Bo Zhu
Bo Zhu
Verified email at - Homepage
Cited by
Cited by
The Simeck family of lightweight block ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
Cryptographic Hardware and Embedded Systems-CHES, 2015
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
B Zhu, G Gong
Cryptography and Communications 6, 313-333, 2014
Password-less authentication system, method and device
G Gong, FAN Xinxin, B Zhu
US Patent 10,136,315, 2018
Tulp: A family of lightweight message authentication codes for body sensor networks
Z Gong, P Hartel, S Nikova, SH Tang, B Zhu
Journal of computer science and technology 29, 53-68, 2014
Improved cryptanalysis of the FOX block cipher
Z Wu, Y Luo, X Lai, B Zhu
International Conference on Trusted Systems, 236-249, 2009
Revisiting MAC forgeries, weak keys and provable security of Galois/counter mode of operation
B Zhu, Y Tan, G Gong
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
Distinguishing properties of higher order derivatives of Boolean functions
M Duan, X Lai, M Yang, X Sun, B Zhu
Cryptology ePrint Archive, 2010
Loxin—A solution to password-less universal login
B Zhu, X Fan, G Gong
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014
Towards secure and practical macs for body sensor networks
Z Gong, P Hartel, S Nikova, B Zhu
Progress in Cryptology-INDOCRYPT 2009, 182-198, 2009
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
Y Tan, G Gong, B Zhu
Revisiting the indifferentiability of PGV hash functions
Y Luo, Z Gong, M Duan, B Zhu, X Lai
Cryptology ePrint Archive, 2009
Bitwise Higher Order Differential Cryptanalysis
B Zhu, K Chen, X Lai
Trusted Systems, 250-262, 2010
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks
B Zhu, Y Zheng, Y Zhou, K Chen
IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009 …, 2009
Distinguishing properties and applications of higher order derivatives of Boolean functions
M Duan, M Yang, X Sun, B Zhu, X Lai
Information Sciences 271, 224-235, 2014
A Practical Platform for Cube-Attack-like Cryptanalyses
B Zhu, W Yu, T Wang
Cryptology ePrint Archive, Report 2010/644, 2010
Key-insulated encryption based key pre-distribution scheme for WSN
W Qiu, Y Zhou, B Zhu, Y Zheng, M Wen, Z Gong
Advances in Information Security and Assurance: Third International …, 2009
Key-insulated encryption based group key management for wireless sensor network
W Qiu, Y Zhou, B Zhu, Y Zheng, Z Gong
Journal of Central South University 20 (5), 1277-1284, 2013
The simeck family of lightweight block ciphers International Workshop on Cryptographic Hardware and Embedded Systems
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
Heidelberg: Springer) p, 2015
Analysis and design of authentication and encryption algorithms for secure cloud systems
B Zhu
University of Waterloo, 2015
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
B Zhu, X Fan, G Gong
The system can't perform the operation now. Try again later.
Articles 1–20