基本信息

许军 男 硕导 中国科学院信息工程研究所
电子邮件: xujun@iie.ac.cn
通信地址: 北京市海淀区树村路19号中国科学院信息工程研究所
邮政编码:
电子邮件: xujun@iie.ac.cn
通信地址: 北京市海淀区树村路19号中国科学院信息工程研究所
邮政编码:
招生信息
招生专业
083900-网络空间安全
招生方向
后量子密码;公钥密码分析;基于格的密码分析
教育背景
2011-09--2014-07 中国科学院信息工程研究所 工学博士2004-09--2007-07 厦门大学 理学硕士2000-09--2004-07 阜阳师范大学 理学学士
工作经历
工作简历
2019-11~现在, 中科院信工所, 副研究员2015-02~2019-10,中科院信工所, 助理研究员2011-01~2015-01,安徽大学, 讲师2007-07~2010-12,安徽大学, 助教
社会兼职
2022-12-31-2026-12-30,中国密码学会第四届组织工作委员会, 委员
教授课程
信息安全数学基础
出版信息
发表论文
[1] Computer Security – ESORICS 2024. 2024, 第 2 作者 通讯作者 [2] 许军, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2023, 第 1 作者[3] Jun Xu, Santanu Sarkar, Wang Huaxiong, Lei Hu. Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. Asiacrypt 2022. 2023, 第 1 作者[4] 许军, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2023, 第 1 作者[5] Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022. 2022, 第 2 作者[6] Jing Gao, Jun Xu, Lei Hu. Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022. 2022, 第 2 作者[7] 王天宇, 许军, 刘月君, 胡磊, 周永彬. 基于格Fiat-Shamir签名随机数泄漏攻击的若干改进. 密码学报[J]. 2022, 第 2 作者9(6): 1039-1052, http://lib.cqvip.com/Qikan/Article/Detail?id=7108746309.[8] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting orthogonal lattice attacks on approximate common divisor problems. THEORETICAL COMPUTER SCIENCE[J]. 2022, 第 1 作者911: 55-69, http://dx.doi.org/10.1016/j.tcs.2022.02.005.[9] Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022. 2022, 第 2 作者[10] Jing Gao, Jun Xu, Lei Hu. Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022. 2022, 第 2 作者[11] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting orthogonal lattice attacks on approximate common divisor problems. THEORETICAL COMPUTER SCIENCE[J]. 2022, 第 1 作者911: 55-69, http://dx.doi.org/10.1016/j.tcs.2022.02.005.[12] Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng. On the Ideal Shortest Vector Problem over Random Rational Primes. Advances in cryptology -- EUROCRYPT 2021 : Part I /. 2021, 第 2 作者559-583, http://dx.doi.org/10.1007/978-3-030-77870-5_20.[13] Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu. Integer LWE with Non-Subgaussian Error and Related Attacks. International Security Conference (ISC 2021). 2021, 第 3 作者[14] Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng. On the Ideal Shortest Vector Problem over Random Rational Primes. Advances in cryptology -- EUROCRYPT 2021 : Part I /. 2021, 第 2 作者559-583, http://dx.doi.org/10.1007/978-3-030-77870-5_20.[15] Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu. Integer LWE with Non-Subgaussian Error and Related Attacks. International Security Conference (ISC 2021). 2021, 第 3 作者[16] Jun Xu, Lei Hu, Santanu Sarkar. Cryptanalysis of elliptic curve hidden number problem from PKC 2017. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 第 1 作者88(2): 341-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000490197600001.[17] Jun Xu, Lei Hu, Santanu Sarkar. Cryptanalysis of elliptic curve hidden number problem from PKC 2017. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 第 1 作者88(2): 341-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000490197600001.[18] Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1. 2019, 第 1 作者11692: 297-321, [19] Xiaona Zhang, LiPing Wang, Jun Xu. Certifying multi-power RSA. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(4): 330-335, [20] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019[J]. 2019, 第 1 作者11898: 398-411, [21] Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1. 2019, 第 1 作者11692: 297-321, [22] Xiaona Zhang, LiPing Wang, Jun Xu. Certifying multi-power RSA. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(4): 330-335, [23] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019[J]. 2019, 第 1 作者11898: 398-411, [24] Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 第 1 作者86(9): 1997-2033, http://dx.doi.org/10.1007/s10623-017-0435-4.[25] Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 第 1 作者86(9): 1997-2033, http://dx.doi.org/10.1007/s10623-017-0435-4.[26] Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 第 4 作者 通讯作者 83(1): 1-21, https://www.webofscience.com/wos/woscc/full-record/WOS:000394969100001.[27] Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 第 11 作者83(1): 1-21, https://www.webofscience.com/wos/woscc/full-record/WOS:000394969100001.[28] Liqiang Peng, Lei Hu, Lu Yao, Santanu Sarkar, Jun Xu, Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015. 2015, 第 5 作者9462: 105-123, [29] Liqiang Peng, Lei Hu, Lu Yao, Santanu Sarkar, Jun Xu, Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015. 2015, 第 5 作者9462: 105-123, [30] Jun Xu, Lei Hu, Siwei Sun, yonghong xie. Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET COMMUNICATIONS[J]. 2014, 第 1 作者 通讯作者 8(12): 2142-2146, http://www.corc.org.cn/handle/1471x/2157588.[31] Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie. Partial Key Exposure Attacks on Takagi's Variant of RSA. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014. 2014, 第 3 作者8479: 134-150, [32] Jun Xu, Lei Hu, Siwei Sun. Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET COMMUNICATIONS[J]. 2014, 第 1 作者 通讯作者 8(14): 2433-2437, http://www.corc.org.cn/handle/1471x/2155421.[33] 彭力强, 胡磊, 黄章杰, 许军. 模背包向量问题的实际复杂度与基于格密码体制的实际安全性. 密码学报[J]. 2014, 第 4 作者225-234, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484850.[34] Peng Liqiang, Zuo Jinyin, Hu Lei, Xu Jun. Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 4 作者23(1): 175-178, http://www.corc.org.cn/handle/1471x/2087156.[35] Jun Xu, Lei Hu, Siwei Sun, yonghong xie. Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET COMMUNICATIONS[J]. 2014, 第 11 作者8(12): 2142-2146, http://www.corc.org.cn/handle/1471x/2157588.[36] Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie. Partial Key Exposure Attacks on Takagi's Variant of RSA. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014. 2014, 第 3 作者8479: 134-150, [37] Jun Xu, Lei Hu, Siwei Sun. Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET COMMUNICATIONS[J]. 2014, 第 11 作者8(14): 2433-2437, http://www.corc.org.cn/handle/1471x/2155421.[38] 彭力强, 胡磊, 黄章杰, 许军. ���������������������������������������������������������������������������������. 密码学报[J]. 2014, 第 4 作者225-234, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484850.[39] Peng Liqiang, Zuo Jinyin, Hu Lei, Xu Jun. Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 4 作者23(1): 175-178, http://www.corc.org.cn/handle/1471x/2087156.[40] Peng, Liqiang, Hu, Lei, Xu, Jun, Xie, Yonghong, Zuo, Jinyin. Analysis of two knapsack public key cryptosystems. IET COMMUNICATIONS[J]. 2013, 第 3 作者7(15): 1638-1643, https://www.webofscience.com/wos/woscc/full-record/WOS:000325980500008.[41] Peng, Liqiang, Hu, Lei, Xu, Jun, Xie, Yonghong, Zuo, Jinyin. Analysis of two knapsack public key cryptosystems. IET COMMUNICATIONS[J]. 2013, 第 3 作者7(15): 1638-1643, https://www.webofscience.com/wos/woscc/full-record/WOS:000325980500008.
科研活动
科研项目
( 1 ) 量子安全的轻量级密码与安全协议, 参与, 国家任务, 2018-01--2022-12( 2 ) 侧信道攻击中秘密信息泄露比列的极限问题, 负责人, 研究所自主部署, 2020-02--2023-01( 3 ) Coppersmith方法中有益多项式的优化选取策略及其应用, 负责人, 国家任务, 2022-01--2025-12( 4 ) 后量子公钥密码中的参数设计机理研究, 参与, 国家任务, 2022-08--2025-02
参与会议
(1)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator 美密2019 2023-08-20(2)基于格的Coppersmith方法及其应用 第七届编码密码组合国际研讨会 2023-05-12(3)Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange 亚密2022 2022-12-10(4)公钥密码分析中的格方法及其应用 中国密码学会2021年密码算法学术会议 2021-04-10
指导学生
现指导学生
朱学琦 硕士研究生 083900-网络空间安全
贾燕 硕士研究生 083900-网络空间安全
邹艳丽 硕士研究生 085412-网络与信息安全
宋俊 硕士研究生 083900-网络空间安全