Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jian Guo 0001
@article{DBLP:journals/tosc/DongGLPZ24, author = {Xiaoyang Dong and Jian Guo and Shun Li and Phuong Pham and Tianyu Zhang}, title = {Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {158--187}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.158-187}, doi = {10.46586/TOSC.V2024.I1.158-187}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DongGLPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGLSZ24, author = {Shiyao Chen and Jian Guo and Eik List and Danping Shi and Tianyu Zhang}, title = {Diving Deep into the Preimage Security of AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2024}, url = {https://eprint.iacr.org/2024/300}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenGLSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongGLPZ24, author = {Xiaoyang Dong and Jian Guo and Shun Li and Phuong Pham and Tianyu Zhang}, title = {Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2024}, url = {https://eprint.iacr.org/2024/352}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DongGLPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenGGLWWX23, author = {Shiyao Chen and Chun Guo and Jian Guo and Li Liu and Meiqin Wang and Puwen Wei and Zeyu Xu}, title = {Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {132--175}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.132-175}, doi = {10.46586/TOSC.V2023.I2.132-175}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChenGGLWWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiHCGQ23, author = {Huina Li and Le He and Shiyao Chen and Jian Guo and Weidong Qiu}, title = {Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {74--100}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.74-100}, doi = {10.46586/TOSC.V2023.I3.74-100}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiHCGQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-1, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4}, doi = {10.1007/978-981-99-8721-4}, isbn = {978-981-99-8720-7}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-2, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14439}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8724-5}, doi = {10.1007/978-981-99-8724-5}, isbn = {978-981-99-8723-8}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-3, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14440}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8727-6}, doi = {10.1007/978-981-99-8727-6}, isbn = {978-981-99-8726-9}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-4, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14441}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8730-6}, doi = {10.1007/978-981-99-8730-6}, isbn = {978-981-99-8729-0}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-5, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7}, doi = {10.1007/978-981-99-8733-7}, isbn = {978-981-99-8732-0}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-6, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14443}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8736-8}, doi = {10.1007/978-981-99-8736-8}, isbn = {978-981-99-8735-1}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-6.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-7, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VII}}, series = {Lecture Notes in Computer Science}, volume = {14444}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8739-9}, doi = {10.1007/978-981-99-8739-9}, isbn = {978-981-99-8738-2}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-8, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14445}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8742-9}, doi = {10.1007/978-981-99-8742-9}, isbn = {978-981-99-8741-2}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-8.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGGLWWX23, author = {Shiyao Chen and Chun Guo and Jian Guo and Li Liu and Meiqin Wang and Puwen Wei and Zeyu Xu}, title = {Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2023}, url = {https://eprint.iacr.org/2023/748}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGGLWWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiHCGQ23, author = {Huina Li and Le He and Shiyao Chen and Jian Guo and Weidong Qiu}, title = {Automatic Preimage Attack Framework on {\textbackslash}ascon Using a Linearize-and-Guess Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1266}, year = {2023}, url = {https://eprint.iacr.org/2023/1266}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiHCGQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoSW22, author = {Jian Guo and Ling Song and Haoyang Wang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Key Structures: Improved Related-Key Boomerang Attack Against the Full {AES-256}}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {3--23}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_1}, doi = {10.1007/978-3-031-22301-3\_1}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GuoSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaoGLMT22, author = {Zhenzhen Bao and Jian Guo and Meicheng Liu and Li Ma and Yi Tu}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Enhancing Differential-Neural Cryptanalysis}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, pages = {318--347}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3\_11}, doi = {10.1007/978-3-031-22963-3\_11}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaoGLMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoLST22, author = {Jian Guo and Guozhen Liu and Ling Song and Yi Tu}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Exploring {SAT} for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round {SHA-3}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {645--674}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_22}, doi = {10.1007/978-3-031-22969-5\_22}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoLST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaoGST22, author = {Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {64--93}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_3}, doi = {10.1007/978-3-031-15802-5\_3}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BaoGST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DongGLP22, author = {Xiaoyang Dong and Jian Guo and Shun Li and Phuong Pham}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Triangulating Rebound Attack on AES-like Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {94--124}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_4}, doi = {10.1007/978-3-031-15802-5\_4}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DongGLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenGGLWWX22, author = {Shiyao Chen and Chun Guo and Jian Guo and Li Liu and Meiqin Wang and Puwen Wei and Zeyu Xu}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {41--60}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_3}, doi = {10.1007/978-3-031-29371-9\_3}, timestamp = {Thu, 06 Apr 2023 10:01:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChenGGLWWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BaoGLP22, author = {Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Evaluating the Security of Merkle-Damg{\aa}rd Hash Functions and Combiners in Quantum Settings}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {687--711}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_39}, doi = {10.1007/978-3-031-23020-2\_39}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/BaoGLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLST22, author = {Jian Guo and Guozhen Liu and Ling Song and Yi Tu}, title = {Exploring {SAT} for Cryptanalysis: (Quantum) Collision Attacks against 6-Round {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2022}, url = {https://eprint.iacr.org/2022/184}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoLST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongGLP22, author = {Xiaoyang Dong and Jian Guo and Shun Li and Phuong Pham}, title = {Triangulating Rebound Attack on AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2022}, url = {https://eprint.iacr.org/2022/731}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongGLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00010022, author = {Jian Guo and Ling Song and Haoyang Wang}, title = {Key Structures: Improved Related-Key Boomerang Attack against the Full {AES-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2022}, url = {https://eprint.iacr.org/2022/845}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00010022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001LLP22, author = {Jian Guo and Shun Li and Guozhen Liu and Phuong Pham}, title = {Rebound Attacks on {SKINNY} Hashing with Automatic Tools}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2022}, url = {https://eprint.iacr.org/2022/1057}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bao0LP22, author = {Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham}, title = {Evaluating the Security of Merkle-Damg{\aa}rd Hash Functions and Combiners in Quantum Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1058}, year = {2022}, url = {https://eprint.iacr.org/2022/1058}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bao0LP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaGL22, author = {Avijit Dutta and Jian Guo and Eik List}, title = {Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1609}, year = {2022}, url = {https://eprint.iacr.org/2022/1609}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DuttaGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZHGQ22, author = {Huina Li and Guozhen Liu and Haochen Zhang and Kai Hu and Jian Guo and Weidong Qiu}, title = {AlgSAT - a {SAT} Method for Search and Verification of Differential Characteristics from Algebraic Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1641}, year = {2022}, url = {https://eprint.iacr.org/2022/1641}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLZHGQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SunLGQ21, author = {Bing Sun and Kangquan Li and Jian Guo and Longjiang Qu}, title = {New Constructions of Complete Permutations}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {11}, pages = {7561--7567}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3100756}, doi = {10.1109/TIT.2021.3100756}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/SunLGQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoD00SS021, author = {Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {771--804}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_27}, doi = {10.1007/978-3-030-77870-5\_27}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoD00SS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoGST21, author = {Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu}, title = {{MITM} Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2021}, url = {https://eprint.iacr.org/2021/575}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoGST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoGLP21, author = {Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham}, title = {Quantum Multi-Collision Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2021}, url = {https://eprint.iacr.org/2021/703}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoGLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoGLMT21, author = {Zhenzhen Bao and Jian Guo and Meicheng Liu and Li Ma and Yi Tu}, title = {Conditional Differential-Neural Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2021}, url = {https://eprint.iacr.org/2021/719}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoGLMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GuoLLLQS20, author = {Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song}, title = {Practical Collision Attacks against Round-Reduced {SHA-3}}, journal = {J. Cryptol.}, volume = {33}, number = {1}, pages = {228--270}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09313-3}, doi = {10.1007/S00145-019-09313-3}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/GuoLLLQS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaoDGLW20, author = {Zhenzhen Bao and Itai Dinur and Jian Guo and Ga{\"{e}}tan Leurent and Lei Wang}, title = {Generic Attacks on Hash Combiners}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {742--823}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09328-w}, doi = {10.1007/S00145-019-09328-W}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaoDGLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGL20, author = {Zhenzhen Bao and Jian Guo and Eik List}, title = {Extended Truncated-differential Distinguishers on Round-reduced {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {197--261}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.197-261}, doi = {10.13154/TOSC.V2020.I3.197-261}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Guo0LS20, author = {Chun Guo and Jian Guo and Eik List and Ling Song}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Towards Closing the Security Gap of Tweak-aNd-Tweak {(TNT)}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {567--597}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_19}, doi = {10.1007/978-3-030-64837-4\_19}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Guo0LS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoG0S20, author = {Zhenzhen Bao and Chun Guo and Jian Guo and Ling Song}, editor = {Anne Canteaut and Yuval Ishai}, title = {{TNT:} How to Tweak a Block Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {641--673}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_22}, doi = {10.1007/978-3-030-45724-2\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoG0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoDGLSSW20, author = {Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang}, title = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2020}, url = {https://eprint.iacr.org/2020/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoDGLSSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AnkeleDGLLT19, author = {Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo}, title = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {192--235}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.192-235}, doi = {10.13154/TOSC.V2019.I1.192-235}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AnkeleDGLLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGLS19, author = {Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki}, title = {{PEIGEN} - a Platform for Evaluation, Implementation, and Generation of S-boxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {330--394}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.330-394}, doi = {10.13154/TOSC.V2019.I1.330-394}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGIM19, author = {Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {1--54}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.1-54}, doi = {10.13154/TOSC.V2019.I2.1-54}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGIM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangCGP19, author = {Wenying Zhang and Meichun Cao and Jian Guo and Enes Pasalic}, title = {Improved Security Evaluation of {SPN} Block Ciphers and its Applications in the Single-key Attack on {SKINNY}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {171--191}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.171-191}, doi = {10.13154/TOSC.V2019.I4.171-191}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhangCGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoDGWZ19, author = {Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang}, title = {Improved Meet-in-the-Middle Preimage Attacks against {AES} Hashing Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {318--347}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.318-347}, doi = {10.13154/TOSC.V2019.I4.318-347}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoDGWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLLLQS19, author = {Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song}, title = {Practical Collision Attacks against Round-Reduced {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2019}, url = {https://eprint.iacr.org/2019/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLLLQS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleDGLLT19, author = {Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo}, title = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2019}, url = {https://eprint.iacr.org/2019/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleDGLLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoGLS19, author = {Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki}, title = {SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2019}, url = {https://eprint.iacr.org/2019/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bao0IM19, author = {Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2019}, url = {https://eprint.iacr.org/2019/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bao0IM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoD0WZ19, author = {Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang}, title = {Improved Meet-in-the-Middle Preimage Attacks against {AES} Hashing Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2019}, url = {https://eprint.iacr.org/2019/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoD0WZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bao0L19, author = {Zhenzhen Bao and Jian Guo and Eik List}, title = {Extended Expectation Cryptanalysis on Round-reduced {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2019}, url = {https://eprint.iacr.org/2019/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bao0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoDGLW19, author = {Zhenzhen Bao and Itai Dinur and Jian Guo and Ga{\"{e}}tan Leurent and Lei Wang}, title = {Generic Attacks on Hash Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2019}, url = {https://eprint.iacr.org/2019/755}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoDGLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGGJRS18, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and Jian Guo and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard and Ling Song}, title = {Key-Recovery Attacks on Full Kravatte}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {5--28}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.5-28}, doi = {10.13154/TOSC.V2018.I1.5-28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGW18, author = {Zhenzhen Bao and Jian Guo and Lei Wang}, title = {Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {201--253}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.201-253}, doi = {10.13154/TOSC.V2018.I1.201-253}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001018, author = {Ling Song and Jian Guo}, title = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {182--214}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.182-214}, doi = {10.13154/TOSC.V2018.I3.182-214}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/00010SL18, author = {Ling Song and Jian Guo and Danping Shi and San Ling}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {New {MILP} Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {65--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_3}, doi = {10.1007/978-3-030-03329-3\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/00010SL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoGW18, author = {Zhenzhen Bao and Jian Guo and Lei Wang}, title = {Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2018}, url = {https://eprint.iacr.org/2018/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongG18, author = {Ling Song and Jian Guo}, title = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {810}, year = {2018}, url = {https://eprint.iacr.org/2018/810}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikICG17, author = {Subhadeep Banik and Takanori Isobe and Tingting Cui and Jian Guo}, title = {Some cryptanalytic results on Lizard}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {82--98}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.82-98}, doi = {10.13154/TOSC.V2017.I4.82-98}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikICG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bao00G17, author = {Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {404--427}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_14}, doi = {10.1007/978-3-319-63715-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bao00G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SongLG17, author = {Ling Song and Guohong Liao and Jian Guo}, editor = {Jonathan Katz and Hovav Shacham}, title = {Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {428--451}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_15}, doi = {10.1007/978-3-319-63715-0\_15}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/SongLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QiaoSL017, author = {Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {New Collision Attacks on Round-Reduced Keccak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {216--243}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_8}, doi = {10.1007/978-3-319-56617-7\_8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/QiaoSL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QiaoSLG17, author = {Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo}, title = {New Collision Attacks on Round-Reduced Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2017}, url = {http://eprint.iacr.org/2017/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QiaoSLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongL017, author = {Ling Song and Guohong Liao and Jian Guo}, title = {Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2017}, url = {http://eprint.iacr.org/2017/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoW0G17, author = {Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu}, title = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2017}, url = {http://eprint.iacr.org/2017/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoW0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Song0S17, author = {Ling Song and Jian Guo and Danping Shi}, title = {New {MILP} Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2017}, url = {http://eprint.iacr.org/2017/1030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Song0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Extended meet-in-the-middle attacks on some Feistel constructions}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {587--618}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0120-4}, doi = {10.1007/S10623-015-0120-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNQSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {33--56}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.33-56}, doi = {10.13154/TOSC.V2016.I1.33-56}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {307--337}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.307-337}, doi = {10.13154/TOSC.V2016.I2.307-337}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001LS16, author = {Jian Guo and Meicheng Liu and Ling Song}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {249--274}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_9}, doi = {10.1007/978-3-662-53887-6\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001LS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Wang0ZZG16, author = {Lei Wang and Jian Guo and Guoyan Zhang and Jingyuan Zhao and Dawu Gu}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {455--483}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_17}, doi = {10.1007/978-3-662-53887-6\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Wang0ZZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SunL0QR16, author = {Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {New Insights on AES-Like {SPN} Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {605--624}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_22}, doi = {10.1007/978-3-662-53018-4\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SunL0QR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SunLGRL16, author = {Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {196--213}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_8}, doi = {10.1007/978-3-662-49890-3\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SunLGRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGRL16, author = {Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li}, title = {Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2016}, url = {http://eprint.iacr.org/2016/096}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunL0QR16, author = {Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen}, title = {New Insights on AES-like {SPN} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2016}, url = {http://eprint.iacr.org/2016/533}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunL0QR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00310ZZG16, author = {Lei Wang and Jian Guo and Guoyan Zhang and Jingyuan Zhao and Dawu Gu}, title = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2016}, url = {http://eprint.iacr.org/2016/876}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00310ZZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001LS16, author = {Jian Guo and Meicheng Liu and Ling Song}, title = {Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2016}, url = {http://eprint.iacr.org/2016/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JNSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2016}, url = {http://eprint.iacr.org/2016/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2016}, url = {http://eprint.iacr.org/2016/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GuoSY15, author = {Jian Guo and Chunhua Su and Wun{-}She Yap}, title = {An improved preimage attack against {HAVAL-3}}, journal = {Inf. Process. Lett.}, volume = {115}, number = {2}, pages = {386--393}, year = {2015}, url = {https://doi.org/10.1016/j.ipl.2014.10.016}, doi = {10.1016/J.IPL.2014.10.016}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/GuoSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001SWWW15, author = {Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen}, title = {Equivalent Key Recovery Attacks against {HMAC} and {NMAC} with Whirlpool Reduced to 7 Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2015}, url = {http://eprint.iacr.org/2015/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001SWWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001SWW15, author = {Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu}, title = {Cryptanalysis of HMAC/NMAC-Whirlpool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2015}, url = {http://eprint.iacr.org/2015/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001SWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JMN15, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Nicky Mouha and Ivica Nikolic}, title = {More Rounds, Less Security?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2015}, url = {http://eprint.iacr.org/2015/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JNQSS15, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Full Midori64}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2015}, url = {http://eprint.iacr.org/2015/1189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JNQSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001JNS14, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Meet-in-the-Middle Attacks on Generic Feistel Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {458--477}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_24}, doi = {10.1007/978-3-662-45611-8\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001JNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001PSW14, author = {Jian Guo and Thomas Peyrin and Yu Sasaki and Lei Wang}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Updates on Generic Attacks against {HMAC} and {NMAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {131--148}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_8}, doi = {10.1007/978-3-662-44371-2\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/0001PSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/0001KNWW14, author = {Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu}, editor = {Josh Benaloh}, title = {Analysis of {BLAKE2}}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {402--423}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_21}, doi = {10.1007/978-3-319-04852-9\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/0001KNWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataM0M14, author = {Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka}, editor = {Carlos Cid and Christian Rechberger}, title = {{CLOC:} Authenticated Encryption for Short Input}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {149--167}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_8}, doi = {10.1007/978-3-662-46706-0\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataM0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/0001SWWW14, author = {Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen}, editor = {Carlos Cid and Christian Rechberger}, title = {Equivalent Key Recovery Attacks Against {HMAC} and {NMAC} with Whirlpool Reduced to 7 Rounds}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {571--590}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_29}, doi = {10.1007/978-3-662-46706-0\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/0001SWWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/0001JLPW14, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, editor = {Antoine Joux and Amr M. Youssef}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {195--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_12}, doi = {10.1007/978-3-319-13051-4\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/0001JLPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataMGM14, author = {Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka}, title = {{CLOC:} Authenticated Encryption for Short Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2014}, url = {http://eprint.iacr.org/2014/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataMGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JP014, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Lei Wang}, title = {Breaking {POET} Authentication with a Single Query}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2014}, url = {http://eprint.iacr.org/2014/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JP014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JLPW14a, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2014}, url = {http://eprint.iacr.org/2014/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JLPW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001SWW13, author = {Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu}, editor = {Kazue Sako and Palash Sarkar}, title = {Cryptanalysis of HMAC/NMAC-Whirlpool}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {21--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_2}, doi = {10.1007/978-3-642-42045-0\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001SWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Benadjila0LP13, author = {Ryad Benadjila and Jian Guo and Victor Lomn{\'{e}} and Thomas Peyrin}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Implementing Lightweight Block Ciphers on x86 Architectures}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {324--351}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_17}, doi = {10.1007/978-3-662-43414-7\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/Benadjila0LP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Benadjila0LP13, author = {Ryad Benadjila and Jian Guo and Victor Lomn{\'{e}} and Thomas Peyrin}, title = {Implementing Lightweight Block Ciphers on x86 Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2013}, url = {http://eprint.iacr.org/2013/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Benadjila0LP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001KNWW13, author = {Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu}, title = {Analysis of {BLAKE2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2013}, url = {http://eprint.iacr.org/2013/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001KNWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001NPW13, author = {Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang}, title = {Cryptanalysis of Zorro}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2013}, url = {http://eprint.iacr.org/2013/713}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001NPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ChoyYKGPPT12, author = {Jiali Choy and Huihui Yap and Khoongming Khoo and Jian Guo and Thomas Peyrin and Axel Poschmann and Chik How Tan}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {270--286}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_17}, doi = {10.1007/978-3-642-31410-0\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/ChoyYKGPPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuFWGDZ12, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, editor = {Anne Canteaut}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {127--145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_8}, doi = {10.1007/978-3-642-34047-5\_8}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuFWGDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Duc0P012, author = {Alexandre Duc and Jian Guo and Thomas Peyrin and Lei Wei}, editor = {Anne Canteaut}, title = {Unaligned Rebound Attack: Application to Keccak}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {402--421}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_23}, doi = {10.1007/978-3-642-34047-5\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Duc0P012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuFWGDZ12, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2012}, url = {http://eprint.iacr.org/2012/206}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuFWGDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoyYKGPPT12, author = {Jiali Choy and Huihui Yap and Khoongming Khoo and Jian Guo and Thomas Peyrin and Axel Poschmann and Chik How Tan}, title = {SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2012}, url = {http://eprint.iacr.org/2012/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoyYKGPPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001PPR12, author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw}, title = {The {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2012}, url = {http://eprint.iacr.org/2012/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001PPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiRGWWL11, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN} (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {433--438}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_31}, doi = {10.1007/978-3-642-22497-3\_31}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiRGWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuoPPR11, author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {The {LED} Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {326--341}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_22}, doi = {10.1007/978-3-642-23951-9\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GuoPPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoPP11, author = {Jian Guo and Thomas Peyrin and Axel Poschmann}, editor = {Phillip Rogaway}, title = {The {PHOTON} Family of Lightweight Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {222--239}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_13}, doi = {10.1007/978-3-642-22792-9\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuoPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiRGWWL11, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, title = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2011}, url = {http://eprint.iacr.org/2011/201}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WeiRGWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucGPW11, author = {Alexandre Duc and Jian Guo and Thomas Peyrin and Lei Wei}, title = {Unaligned Rebound Attack - Application to Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2011}, url = {http://eprint.iacr.org/2011/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucGPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPP11, author = {Jian Guo and Thomas Peyrin and Axel Poschmann}, title = {The {PHOTON} Family of Lightweight Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2011}, url = {http://eprint.iacr.org/2011/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoLRW10, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, editor = {Masayuki Abe}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on {MD4} and {SHA-2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {56--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_4}, doi = {10.1007/978-3-642-17373-8\_4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoLRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonGKMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Differential and Invertibility Properties of {BLAKE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {318--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_18}, doi = {10.1007/978-3-642-13858-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuoT10, author = {Jian Guo and S{\o}ren S. Thomsen}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Deterministic Differential Properties of the Compression Function of {BMW}}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {338--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_23}, doi = {10.1007/978-3-642-19574-7\_23}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/GuoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001LRW10, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on {MD4} and {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2010}, url = {http://eprint.iacr.org/2010/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aumasson0KMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, title = {Differential and invertibility properties of {BLAKE} (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2010}, url = {http://eprint.iacr.org/2010/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aumasson0KMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09, author = {Kazumaro Aoki and Jian Guo and Krystian Matusiewicz and Yu Sasaki and Lei Wang}, editor = {Mitsuru Matsui}, title = {Preimages for Step-Reduced {SHA-2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {578--597}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_34}, doi = {10.1007/978-3-642-10366-7\_34}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AokiGMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09, author = {Alex Biryukov and Praveen Gauravaram and Jian Guo and Dmitry Khovratovich and San Ling and Krystian Matusiewicz and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, editor = {Orr Dunkelman}, title = {Cryptanalysis of the {LAKE} Hash Family}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_10}, doi = {10.1007/978-3-642-03317-9\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {141--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_9}, doi = {10.1007/978-3-642-05445-7\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, title = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2009}, url = {http://eprint.iacr.org/2009/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoM09, author = {Jian Guo and Krystian Matusiewicz}, title = {Preimages for Step-Reduced {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2009}, url = {http://eprint.iacr.org/2009/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWWG08, author = {Hung{-}Min Sun and Mu{-}En Wu and Huaxiong Wang and Jian Guo}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Improvement of the {BDF} Attack on {LSBS-RSA}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {84--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_7}, doi = {10.1007/978-3-540-70500-0\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SunWSGW08, author = {Hung{-}Min Sun and Mu{-}En Wu and Ron Steinfeld and Jian Guo and Huaxiong Wang}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant Bits}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {49--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_4}, doi = {10.1007/978-3-540-89641-8\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SunWSGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08, author = {Ron Steinfeld and Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Jian Guo and San Ling and Huaxiong Wang}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of {LASH}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {207--223}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_13}, doi = {10.1007/978-3-540-71039-4\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunWSGW08, author = {Hung{-}Min Sun and Mu{-}En Wu and Ron Steinfeld and Jian Guo and Huaxiong Wang}, title = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2008}, url = {http://eprint.iacr.org/2008/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunWSGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ContiniMPSGLW07, author = {Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang}, title = {Cryptanalysis of {LASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2007}, url = {http://eprint.iacr.org/2007/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.