Hongru Wei
2003.12-present: Department of information and Computing Science, University of Science and Technology Beijing (USTB), China; 1999. 12-2003. 12: Worked in Institute of software, Chinese Academy of Sciences; 1994. 07-1999. 12: Worked in Xi'an Shiyou University; 1983. 09-1994. 07: Studied and Worked in Mathematics Department of Northwest University.
1. Over the years, around mathematics, information security and cryptography and Internet of things technology, Weihongru has undertaken the teaching work of related courses, presided over or participated in a number of teaching reform projects and National Natural Science Foundation projects, published more than 50 teaching reform and scientific research papers, participated in the compilation and editor in chief of applied computing method course, information security and cryptography and other teaching materials. 2. Weihongru won the title of "I love my teacher - the best teacher in my mind" in the 8th session, "advanced worker of Beijing University of science and technology", "teacher of employment contribution", "advanced individual in enrollment and publicity", "higher mathematics inspection free course" and several standard courses, two second prizes of Beijing Education and teaching reform and textbook construction achievements, and won the Baosteel excellent teacher award in 2018, In 2021, excellent moral education workers in Beijing universities, mathematics teaching and research studio won the National worker pioneer number in 2021, and the Party branch of the Department of information and computing science won the first batch of "National Party building model branches".
2-3 Part Time Graduate Students In Electronic Information (Software Engineering) per year.
1.XieGaoqi,WeiHongru.Impossible Differential Attack of Block Cipher ARIA. Computer Research and Development. Volume:55,Issue:6,Issue date:June 1, 2018,Publication Year:2018,Pages:1201-1210. 2.WeiHongru,YinGuangli.Related-key impossible differential cryptanalysis on LBlock. Computer Research and Development. Volume:51,Issue:7,Issue date:July 1, 2014,Publication Year:2014,Pages:1520-1526. 3.ZhengYafei,WeiHongru. Biclique cryptanalysis of block cipher SHACAL2. Computer Research and Development. Volume:51,Issue:10,Issue date:October 1, 2014,Publication Year:2014,Pages:2329-2335. 4.ZhengYafei,WeiHongru. 3-subset meet-in-the-middle attack on block cipher TWIS. Journal on Communications. Volume:35,Issue:6,Issue date:June 2014, Publication Year:2014 ,Pages:180-184. 5.WeiHongru,QiChao. A new security mode based identity encryption in ad hoc network. Proc. - Int. Conf. Multimedia Inf. Networking Secur., MINES. Issue date:2011,Publication Year:2011,Pages:81-85. 6. WeiHongru,ZhangHongfei,GaoHongjie.Impossible Differential Crypta-Nalysis on 13-round Block CipherSNAKE(2)[C].Jinan:IEEE CPS,2018:159-162. 7.WeiHongru,ZhangHongfei,GaoHongjie. Impossible Differential Crypta-Nalysis on 13-round Block CipherSNAKE(2)[C].Jinan:IEEE CPS,2018:159-162. 8.WeiHongru.ZhengYafei.Algebraic Techniques in LinearCryptanalysis[J]. Advanced Materials Research.Vols. 756-759 (2013):3634-3639. 9.WeiHongru,HuJiayuan.Attack and Improvement of a Proxy Multi-Signature Scheme. International Conference on Computer Science and Electronic Technology (CSET 2016), August 2016, Published by Atlantis Press: 60-63.
The orientation of postgraduate education is as follows: Information security and cryptography , Internet of things technology and software engineering.