Bo Zhu

Click here to show my email address.
PhD candidate at University of Waterloo.
Interested in analysis and design of ciphers.


University of WaterlooSep. 2010 - Present
PhD candidate, under supervision of Prof. Guang Gong
Communications Security Lab at Dept. Electrical and Computer Engineering
At-Large Council of Graduate Student Association, 2011
Technical support for Chinese Students and Scholars Association, 2010 - 2012
Teaching Assistants:
  • SE 350, Operating Systems, Winter 2013
  • ECE 254, Operating Systems, Fall 2012
  • ECE 354, Real-Time Operating Systems, Spring 2011
  • ECE 124, Digital Circuits & Systems, Winter 2011
Shanghai Jiao Tong UniversitySep. 2007 - May 2010
MSci, under supervision of Prof. Kefei Chen and Prof. Xuejia Lai
Cryptography and Information Security Lab at Dept. Computer Science
Organizing committee of ProvSec (Provable Security) 2008
Tsinghua UniversityAug. 2003 - July 2007
BEng, Dept. Electrical Engineering

Selected Publications

Distinguishing Properties and Applications of Higher Order 4 Derivatives of Boolean Functions
Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, and Xuejia Lai. Information Sciences, Elsevier, Feb 2014. [DOI]
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks
Zheng Gong, Pieter Hartel, Svetla Nikova, Shao-Hua Tang, and Bo Zhu. Journal of Computer Science and Technology, vol. 29 (1), pp 53-68, Jan 2014. [DOI]
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Bo Zhu, Yin Tan, and Guang Gong. CANS 2013. LNCS 8257. pp 20-38. [PDF]
Revisiting Counter Mode to Repair Galois/Counter Mode, and Simeck: An Authenticated Cipher Design
Bo Zhu, Yin Tan, and Guang Gong. Talk at DIAC 2013. [Slides]
Loxin -- A Solution to Password-less Universal Login
Bo Zhu, Xinxin Fan, and Guang Gong. To appear at BigSecurity 2014. [PDF]
Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64
Bo Zhu and Guang Gong. Cryptology ePrint Archive, Report 2011/619. Updated in 2013. [PDF]
Another View on Cube Attack, Cube Tester, AIDA and Higher Order Differential Cryptanalysis
Bo Zhu, Guang Gong, Xuejia Lai, and Kefei Chen. CACR Technical Report 2012-01. [PDF]
A Practical Platform for Cube-Attack-like Cryptanalyses
Bo Zhu, Wenye Yu, and Tao Wang. Cryptology ePrint Archive, Report 2010/644. [PDF]
Bitwise Higher Order Differential Cryptanalysis
Bo Zhu, Kefei Chen, and Xuejia Lai. INTRUST 2009. LNCS 6163. pp 250-262. [DOI]
Improved Cryptanalysis of the FOX Block Cipher
Zhongming Wu, Yiyuan Luo, Xuejia Lai, and Bo Zhu. INTRUST 2009. LNCS 6163. pp 236-249. [DOI]
Towards Secure and Practical MACs for Body Sensor Networks
Zheng Gong, Pieter Hartel, Svetla Nikova, and Bo Zhu. INDOCRYPT 2009. LNCS 5922. pp 182-198. [DOI]
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks
Bo Zhu, Yanfei Zheng, Yaowei Zhou, and Kefei Chen. IEEE MASS 2009. pp 237-245. [DOI]


Last Update: ...