Zhu, B. ., Tan, Y. ., & Gong, G. . (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Reference author: B. Zhu
First name
B.
Last name
Zhu
Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms. IEEE Trans on Dependable and Secure Computing.
Zhu, B. ., Fan, X. ., & Gong, G. . (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
Yang, G. ., Zhu, B. ., Suder, V. ., Aagaard, M. ., & Gong, G. . (2015). The Simeck Family of Lightweight Block Ciphers. (Original work published 2015)
Tan, Y. ., Gong, G. ., & Zhu, B. . (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions. Journal of Cryptography and Communications. (Original work published 2014)
Tan, Y. ., Gong, G. ., & Zhu, B. . (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions. Journal of Cryptography and Communications.
Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Loxin — A Solution to Password-less Universal Login. Toronto, Canada.
Zhu, B. ., & Gong, G. . (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64. Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
Tan, Y. ., Gong, G. ., & Zhu, B. . (2017). Enhanced criteria on differential uniformity and nonlinearity of cryptographic significant functions. Journal of Cryptography and Communications, 8, 291-311. (Original work published 2016)
Tan, Y. ., Gong, G. ., & Zhu, B. . (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions. Journal of Cryptography and Communications, Springer. (Original work published 2015)