- Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [PDF] [Code] [ePrint] [BibTeX]
- Bo Zhu, Xinxin Fan, and Guang Gong. In submission
- Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms (Poster) [PDF] [Code] [BibTeX]
- Bo Zhu, Xinxin Fan, and Guang Gong. To appear at CODASPY'15: the 5th ACM Conference on Data and Application Security and Privacy
- Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions [PDF] [BibTeX]
- Yin Tan, Guang Gong, and Bo Zhu. In submission
- Loxin -- A Solution to Password-less Universal Login [PDF] [DOI] [BibTeX]
- Bo Zhu, Xinxin Fan, and Guang Gong. 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity 2014). pp 494-499
- Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 [PDF] [DOI] [BibTeX]
- Bo Zhu and Guang Gong. Journal of Cryptography and
Communications -- Discrete Structures, Boolean Functions and Sequences
(CCDS). Volume 6, Issue 4, pp 313-333, December 2014
- Distinguishing Properties and Applications of Higher Order 4 Derivatives of Boolean Functions [DOI] [BibTeX]
- Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, and Xuejia Lai. Information Sciences, Elsevier, Feb 2014
- TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks [DOI] [BibTeX]
- Zheng Gong, Pieter Hartel, Svetla Nikova, Shao-Hua Tang, and Bo Zhu. Journal of Computer Science and Technology, vol. 29 (1), pp 53-68, Jan 2014
- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation [PDF] [DOI] [BibTeX]
- Bo Zhu, Yin Tan, and Guang Gong. 12th International Conference on Cryptology and Network Security (CANS 2013). LNCS 8257. pp 20-38
- Another View on Cube Attack, Cube Tester, AIDA and Higher Order Differential Cryptanalysis [PDF] [BibTeX]
- Bo Zhu, Guang Gong, Xuejia Lai, and Kefei Chen. CACR Technical Report 2012-01
- A Practical Platform for Cube-Attack-like Cryptanalyses [PDF] [ePrint] [BibTeX]
- Bo Zhu, Wenye Yu, and Tao Wang. Cryptology ePrint Archive, Report 2010/644
- Bitwise Higher Order Differential Cryptanalysis [DOI] [BibTeX]
- Bo Zhu, Kefei Chen, and Xuejia Lai. 1st International Conference on Trusted Systems (INTRUST 2009). LNCS 6163. pp 250-262
- Improved Cryptanalysis of the FOX Block Cipher [DOI] [BibTeX]
- Zhongming Wu, Yiyuan Luo, Xuejia Lai, and Bo Zhu. 1st International Conference on Trusted Systems (INTRUST 2009). LNCS 6163. pp 236-249
- Towards Secure and Practical MACs for Body Sensor Networks [DOI] [BibTeX]
- Zheng Gong, Pieter Hartel, Svetla Nikova, and Bo Zhu. 10th International Conference on Cryptology in India (INDOCRYPT 2009). LNCS 5922. pp 182-198
- How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks [DOI] [BibTeX]
-
Miscellaneous
FROM https://about.bozhu.me/
-