Follow
Bo Zhu
Bo Zhu
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
The Simeck family of lightweight block ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
Cryptographic Hardware and Embedded Systems-CHES, 2015
2592015
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
B Zhu, G Gong
Cryptography and Communications 6 (4), 313-333, 2014
41*2014
Password-less authentication system, method and device
G Gong, FAN Xinxin, B Zhu
US Patent 10,136,315, 2018
332018
Tulp: A family of lightweight message authentication codes for body sensor networks
Z Gong, P Hartel, S Nikova, SH Tang, B Zhu
Journal of computer science and technology 29 (1), 53-68, 2014
262014
Improved cryptanalysis of the FOX block cipher
Z Wu, Y Luo, X Lai, B Zhu
International Conference on Trusted Systems, 236-249, 2009
19*2009
Towards secure and practical macs for body sensor networks
Z Gong, P Hartel, S Nikova, B Zhu
Progress in Cryptology-INDOCRYPT 2009, 182-198, 2009
182009
Revisiting MAC forgeries, weak keys and provable security of Galois/counter mode of operation
B Zhu, Y Tan, G Gong
International Conference on Cryptology and Network Security, 20-38, 2013
172013
Loxin—A solution to password-less universal login
B Zhu, X Fan, G Gong
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014
132014
Distinguishing properties of higher order derivatives of Boolean functions
M Duan, X Lai, M Yang, X Sun, B Zhu
Cryptology ePrint Archive, 2010
122010
Revisiting the indifferentiability of PGV hash functions
Y Luo, Z Gong, M Duan, B Zhu, X Lai
Cryptology ePrint Archive, 2009
102009
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
Y Tan, G Gong, B Zhu
92014
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks
B Zhu, Y Zheng, Y Zhou, K Chen
IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009 …, 2009
9*2009
Bitwise Higher Order Differential Cryptanalysis
B Zhu, K Chen, X Lai
Trusted Systems, 250-262, 2010
82010
Distinguishing properties and applications of higher order derivatives of boolean functions
M Duan, M Yang, X Sun, B Zhu, X Lai
Information Sciences 271, 224-235, 2014
72014
Key-insulated encryption based group key management for wireless sensor network
W Qiu, Y Zhou, B Zhu, Y Zheng, Z Gong
Journal of Central South University 20 (5), 1277-1284, 2013
62013
A Practical Platform for Cube-Attack-like Cryptanalyses
B Zhu, W Yu, T Wang
Cryptology ePrint Archive, Report 2010/644, 2010
62010
Key-insulated encryption based key pre-distribution scheme for WSN
W Qiu, Y Zhou, B Zhu, Y Zheng, M Wen, Z Gong
International Conference on Information Security and Assurance, 200-209, 2009
62009
Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems
B Zhu
University of Waterloo, 2015
52015
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
B Zhu, X Fan, G Gong
3*
Another View on Cube Attack, Cube Tester, AIDA and Higer Order Differential Cryptanalysis
B Zhu, G Gong, X Lai, K Chen
22012
The system can't perform the operation now. Try again later.
Articles 1–20