After graduating from college, he stayed on as a teacher and served as the director of the radio foundation teaching and research section, engaged in the teaching and research of the basic electronics course;
1978 transferred to China university of science and technology (Beijing) graduate school to teach, participated in the establishment of the research and education center for data and communication protection (DCS center), served as laboratory director, and was promoted to associate researcher on June 1986;
Since 1980, he has been mainly engaged in the research of cryptography and information security.
65438+1In April 1995, he was employed as a researcher in the State Key Laboratory of Information Security of the Graduate School of China University of Science and Technology;
65438+1In June 1997, he was employed as a doctoral supervisor in the Graduate School of China University of Science and Technology.
Teacher Lu: He is the teacher who gives the most lectures in the class.
It was purely accidental that I first started listening to Teacher Lu's class. During the course audition, once I got up early for class, the students recommended Mr. Lu's course in every way. Unable to stand the enthusiasm of my classmates, I changed my original plan and sat in on Teacher Lu's class. Unexpectedly, after hearing this, I actually decided to change the course list that I had already discussed with my tutor and choose Mr. Lu's class. When I first met Mr. Lu, he was tall, with a big face, broad shoulders and a little thin. At the age of 60, I still look very young, except for a little wrinkle, I can't catch a trace of white hair. I'm afraid this is rare in the whole Zhongguancun. But this veteran has made outstanding contributions in the field of information security. He is the founder of the first and only open business algorithm SMS4 in China. He is the inventor of digital physical noise source chip. His fame is all over the information security circle, and his peaches and plums are all over the world. Teacher Lu's "Introduction to Information System Security" course is a real introductory course. He introduced the problem (demand), theory, realization (technology), application and development of information security in an all-round way with "1234567". This "1234567" is a kind of beauty, two functions, three assumptions, four operations, five attributes, six problems and seven applications. Although there are not many technologies and formulas, they are vivid and interesting, and contain profound thoughts on the theoretical basis and practical experience of information security. In class, we students are really absorbing the nutrients of predecessors, digesting the essence of predecessors' thoughts, and standing on the shoulders of predecessors to see the problem. Teacher Lu not only teaches us personally, but also often invites experts from all fields of information security to teach. Teacher Lu said that they are all experts in their respective fields, and I am not very familiar with their fields. Ask them to speak their major better and more thoroughly than I do. Starting with Wang Yongmin, the inventor of the font, Intel technical experts Zhao Jun, Qu and Zhang Mingde, and American professors Ding Jintai, Qu, Nan, Xu and Qing. Every name can make people respect, everyone is or used to be all-powerful, and every lecture knows the truth. Perhaps, in the Academy of Sciences, there will never be a formal course with so many famous people giving lectures. Many old gentlemen who came to give lectures said, "Teacher Lu asked me to come, but I dare not." Teacher Lu's class is still very interesting. Needless to say, "one two three four five six seven" is very interesting. He also found an interesting use of natural entropy-using it to analyze gender. He used to write small poems and code them with the combination of Chinese characters. He used the "Thirty-six Tactics" of the Art of War to compile a cipher book. And teacher Lu's stick ... there are too many stories. Teacher Lu's course seems interesting and it is not easy to learn. What Mr. Lu said in class is a summary of his decades of experience, and every sentence is full of wisdom and truth. Every time I review the content of Mr. Lu's class, I always have to consult a lot of materials and books to understand the depth of the teacher's words a little. Teacher Lu sometimes points us in the right direction to look up information. When talking about randomness, he recommended that we read A Brief History of Time, read books related to quantum mechanics, and study the definition, hypothesis and theory of randomness. Two computer exercises, although not difficult, also need to consult a lot of information on the Internet, read a lot of online news, comments, technical documents and so on. In the final exam, Mr. Lu did not arrange the form of classroom exam, but organized the thesis defense. Teacher Lu found a classroom and invited several colleagues to review each student's papers. The form is similar to thesis defense. Each student has ten minutes to answer the teacher's questions. These things seem easy, but they are not easy at all. The task of finding information, refining ideas and forming words is unimaginable. A paper with only a few thousand words may take several weeks to complete. After a defense, the students all gained a lot. Teacher Lu is conscientious, tireless and conscientious in teaching and educating people. He also invited academic experts in this field to teach in class and communicate face to face with his classmates. Teacher Lu did not forget to cultivate the younger generation, fine-cut the thick branches and carve them carefully, which can be seen.