Pages

Monday, 16 February 2015

一些关于加密算法的文章


Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [PDF] [Code] [ePrint] [BibTeX]
Bo Zhu, Xinxin Fan, and Guang Gong. In submission
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms (Poster) [PDF] [Code] [BibTeX]
Bo Zhu, Xinxin Fan, and Guang Gong. To appear at CODASPY'15: the 5th ACM Conference on Data and Application Security and Privacy
Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions [PDF] [BibTeX]
Yin Tan, Guang Gong, and Bo Zhu. In submission
Loxin -- A Solution to Password-less Universal Login [PDF] [DOI] [BibTeX]
Bo Zhu, Xinxin Fan, and Guang Gong. 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity 2014). pp 494-499
Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 [PDF] [DOI] [BibTeX]
Bo Zhu and Guang Gong. Journal of Cryptography and Communications -- Discrete Structures, Boolean Functions and Sequences (CCDS). Volume 6, Issue 4, pp 313-333, December 2014
Distinguishing Properties and Applications of Higher Order 4 Derivatives of Boolean Functions [DOI] [BibTeX]
Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, and Xuejia Lai. Information Sciences, Elsevier, Feb 2014
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks [DOI] [BibTeX]
Zheng Gong, Pieter Hartel, Svetla Nikova, Shao-Hua Tang, and Bo Zhu. Journal of Computer Science and Technology, vol. 29 (1), pp 53-68, Jan 2014
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation [PDF] [DOI] [BibTeX]
Bo Zhu, Yin Tan, and Guang Gong. 12th International Conference on Cryptology and Network Security (CANS 2013). LNCS 8257. pp 20-38
Another View on Cube Attack, Cube Tester, AIDA and Higher Order Differential Cryptanalysis [PDF] [BibTeX]
Bo Zhu, Guang Gong, Xuejia Lai, and Kefei Chen. CACR Technical Report 2012-01
A Practical Platform for Cube-Attack-like Cryptanalyses [PDF] [ePrint] [BibTeX]
Bo Zhu, Wenye Yu, and Tao Wang. Cryptology ePrint Archive, Report 2010/644
Bitwise Higher Order Differential Cryptanalysis [DOI] [BibTeX]
Bo Zhu, Kefei Chen, and Xuejia Lai. 1st International Conference on Trusted Systems (INTRUST 2009). LNCS 6163. pp 250-262
Improved Cryptanalysis of the FOX Block Cipher [DOI] [BibTeX]
Zhongming Wu, Yiyuan Luo, Xuejia Lai, and Bo Zhu. 1st International Conference on Trusted Systems (INTRUST 2009). LNCS 6163. pp 236-249
Towards Secure and Practical MACs for Body Sensor Networks [DOI] [BibTeX]
Zheng Gong, Pieter Hartel, Svetla Nikova, and Bo Zhu. 10th International Conference on Cryptology in India (INDOCRYPT 2009). LNCS 5922. pp 182-198
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks [DOI] [BibTeX]
 

Miscellaneous