基本信息
许军  男  硕导  中国科学院信息工程研究所
电子邮件: xujun@iie.ac.cn
通信地址: 北京市海淀区树村路19号中国科学院信息工程研究所
邮政编码:

招生信息

   
招生专业
083900-网络空间安全
招生方向
后量子密码;公钥密码分析;基于格的密码分析

教育背景

2011-09--2014-07   中国科学院信息工程研究所   工学博士
2004-09--2007-07   厦门大学   理学硕士
2000-09--2004-07   阜阳师范大学   理学学士

工作经历

   
工作简历
2019-11~现在, 中科院信工所, 副研究员
2015-02~2019-10,中科院信工所, 助理研究员
2011-01~2015-01,安徽大学, 讲师
2007-07~2010-12,安徽大学, 助教
社会兼职
2022-12-31-2026-12-30,中国密码学会第四届组织工作委员会, 委员

教授课程

信息安全数学基础

出版信息

   
发表论文
[1] Computer Security – ESORICS 2024. 2024, 第 2 作者  通讯作者  
[2] 许军, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2023, 第 1 作者
[3] Jun Xu, Santanu Sarkar, Wang Huaxiong, Lei Hu. Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. Asiacrypt 2022. 2023, 第 1 作者
[4] 许军, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE TRANSACTIONS ON INFORMATION THEORY[J]. 2023, 第 1 作者
[5] Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022. 2022, 第 2 作者
[6] Jing Gao, Jun Xu, Lei Hu. Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022. 2022, 第 2 作者
[7] 王天宇, 许军, 刘月君, 胡磊, 周永彬. 基于格Fiat-Shamir签名随机数泄漏攻击的若干改进. 密码学报[J]. 2022, 第 2 作者9(6): 1039-1052, http://lib.cqvip.com/Qikan/Article/Detail?id=7108746309.
[8] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting orthogonal lattice attacks on approximate common divisor problems. THEORETICAL COMPUTER SCIENCE[J]. 2022, 第 1 作者911: 55-69, http://dx.doi.org/10.1016/j.tcs.2022.02.005.
[9] Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. New Results of Breaking the CLS Scheme from ACM-CCS 2014. ICICS 2022. 2022, 第 2 作者
[10] Jing Gao, Jun Xu, Lei Hu. Inferring Sequences Produced by the Quadratic Generator. Inscrypt 2022. 2022, 第 2 作者
[11] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting orthogonal lattice attacks on approximate common divisor problems. THEORETICAL COMPUTER SCIENCE[J]. 2022, 第 1 作者911: 55-69, http://dx.doi.org/10.1016/j.tcs.2022.02.005.
[12] Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng. On the Ideal Shortest Vector Problem over Random Rational Primes. Advances in cryptology -- EUROCRYPT 2021 : Part I /. 2021, 第 2 作者559-583, http://dx.doi.org/10.1007/978-3-030-77870-5_20.
[13] Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu. Integer LWE with Non-Subgaussian Error and Related Attacks. International Security Conference (ISC 2021). 2021, 第 3 作者
[14] Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng. On the Ideal Shortest Vector Problem over Random Rational Primes. Advances in cryptology -- EUROCRYPT 2021 : Part I /. 2021, 第 2 作者559-583, http://dx.doi.org/10.1007/978-3-030-77870-5_20.
[15] Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu. Integer LWE with Non-Subgaussian Error and Related Attacks. International Security Conference (ISC 2021). 2021, 第 3 作者
[16] Jun Xu, Lei Hu, Santanu Sarkar. Cryptanalysis of elliptic curve hidden number problem from PKC 2017. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 第 1 作者88(2): 341-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000490197600001.
[17] Jun Xu, Lei Hu, Santanu Sarkar. Cryptanalysis of elliptic curve hidden number problem from PKC 2017. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2020, 第 1 作者88(2): 341-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000490197600001.
[18] Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1. 2019, 第 1 作者11692: 297-321, 
[19] Xiaona Zhang, LiPing Wang, Jun Xu. Certifying multi-power RSA. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(4): 330-335, 
[20] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019[J]. 2019, 第 1 作者11898: 398-411, 
[21] Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan. New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1. 2019, 第 1 作者11692: 297-321, 
[22] Xiaona Zhang, LiPing Wang, Jun Xu. Certifying multi-power RSA. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(4): 330-335, 
[23] Jun Xu, Santanu Sarkar, Lei Hu. Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019[J]. 2019, 第 1 作者11898: 398-411, 
[24] Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 第 1 作者86(9): 1997-2033, http://dx.doi.org/10.1007/s10623-017-0435-4.
[25] Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2018, 第 1 作者86(9): 1997-2033, http://dx.doi.org/10.1007/s10623-017-0435-4.
[26] Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 第 4 作者  通讯作者  83(1): 1-21, https://www.webofscience.com/wos/woscc/full-record/WOS:000394969100001.
[27] Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 第 11 作者83(1): 1-21, https://www.webofscience.com/wos/woscc/full-record/WOS:000394969100001.
[28] Liqiang Peng, Lei Hu, Lu Yao, Santanu Sarkar, Jun Xu, Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015. 2015, 第 5 作者9462: 105-123, 
[29] Liqiang Peng, Lei Hu, Lu Yao, Santanu Sarkar, Jun Xu, Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015. 2015, 第 5 作者9462: 105-123, 
[30] Jun Xu, Lei Hu, Siwei Sun, yonghong xie. Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET COMMUNICATIONS[J]. 2014, 第 1 作者  通讯作者  8(12): 2142-2146, http://www.corc.org.cn/handle/1471x/2157588.
[31] Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie. Partial Key Exposure Attacks on Takagi's Variant of RSA. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014. 2014, 第 3 作者8479: 134-150, 
[32] Jun Xu, Lei Hu, Siwei Sun. Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET COMMUNICATIONS[J]. 2014, 第 1 作者  通讯作者  8(14): 2433-2437, http://www.corc.org.cn/handle/1471x/2155421.
[33] 彭力强, 胡磊, 黄章杰, 许军. 模背包向量问题的实际复杂度与基于格密码体制的实际安全性. 密码学报[J]. 2014, 第 4 作者225-234, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484850.
[34] Peng Liqiang, Zuo Jinyin, Hu Lei, Xu Jun. Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 4 作者23(1): 175-178, http://www.corc.org.cn/handle/1471x/2087156.
[35] Jun Xu, Lei Hu, Siwei Sun, yonghong xie. Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET COMMUNICATIONS[J]. 2014, 第 11 作者8(12): 2142-2146, http://www.corc.org.cn/handle/1471x/2157588.
[36] Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie. Partial Key Exposure Attacks on Takagi's Variant of RSA. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014. 2014, 第 3 作者8479: 134-150, 
[37] Jun Xu, Lei Hu, Siwei Sun. Cryptanalysis of two cryptosystems based on multiple intractability assumptions. IET COMMUNICATIONS[J]. 2014, 第 11 作者8(14): 2433-2437, http://www.corc.org.cn/handle/1471x/2155421.
[38] 彭力强, 胡磊, 黄章杰, 许军. ���������������������������������������������������������������������������������. 密码学报[J]. 2014, 第 4 作者225-234, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484850.
[39] Peng Liqiang, Zuo Jinyin, Hu Lei, Xu Jun. Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 4 作者23(1): 175-178, http://www.corc.org.cn/handle/1471x/2087156.
[40] Peng, Liqiang, Hu, Lei, Xu, Jun, Xie, Yonghong, Zuo, Jinyin. Analysis of two knapsack public key cryptosystems. IET COMMUNICATIONS[J]. 2013, 第 3 作者7(15): 1638-1643, https://www.webofscience.com/wos/woscc/full-record/WOS:000325980500008.
[41] Peng, Liqiang, Hu, Lei, Xu, Jun, Xie, Yonghong, Zuo, Jinyin. Analysis of two knapsack public key cryptosystems. IET COMMUNICATIONS[J]. 2013, 第 3 作者7(15): 1638-1643, https://www.webofscience.com/wos/woscc/full-record/WOS:000325980500008.

科研活动

   
科研项目
( 1 ) 量子安全的轻量级密码与安全协议, 参与, 国家任务, 2018-01--2022-12
( 2 ) 侧信道攻击中秘密信息泄露比列的极限问题, 负责人, 研究所自主部署, 2020-02--2023-01
( 3 ) Coppersmith方法中有益多项式的优化选取策略及其应用, 负责人, 国家任务, 2022-01--2025-12
( 4 ) 后量子公钥密码中的参数设计机理研究, 参与, 国家任务, 2022-08--2025-02
参与会议
(1)New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator   美密2019   2023-08-20
(2)基于格的Coppersmith方法及其应用   第七届编码密码组合国际研讨会   2023-05-12
(3)Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange   亚密2022   2022-12-10
(4)公钥密码分析中的格方法及其应用   中国密码学会2021年密码算法学术会议   2021-04-10

指导学生

现指导学生

朱学琦  硕士研究生  083900-网络空间安全  

贾燕  硕士研究生  083900-网络空间安全  

邹艳丽  硕士研究生  085412-网络与信息安全  

宋俊  硕士研究生  083900-网络空间安全