cn通信地址:辽宁省沈阳市南塔街114号邮政编码:110016部门/实验室:数字工厂研究室研究领域招生信息招生专业080201-机械制造及其自动化081102-检测技术与自动化装置招生方向智能控制与管理、决策支持系统系统建模与优化、智能信息处理教育背景2000-03--2003-08东北大学博士1997-08--2 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡凯锋
基本信息胡凯锋男博导中国科学院昆明植物研究所电子邮件:kaifenghu@mail.kib.ac.cn通信地址:云南昆明蓝黑路132号昆明植物研究所邮政编码:650201部门/实验室:植物化学与西部植物资源持续利用国家重点实验室研究领域研究领域:核磁共振技术,结构生物学,代谢组学。1.基于核磁共振技术的结构生物学:开展利用核磁共振技术研究天然产物生物合成酶以及与重大疾病或重要生命过程相关的蛋白质的 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡开明
基本信息胡开明男大气物理研究所电子邮件:hkm@mail.iap.ac.cn通信地址:邮政编码:研究领域招生信息招生专业070601-气象学招生方向教育背景学历学位工作经历工作简历社会兼职教授课程专利与奖励奖励信息专利成果出版信息发表论文发表著作科研活动科研项目参与会议合作情况项目协作单位指导学生 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡俊杰
基本信息胡俊杰男博导其它电子邮件:huj@ibp.ac.cn通信地址:北京市朝阳区大屯路15号中科院生物物理研究所10号楼邮政编码:100101实验室主页:hu-lab.org/研究领域本实验室主要研究内质网等重要细胞器的形态与功能。内质网是一个广泛连续的膜网络,承担了蛋白合成、脂类合成和钙存储等重要功能。内质网的形态主要包括片状和管状,然而这些不同形态的膜结构如何在同一膜系统内形成,我们还知之甚 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡钧
基本信息胡钧男硕导中国科学院近代物理研究所电子邮件:hujunbaggio@impcas.ac.cn通信地址:甘肃省兰州市城关区南昌路509号邮政编码:研究领域招生信息招生专业070202-粒子物理与原子核物理招生方向实验核天体物理教育背景2005-09--2011-07中国科学院研究生院研究生毕业理学博士2000-09--2004-07兰州大学本科毕业理学学士学历学位工作经历工作简历2015-0 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡俊
基本信息胡俊男硕导中国科学院高能物理研究所电子邮件:hujun@ihep.ac.cn通信地址:北京市石景山区玉泉路19号乙高能所主楼B211邮政编码:100049部门/实验室:实验物理中心研究领域招生信息招生专业081203-计算机应用技术招生方向高性能数据获取技术教育背景2007-09--2012-07中国科学院大学博士2003-09--2007-07中国科学技术大学学士学历学位工作经历工作简历 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡钧
基本信息胡钧男博导中国科学院上海应用物理研究所电子邮件:hujun@sinap.ac.cn通信地址:上海市陕西北路1588号,千路公寓乙座901室邮政编码:201800研究领域招生信息招生专业071011-生物物理学070205-凝聚态物理招生方向单分子探测与单分子操纵界面物理与生物学研究水的纳米特性及其生物学效应教育背景1995-10--1998-12复旦大学博士1986-09--1989-06 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡君利
基本信息胡君利男硕导中国科学院南京土壤研究所电子邮件:jlhu@issas.ac.cn通信地址:南京市北京东路71号邮政编码:210008研究领域丛枝菌根与土壤健康、应用土壤微生物学招生信息招生专业083001-环境科学090301-土壤学招生方向环境生物学土壤微生物学教育背景2010-11--2013-08香港浸会大学哲学博士2004-09--2007-07中国科学院南京土壤研究所理学硕士200 ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28中国科学院大学研究生导师教师师资介绍简介-胡军华
基本信息胡军华男硕导中国科学院成都生物研究所电子邮件:hujh@cib.ac.cn通信地址:成都市人民南路四段9号中科院成都生物所邮政编码:610041研究领域空间生态学、生物地理学、野生动物保护及全球变化生物学招生信息招生专业071002-动物学071300-生态学招生方向动物生态学保护生物学宏生态学教育背景2007-09--2010-07中国科学院研究生院(中国科学院动物研究所)博士2004- ...中国科学院大学师资导师 本站小编 Free考研考试 2020-04-28