Dr. Bo Zhu

Postdoctoral Research Fellow at the University of Waterloo.
Click here to see my email address

Education

Doctor of Philosophy, University of Waterloo, CanadaSep. 2010 - Jan. 2015
Supervisor: Prof. Guang Gong
Communications Security Lab at Dept. Electrical and Computer Engineering
PhD Thesis: Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems
Master of Science, Shanghai Jiao Tong University, ChinaSep. 2007 - May 2010
Supervisors: Prof. Kefei Chen and Prof. Xuejia Lai
Cryptography and Information Security Lab at Dept. Computer Science
Bachelor of Engineering, Tsinghua University, ChinaAug. 2003 - July 2007
Dept. Electrical Engineering

Employment

Postdoctoral Research Fellow, University of Waterloo, CanadaJan. 2015 - July 2015
Work with Prof. Guang Gong and Prof. Mark Aagaard
Design and analyze lightweight cryptographic primitives
Write patent applications and funding proposals
Summer Associate, Cross-desk Strategist, Morgan Stanley, New YorkJune 2014 - Aug. 2014
Securitized Products Group, Fixed Income Division
Aggregate, analyze, and visualize financial data
Embedded Software Designer Intern, BlackBerry, OttawaSept. 2013 - Dec. 2013
QCT Integration & Bringup Team
Integrate, test, and debug embedded software for operating systems of mobile devices
Teaching Assistants, University of Waterloo, Canada2011 - 2013
SE 350, Operating Systems, Winter 2013
ECE 254, Operating Systems, Fall 2012
ECE 354, Real-Time Operating Systems, Spring 2011
ECE 124, Digital Circuits & Systems, Winter 2011

Selected Publications

The Simeck Family of Lightweight Block Ciphers [PDF] [Code] [ePrint] [BibTeX]
Gangqiang Yang, Bo Zhu, Valentin Suder, Mark Aagaard, Guang Gong. To appear at the 17th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015)
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [Full version] [DOI] [Code] [BibTeX]
Bo Zhu, Xinxin Fan, and Guang Gong. The 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015). pp 127-129
Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions [PDF] [DOI] [BibTeX]
Yin Tan, Guang Gong, and Bo Zhu. Journal of Cryptography and Communications -- Discrete Structures, Boolean Functions and Sequences (CCDS), Springer US, June 2015
Loxin -- A Solution to Password-less Universal Login [Full version] [DOI] [BibTeX]
Bo Zhu, Xinxin Fan, and Guang Gong. 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity 2014). pp 494-499
Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 [PDF] [DOI] [BibTeX]
Bo Zhu and Guang Gong. Journal of Cryptography and Communications -- Discrete Structures, Boolean Functions and Sequences (CCDS). Volume 6, Issue 4, pp 313-333, December 2014
Distinguishing Properties and Applications of Higher Order 4 Derivatives of Boolean Functions [DOI] [BibTeX]
Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, and Xuejia Lai. Information Sciences, Elsevier, Feb 2014
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks [DOI] [BibTeX]
Zheng Gong, Pieter Hartel, Svetla Nikova, Shao-Hua Tang, and Bo Zhu. Journal of Computer Science and Technology, vol. 29 (1), pp 53-68, Jan 2014
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation [PDF] [DOI] [BibTeX]
Bo Zhu, Yin Tan, and Guang Gong. 12th International Conference on Cryptology and Network Security (CANS 2013). LNCS 8257. pp 20-38
Bitwise Higher Order Differential Cryptanalysis [DOI] [BibTeX]
Bo Zhu, Kefei Chen, and Xuejia Lai. 1st International Conference on Trusted Systems (INTRUST 2009). LNCS 6163. pp 250-262
Improved Cryptanalysis of the FOX Block Cipher [DOI] [BibTeX]
Zhongming Wu, Yiyuan Luo, Xuejia Lai, and Bo Zhu. 1st International Conference on Trusted Systems (INTRUST 2009). LNCS 6163. pp 236-249
Towards Secure and Practical MACs for Body Sensor Networks [DOI] [BibTeX]
Zheng Gong, Pieter Hartel, Svetla Nikova, and Bo Zhu. 10th International Conference on Cryptology in India (INDOCRYPT 2009). LNCS 5922. pp 182-198
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks [DOI] [BibTeX]
Bo Zhu, Yanfei Zheng, Yaowei Zhou, and Kefei Chen. 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (IEEE MASS 2009). pp 237-245

Professional Service

Technical Program Committee
Technical Paper Reviewer
Conference Organization
Community Service

Miscellaneous

Last Update: ...