BibTeX records: Jian Guo 0001

download as .bib file

@article{DBLP:journals/tosc/DongGLPZ24,
  author       = {Xiaoyang Dong and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham and
                  Tianyu Zhang},
  title        = {Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {158--187},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.158-187},
  doi          = {10.46586/TOSC.V2024.I1.158-187},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DongGLPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGLSZ24,
  author       = {Shiyao Chen and
                  Jian Guo and
                  Eik List and
                  Danping Shi and
                  Tianyu Zhang},
  title        = {Diving Deep into the Preimage Security of AES-like Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/300},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGLSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongGLPZ24,
  author       = {Xiaoyang Dong and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham and
                  Tianyu Zhang},
  title        = {Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/352},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DongGLPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenGGLWWX23,
  author       = {Shiyao Chen and
                  Chun Guo and
                  Jian Guo and
                  Li Liu and
                  Meiqin Wang and
                  Puwen Wei and
                  Zeyu Xu},
  title        = {Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly
                  Symmetric-Key Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {132--175},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.132-175},
  doi          = {10.46586/TOSC.V2023.I2.132-175},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenGGLWWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiHCGQ23,
  author       = {Huina Li and
                  Le He and
                  Shiyao Chen and
                  Jian Guo and
                  Weidong Qiu},
  title        = {Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess
                  Approach},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {74--100},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.74-100},
  doi          = {10.46586/TOSC.V2023.I3.74-100},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiHCGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-1,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4},
  doi          = {10.1007/978-981-99-8721-4},
  isbn         = {978-981-99-8720-7},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-2,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5},
  doi          = {10.1007/978-981-99-8724-5},
  isbn         = {978-981-99-8723-8},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-3,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14440},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8727-6},
  doi          = {10.1007/978-981-99-8727-6},
  isbn         = {978-981-99-8726-9},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-4,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14441},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8730-6},
  doi          = {10.1007/978-981-99-8730-6},
  isbn         = {978-981-99-8729-0},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-5,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7},
  doi          = {10.1007/978-981-99-8733-7},
  isbn         = {978-981-99-8732-0},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-5.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-6,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14443},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8736-8},
  doi          = {10.1007/978-981-99-8736-8},
  isbn         = {978-981-99-8735-1},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-6.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-7,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14444},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8739-9},
  doi          = {10.1007/978-981-99-8739-9},
  isbn         = {978-981-99-8738-2},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-7.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-8,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14445},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8742-9},
  doi          = {10.1007/978-981-99-8742-9},
  isbn         = {978-981-99-8741-2},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-8.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGGLWWX23,
  author       = {Shiyao Chen and
                  Chun Guo and
                  Jian Guo and
                  Li Liu and
                  Meiqin Wang and
                  Puwen Wei and
                  Zeyu Xu},
  title        = {Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly
                  Symmetric-Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/748},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGGLWWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiHCGQ23,
  author       = {Huina Li and
                  Le He and
                  Shiyao Chen and
                  Jian Guo and
                  Weidong Qiu},
  title        = {Automatic Preimage Attack Framework on {\textbackslash}ascon Using
                  a Linearize-and-Guess Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1266},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1266},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiHCGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoSW22,
  author       = {Jian Guo and
                  Ling Song and
                  Haoyang Wang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Key Structures: Improved Related-Key Boomerang Attack Against the
                  Full {AES-256}},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_1},
  doi          = {10.1007/978-3-031-22301-3\_1},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaoGLMT22,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Meicheng Liu and
                  Li Ma and
                  Yi Tu},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Enhancing Differential-Neural Cryptanalysis},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  pages        = {318--347},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3\_11},
  doi          = {10.1007/978-3-031-22963-3\_11},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaoGLMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoLST22,
  author       = {Jian Guo and
                  Guozhen Liu and
                  Ling Song and
                  Yi Tu},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Exploring {SAT} for Cryptanalysis: (Quantum) Collision Attacks Against
                  6-Round {SHA-3}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {645--674},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_22},
  doi          = {10.1007/978-3-031-22969-5\_22},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoLST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaoGST22,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Danping Shi and
                  Yi Tu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security
                  of AES-like Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_3},
  doi          = {10.1007/978-3-031-15802-5\_3},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BaoGST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DongGLP22,
  author       = {Xiaoyang Dong and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Triangulating Rebound Attack on AES-like Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_4},
  doi          = {10.1007/978-3-031-15802-5\_4},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DongGLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenGGLWWX22,
  author       = {Shiyao Chen and
                  Chun Guo and
                  Jian Guo and
                  Li Liu and
                  Meiqin Wang and
                  Puwen Wei and
                  Zeyu Xu},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum
                  Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_3},
  doi          = {10.1007/978-3-031-29371-9\_3},
  timestamp    = {Thu, 06 Apr 2023 10:01:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenGGLWWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BaoGLP22,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Evaluating the Security of Merkle-Damg{\aa}rd Hash Functions and Combiners
                  in Quantum Settings},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {687--711},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_39},
  doi          = {10.1007/978-3-031-23020-2\_39},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/BaoGLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLST22,
  author       = {Jian Guo and
                  Guozhen Liu and
                  Ling Song and
                  Yi Tu},
  title        = {Exploring {SAT} for Cryptanalysis: (Quantum) Collision Attacks against
                  6-Round {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/184},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongGLP22,
  author       = {Xiaoyang Dong and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham},
  title        = {Triangulating Rebound Attack on AES-like Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/731},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongGLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00010022,
  author       = {Jian Guo and
                  Ling Song and
                  Haoyang Wang},
  title        = {Key Structures: Improved Related-Key Boomerang Attack against the
                  Full {AES-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/845},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00010022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001LLP22,
  author       = {Jian Guo and
                  Shun Li and
                  Guozhen Liu and
                  Phuong Pham},
  title        = {Rebound Attacks on {SKINNY} Hashing with Automatic Tools},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1057},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bao0LP22,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham},
  title        = {Evaluating the Security of Merkle-Damg{\aa}rd Hash Functions and Combiners
                  in Quantum Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1058},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bao0LP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaGL22,
  author       = {Avijit Dutta and
                  Jian Guo and
                  Eik List},
  title        = {Forking Sums of Permutations for Optimally Secure and Highly Efficient
                  PRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1609},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1609},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZHGQ22,
  author       = {Huina Li and
                  Guozhen Liu and
                  Haochen Zhang and
                  Kai Hu and
                  Jian Guo and
                  Weidong Qiu},
  title        = {AlgSAT - a {SAT} Method for Search and Verification of Differential
                  Characteristics from Algebraic Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1641},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1641},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZHGQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SunLGQ21,
  author       = {Bing Sun and
                  Kangquan Li and
                  Jian Guo and
                  Longjiang Qu},
  title        = {New Constructions of Complete Permutations},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {11},
  pages        = {7561--7567},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3100756},
  doi          = {10.1109/TIT.2021.3100756},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SunLGQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaoD00SS021,
  author       = {Zhenzhen Bao and
                  Xiaoyang Dong and
                  Jian Guo and
                  Zheng Li and
                  Danping Shi and
                  Siwei Sun and
                  Xiaoyun Wang},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like
                  Hashing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {771--804},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_27},
  doi          = {10.1007/978-3-030-77870-5\_27},
  timestamp    = {Wed, 16 Jun 2021 11:49:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaoD00SS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoGST21,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Danping Shi and
                  Yi Tu},
  title        = {{MITM} Meets Guess-and-Determine: Further Improved Preimage Attacks
                  against AES-like Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/575},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoGST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoGLP21,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham},
  title        = {Quantum Multi-Collision Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/703},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoGLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoGLMT21,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Meicheng Liu and
                  Li Ma and
                  Yi Tu},
  title        = {Conditional Differential-Neural Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/719},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoGLMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GuoLLLQS20,
  author       = {Jian Guo and
                  Guohong Liao and
                  Guozhen Liu and
                  Meicheng Liu and
                  Kexin Qiao and
                  Ling Song},
  title        = {Practical Collision Attacks against Round-Reduced {SHA-3}},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {1},
  pages        = {228--270},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09313-3},
  doi          = {10.1007/S00145-019-09313-3},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/GuoLLLQS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaoDGLW20,
  author       = {Zhenzhen Bao and
                  Itai Dinur and
                  Jian Guo and
                  Ga{\"{e}}tan Leurent and
                  Lei Wang},
  title        = {Generic Attacks on Hash Combiners},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {742--823},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09328-w},
  doi          = {10.1007/S00145-019-09328-W},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaoDGLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGL20,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Eik List},
  title        = {Extended Truncated-differential Distinguishers on Round-reduced {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {197--261},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.197-261},
  doi          = {10.13154/TOSC.V2020.I3.197-261},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Guo0LS20,
  author       = {Chun Guo and
                  Jian Guo and
                  Eik List and
                  Ling Song},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Towards Closing the Security Gap of Tweak-aNd-Tweak {(TNT)}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {567--597},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_19},
  doi          = {10.1007/978-3-030-64837-4\_19},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Guo0LS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaoG0S20,
  author       = {Zhenzhen Bao and
                  Chun Guo and
                  Jian Guo and
                  Ling Song},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {{TNT:} How to Tweak a Block Cipher},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {641--673},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_22},
  doi          = {10.1007/978-3-030-45724-2\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaoG0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoDGLSSW20,
  author       = {Zhenzhen Bao and
                  Xiaoyang Dong and
                  Jian Guo and
                  Zheng Li and
                  Danping Shi and
                  Siwei Sun and
                  Xiaoyun Wang},
  title        = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoDGLSSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AnkeleDGLLT19,
  author       = {Ralph Ankele and
                  Christoph Dobraunig and
                  Jian Guo and
                  Eran Lambooij and
                  Gregor Leander and
                  Yosuke Todo},
  title        = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey
                  Expansion},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {192--235},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.192-235},
  doi          = {10.13154/TOSC.V2019.I1.192-235},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AnkeleDGLLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGLS19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  San Ling and
                  Yu Sasaki},
  title        = {{PEIGEN} - a Platform for Evaluation, Implementation, and Generation
                  of S-boxes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {330--394},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.330-394},
  doi          = {10.13154/TOSC.V2019.I1.330-394},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGIM19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption
                  with Full Absorption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {1--54},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.1-54},
  doi          = {10.13154/TOSC.V2019.I2.1-54},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGIM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangCGP19,
  author       = {Wenying Zhang and
                  Meichun Cao and
                  Jian Guo and
                  Enes Pasalic},
  title        = {Improved Security Evaluation of {SPN} Block Ciphers and its Applications
                  in the Single-key Attack on {SKINNY}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {171--191},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.171-191},
  doi          = {10.13154/TOSC.V2019.I4.171-191},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangCGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoDGWZ19,
  author       = {Zhenzhen Bao and
                  Lin Ding and
                  Jian Guo and
                  Haoyang Wang and
                  Wenying Zhang},
  title        = {Improved Meet-in-the-Middle Preimage Attacks against {AES} Hashing
                  Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {318--347},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.318-347},
  doi          = {10.13154/TOSC.V2019.I4.318-347},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoDGWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLLLQS19,
  author       = {Jian Guo and
                  Guohong Liao and
                  Guozhen Liu and
                  Meicheng Liu and
                  Kexin Qiao and
                  Ling Song},
  title        = {Practical Collision Attacks against Round-Reduced {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLLLQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleDGLLT19,
  author       = {Ralph Ankele and
                  Christoph Dobraunig and
                  Jian Guo and
                  Eran Lambooij and
                  Gregor Leander and
                  Yosuke Todo},
  title        = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey
                  Expansion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleDGLLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoGLS19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  San Ling and
                  Yu Sasaki},
  title        = {SoK: Peigen - a Platform for Evaluation, Implementation, and Generation
                  of S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bao0IM19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption
                  with Full Absorption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bao0IM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoD0WZ19,
  author       = {Zhenzhen Bao and
                  Lin Ding and
                  Jian Guo and
                  Haoyang Wang and
                  Wenying Zhang},
  title        = {Improved Meet-in-the-Middle Preimage Attacks against {AES} Hashing
                  Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoD0WZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bao0L19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Eik List},
  title        = {Extended Expectation Cryptanalysis on Round-reduced {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bao0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoDGLW19,
  author       = {Zhenzhen Bao and
                  Itai Dinur and
                  Jian Guo and
                  Ga{\"{e}}tan Leurent and
                  Lei Wang},
  title        = {Generic Attacks on Hash Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/755},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoDGLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGGJRS18,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Ling Song},
  title        = {Key-Recovery Attacks on Full Kravatte},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {5--28},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.5-28},
  doi          = {10.13154/TOSC.V2018.I1.5-28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGW18,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Lei Wang},
  title        = {Functional Graphs and Their Applications in Generic Attacks on Iterated
                  Hash Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {201--253},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.201-253},
  doi          = {10.13154/TOSC.V2018.I1.201-253},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001018,
  author       = {Ling Song and
                  Jian Guo},
  title        = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {182--214},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.182-214},
  doi          = {10.13154/TOSC.V2018.I3.182-214},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/00010SL18,
  author       = {Ling Song and
                  Jian Guo and
                  Danping Shi and
                  San Ling},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {New {MILP} Modeling: Improved Conditional Cube Attacks on Keccak-Based
                  Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {65--95},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_3},
  doi          = {10.1007/978-3-030-03329-3\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/00010SL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoGW18,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Lei Wang},
  title        = {Functional Graphs and Their Applications in Generic Attacks on Iterated
                  Hash Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongG18,
  author       = {Ling Song and
                  Jian Guo},
  title        = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {810},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/810},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikICG17,
  author       = {Subhadeep Banik and
                  Takanori Isobe and
                  Tingting Cui and
                  Jian Guo},
  title        = {Some cryptanalytic results on Lizard},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {82--98},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.82-98},
  doi          = {10.13154/TOSC.V2017.I4.82-98},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikICG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bao00G17,
  author       = {Zhenzhen Bao and
                  Lei Wang and
                  Jian Guo and
                  Dawu Gu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on
                  Hash Combiners},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {404--427},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_14},
  doi          = {10.1007/978-3-319-63715-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bao00G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SongLG17,
  author       = {Ling Song and
                  Guohong Liao and
                  Jian Guo},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Non-full Sbox Linearization: Applications to Collision Attacks on
                  Round-Reduced Keccak},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {428--451},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_15},
  doi          = {10.1007/978-3-319-63715-0\_15},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/SongLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/QiaoSL017,
  author       = {Kexin Qiao and
                  Ling Song and
                  Meicheng Liu and
                  Jian Guo},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {New Collision Attacks on Round-Reduced Keccak},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {216--243},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_8},
  doi          = {10.1007/978-3-319-56617-7\_8},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/QiaoSL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QiaoSLG17,
  author       = {Kexin Qiao and
                  Ling Song and
                  Meicheng Liu and
                  Jian Guo},
  title        = {New Collision Attacks on Round-Reduced Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QiaoSLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongL017,
  author       = {Ling Song and
                  Guohong Liao and
                  Jian Guo},
  title        = {Non-Full Sbox Linearization: Applications to Collision Attacks on
                  Round-Reduced Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoW0G17,
  author       = {Zhenzhen Bao and
                  Lei Wang and
                  Jian Guo and
                  Dawu Gu},
  title        = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on
                  Hash Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoW0G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Song0S17,
  author       = {Ling Song and
                  Jian Guo and
                  Danping Shi},
  title        = {New {MILP} Modeling: Improved Conditional Cube Attacks to Keccak-based
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Song0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Extended meet-in-the-middle attacks on some Feistel constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {587--618},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0120-4},
  doi          = {10.1007/S10623-015-0120-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNQSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {33--56},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.33-56},
  doi          = {10.13154/TOSC.V2016.I1.33-56},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {307--337},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.307-337},
  doi          = {10.13154/TOSC.V2016.I2.307-337},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001LS16,
  author       = {Jian Guo and
                  Meicheng Liu and
                  Ling Song},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Linear Structures: Applications to Cryptanalysis of Round-Reduced
                  Keccak},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {249--274},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_9},
  doi          = {10.1007/978-3-662-53887-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001LS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Wang0ZZG16,
  author       = {Lei Wang and
                  Jian Guo and
                  Guoyan Zhang and
                  Jingyuan Zhao and
                  Dawu Gu},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {455--483},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_17},
  doi          = {10.1007/978-3-662-53887-6\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Wang0ZZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SunL0QR16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Longjiang Qu and
                  Vincent Rijmen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {New Insights on AES-Like {SPN} Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {605--624},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_22},
  doi          = {10.1007/978-3-662-53018-4\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SunL0QR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SunLGRL16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Vincent Rijmen and
                  Ruilin Li},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Provable Security Evaluation of Structures Against Impossible Differential
                  and Zero Correlation Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {196--213},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_8},
  doi          = {10.1007/978-3-662-49890-3\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SunLGRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGRL16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Vincent Rijmen and
                  Ruilin Li},
  title        = {Provable Security Evaluation of Structures against Impossible Differential
                  and Zero Correlation Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/096},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunL0QR16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Longjiang Qu and
                  Vincent Rijmen},
  title        = {New Insights on AES-like {SPN} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/533},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunL0QR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00310ZZG16,
  author       = {Lei Wang and
                  Jian Guo and
                  Guoyan Zhang and
                  Jingyuan Zhao and
                  Dawu Gu},
  title        = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/876},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00310ZZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001LS16,
  author       = {Jian Guo and
                  Meicheng Liu and
                  Ling Song},
  title        = {Linear Structures: Applications to Cryptanalysis of Round-Reduced
                  Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/878},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JNSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JNSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GuoSY15,
  author       = {Jian Guo and
                  Chunhua Su and
                  Wun{-}She Yap},
  title        = {An improved preimage attack against {HAVAL-3}},
  journal      = {Inf. Process. Lett.},
  volume       = {115},
  number       = {2},
  pages        = {386--393},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ipl.2014.10.016},
  doi          = {10.1016/J.IPL.2014.10.016},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/GuoSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001SWWW15,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Meiqin Wang and
                  Long Wen},
  title        = {Equivalent Key Recovery Attacks against {HMAC} and {NMAC} with Whirlpool
                  Reduced to 7 Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001SWWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001SWW15,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Shuang Wu},
  title        = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001SWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JMN15,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Nicky Mouha and
                  Ivica Nikolic},
  title        = {More Rounds, Less Security?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JNQSS15,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Full Midori64},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JNQSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001JNS14,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Meet-in-the-Middle Attacks on Generic Feistel Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {458--477},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_24},
  doi          = {10.1007/978-3-662-45611-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001JNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001PSW14,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Updates on Generic Attacks against {HMAC} and {NMAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_8},
  doi          = {10.1007/978-3-662-44371-2\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/0001PSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/0001KNWW14,
  author       = {Jian Guo and
                  Pierre Karpman and
                  Ivica Nikolic and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Josh Benaloh},
  title        = {Analysis of {BLAKE2}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {402--423},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_21},
  doi          = {10.1007/978-3-319-04852-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/0001KNWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataM0M14,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Jian Guo and
                  Sumio Morioka},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{CLOC:} Authenticated Encryption for Short Input},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_8},
  doi          = {10.1007/978-3-662-46706-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataM0M14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001SWWW14,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Meiqin Wang and
                  Long Wen},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Equivalent Key Recovery Attacks Against {HMAC} and {NMAC} with Whirlpool
                  Reduced to 7 Rounds},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {571--590},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_29},
  doi          = {10.1007/978-3-662-46706-0\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/0001SWWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/0001JLPW14,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian
                  Standardized Hash Function},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_12},
  doi          = {10.1007/978-3-319-13051-4\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/0001JLPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataMGM14,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Jian Guo and
                  Sumio Morioka},
  title        = {{CLOC:} Authenticated Encryption for Short Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataMGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JP014,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {Breaking {POET} Authentication with a Single Query},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JP014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JLPW14a,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian
                  Standardized Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JLPW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001SWW13,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_2},
  doi          = {10.1007/978-3-642-42045-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001SWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Benadjila0LP13,
  author       = {Ryad Benadjila and
                  Jian Guo and
                  Victor Lomn{\'{e}} and
                  Thomas Peyrin},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Implementing Lightweight Block Ciphers on x86 Architectures},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {324--351},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_17},
  doi          = {10.1007/978-3-662-43414-7\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Benadjila0LP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Benadjila0LP13,
  author       = {Ryad Benadjila and
                  Jian Guo and
                  Victor Lomn{\'{e}} and
                  Thomas Peyrin},
  title        = {Implementing Lightweight Block Ciphers on x86 Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Benadjila0LP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001KNWW13,
  author       = {Jian Guo and
                  Pierre Karpman and
                  Ivica Nikolic and
                  Lei Wang and
                  Shuang Wu},
  title        = {Analysis of {BLAKE2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001KNWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001NPW13,
  author       = {Jian Guo and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {Cryptanalysis of Zorro},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/713},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001NPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ChoyYKGPPT12,
  author       = {Jiali Choy and
                  Huihui Yap and
                  Khoongming Khoo and
                  Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Chik How Tan},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {SPN-Hash: Improving the Provable Resistance against Differential Collision
                  Attacks},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {270--286},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_17},
  doi          = {10.1007/978-3-642-31410-0\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ChoyYKGPPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuFWGDZ12,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Jian Guo and
                  Le Dong and
                  Jian Zou},
  editor       = {Anne Canteaut},
  title        = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function
                  and Others},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_8},
  doi          = {10.1007/978-3-642-34047-5\_8},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuFWGDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Duc0P012,
  author       = {Alexandre Duc and
                  Jian Guo and
                  Thomas Peyrin and
                  Lei Wei},
  editor       = {Anne Canteaut},
  title        = {Unaligned Rebound Attack: Application to Keccak},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {402--421},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_23},
  doi          = {10.1007/978-3-642-34047-5\_23},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Duc0P012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuFWGDZ12,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Jian Guo and
                  Le Dong and
                  Jian Zou},
  title        = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function
                  and Others (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/206},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuFWGDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoyYKGPPT12,
  author       = {Jiali Choy and
                  Huihui Yap and
                  Khoongming Khoo and
                  Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Chik How Tan},
  title        = {SPN-Hash: Improving the Provable Resistance Against Differential Collision
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoyYKGPPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001PPR12,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  title        = {The {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001PPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiRGWWL11,
  author       = {Lei Wei and
                  Christian Rechberger and
                  Jian Guo and
                  Hongjun Wu and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN} (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {433--438},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_31},
  doi          = {10.1007/978-3-642-22497-3\_31},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiRGWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuoPPR11,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {The {LED} Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_22},
  doi          = {10.1007/978-3-642-23951-9\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GuoPPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoPP11,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann},
  editor       = {Phillip Rogaway},
  title        = {The {PHOTON} Family of Lightweight Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {222--239},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_13},
  doi          = {10.1007/978-3-642-22792-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiRGWWL11,
  author       = {Lei Wei and
                  Christian Rechberger and
                  Jian Guo and
                  Hongjun Wu and
                  Huaxiong Wang and
                  San Ling},
  title        = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/201},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiRGWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucGPW11,
  author       = {Alexandre Duc and
                  Jian Guo and
                  Thomas Peyrin and
                  Lei Wei},
  title        = {Unaligned Rebound Attack - Application to Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucGPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPP11,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann},
  title        = {The {PHOTON} Family of Lightweight Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoLRW10,
  author       = {Jian Guo and
                  San Ling and
                  Christian Rechberger and
                  Huaxiong Wang},
  editor       = {Masayuki Abe},
  title        = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full
                  Tiger, and Improved Results on {MD4} and {SHA-2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {56--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_4},
  doi          = {10.1007/978-3-642-17373-8\_4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoLRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonGKMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Differential and Invertibility Properties of {BLAKE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {318--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_18},
  doi          = {10.1007/978-3-642-13858-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuoT10,
  author       = {Jian Guo and
                  S{\o}ren S. Thomsen},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Deterministic Differential Properties of the Compression Function
                  of {BMW}},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {338--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_23},
  doi          = {10.1007/978-3-642-19574-7\_23},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001LRW10,
  author       = {Jian Guo and
                  San Ling and
                  Christian Rechberger and
                  Huaxiong Wang},
  title        = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full
                  Tiger, and Improved Results on {MD4} and {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson0KMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  title        = {Differential and invertibility properties of {BLAKE} (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson0KMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09,
  author       = {Kazumaro Aoki and
                  Jian Guo and
                  Krystian Matusiewicz and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Mitsuru Matsui},
  title        = {Preimages for Step-Reduced {SHA-2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {578--597},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_34},
  doi          = {10.1007/978-3-642-10366-7\_34},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AokiGMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09,
  author       = {Alex Biryukov and
                  Praveen Gauravaram and
                  Jian Guo and
                  Dmitry Khovratovich and
                  San Ling and
                  Krystian Matusiewicz and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of the {LAKE} Hash Family},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_10},
  doi          = {10.1007/978-3-642-03317-9\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_9},
  doi          = {10.1007/978-3-642-05445-7\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  title        = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoM09,
  author       = {Jian Guo and
                  Krystian Matusiewicz},
  title        = {Preimages for Step-Reduced {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunWWG08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Huaxiong Wang and
                  Jian Guo},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {On the Improvement of the {BDF} Attack on {LSBS-RSA}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_7},
  doi          = {10.1007/978-3-540-70500-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunWWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SunWSGW08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Ron Steinfeld and
                  Jian Guo and
                  Huaxiong Wang},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant
                  Bits},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_4},
  doi          = {10.1007/978-3-540-89641-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SunWSGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08,
  author       = {Ron Steinfeld and
                  Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of {LASH}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_13},
  doi          = {10.1007/978-3-540-71039-4\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunWSGW08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Ron Steinfeld and
                  Jian Guo and
                  Huaxiong Wang},
  title        = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant
                  Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunWSGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ContiniMPSGLW07,
  author       = {Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  title        = {Cryptanalysis of {LASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics