Zhu, B., Tan, Y., & Gong, G. (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Reference author: B. Zhu
First name
B.
Last name
Zhu
Tan, Y., Gong, G., & Zhu, B. (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications. (Original work published 2014)
Tan, Y., Gong, G., & Zhu, B. (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications.
Zhu, B., Fan, X., & Gong, G. (2014). Loxin — A Solution to Password-less Universal Login Toronto, Canada.
Zhu, B., & Gong, G. (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
Zhu, B., Fan, X., & Gong, G. (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms IEEE Trans on Dependable and Secure Computing.
Zhu, B., Fan, X., & Gong, G. (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms
Yang, G., Zhu, B., Suder, V., Aagaard, M., & Gong, G. (2015). The Simeck Family of Lightweight Block Ciphers (Original work published 2015)
Tan, Y., Gong, G., & Zhu, B. (2017). Enhanced criteria on differential uniformity and nonlinearity of cryptographic significant functions Journal of Cryptography and Communications, 8, 291-311. (Original work published 2016)
Tan, Y., Gong, G., & Zhu, B. (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications, Springer. (Original work published 2015)