default search action
Jian Guo 0001
Person information
- affiliation: Nanyang Technological University, Division of Mathematical Sciences, Singapore
- affiliation: Institute for Infocomm Research, Singapore
Other persons with the same name
- Jian Guo — disambiguation page
- Jian Guo 0002 — Harvard University (and 1 more)
- Jian Guo 0003 — Tianjin University of Technology, China (and 1 more)
- Jian Guo 0004 — Tokyo Institute of Technology, Department of Mathematical and Computing Science, Japan (and 1 more)
- Jian Guo 0005 — East China Normal University, Soft/Hardware Co-design Engineering Research Center, Shanghai, China
- Jian Guo 0006 — Nanjing University of Posts and Telecommunications, College of Computer, China
- Jian Guo 0007 — Nanjing University of Science and Technology, School of Automation, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao:
PEO-Store: Delegation-Proof Based Oblivious Storage With Secure Redundancy Elimination. IEEE Trans. Dependable Secur. Comput. 21(5): 4815-4826 (2024) - [j21]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Trans. Symmetric Cryptol. 2024(1): 158-187 (2024) - [c43]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm. ACISP (2) 2024: 24-43 - [c42]Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-Like Hashing. EUROCRYPT (1) 2024: 398-426 - [i59]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. CoRR abs/2409.11646 (2024) - [i58]Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-like Hashing. IACR Cryptol. ePrint Arch. 2024: 300 (2024) - [i57]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2024: 352 (2024) - [i56]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2024: 1403 (2024) - 2023
- [j20]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Trans. Symmetric Cryptol. 2023(2): 132-175 (2023) - [j19]Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. IACR Trans. Symmetric Cryptol. 2023(3): 74-100 (2023) - [e8]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14438, Springer 2023, ISBN 978-981-99-8720-7 [contents] - [e7]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14439, Springer 2023, ISBN 978-981-99-8723-8 [contents] - [e6]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14440, Springer 2023, ISBN 978-981-99-8726-9 [contents] - [e5]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14441, Springer 2023, ISBN 978-981-99-8729-0 [contents] - [e4]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14442, Springer 2023, ISBN 978-981-99-8732-0 [contents] - [e3]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI. Lecture Notes in Computer Science 14443, Springer 2023, ISBN 978-981-99-8735-1 [contents] - [e2]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII. Lecture Notes in Computer Science 14444, Springer 2023, ISBN 978-981-99-8738-2 [contents] - [e1]Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII. Lecture Notes in Computer Science 14445, Springer 2023, ISBN 978-981-99-8741-2 [contents] - [i55]Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao:
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation. IACR Cryptol. ePrint Arch. 2023: 291 (2023) - [i54]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2023: 748 (2023) - [i53]Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach. IACR Cryptol. ePrint Arch. 2023: 1266 (2023) - 2022
- [c41]Jian Guo, Ling Song, Haoyang Wang:
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256. ACISP 2022: 3-23 - [c40]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Enhancing Differential-Neural Cryptanalysis. ASIACRYPT (1) 2022: 318-347 - [c39]Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3. ASIACRYPT (3) 2022: 645-674 - [c38]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. CRYPTO (1) 2022: 64-93 - [c37]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:
Triangulating Rebound Attack on AES-like Hashing. CRYPTO (1) 2022: 94-124 - [c36]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. ICISC 2022: 41-60 - [c35]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. NSS 2022: 687-711 - [i52]Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3. IACR Cryptol. ePrint Arch. 2022: 184 (2022) - [i51]Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:
Triangulating Rebound Attack on AES-like Hashing. IACR Cryptol. ePrint Arch. 2022: 731 (2022) - [i50]Jian Guo, Ling Song, Haoyang Wang:
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256. IACR Cryptol. ePrint Arch. 2022: 845 (2022) - [i49]Jian Guo, Shun Li, Guozhen Liu, Phuong Pham:
Rebound Attacks on SKINNY Hashing with Automatic Tools. IACR Cryptol. ePrint Arch. 2022: 1057 (2022) - [i48]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. IACR Cryptol. ePrint Arch. 2022: 1058 (2022) - [i47]Avijit Dutta, Jian Guo, Eik List:
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs. IACR Cryptol. ePrint Arch. 2022: 1609 (2022) - [i46]Huina Li, Guozhen Liu, Haochen Zhang, Kai Hu, Jian Guo, Weidong Qiu:
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective. IACR Cryptol. ePrint Arch. 2022: 1641 (2022) - 2021
- [j18]Bing Sun, Kangquan Li, Jian Guo, Longjiang Qu:
New Constructions of Complete Permutations. IEEE Trans. Inf. Theory 67(11): 7561-7567 (2021) - [c34]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [i45]Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing. IACR Cryptol. ePrint Arch. 2021: 575 (2021) - [i44]Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Quantum Multi-Collision Distinguishers. IACR Cryptol. ePrint Arch. 2021: 703 (2021) - [i43]Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Conditional Differential-Neural Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 719 (2021) - 2020
- [j17]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j16]Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:
Practical Collision Attacks against Round-Reduced SHA-3. J. Cryptol. 33(1): 228-270 (2020) - [j15]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. J. Cryptol. 33(3): 742-823 (2020) - [j14]Zhenzhen Bao, Jian Guo, Eik List:
Extended Truncated-differential Distinguishers on Round-reduced AES. IACR Trans. Symmetric Cryptol. 2020(3): 197-261 (2020) - [c33]Chun Guo, Jian Guo, Eik List, Ling Song:
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT). ASIACRYPT (1) 2020: 567-597 - [c32]Zhenzhen Bao, Chun Guo, Jian Guo, Ling Song:
TNT: How to Tweak a Block Cipher. EUROCRYPT (2) 2020: 641-673 - [i42]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020)
2010 – 2019
- 2019
- [j13]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019) - [j12]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Trans. Symmetric Cryptol. 2019(1): 330-394 (2019) - [j11]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Trans. Symmetric Cryptol. 2019(2): 1-54 (2019) - [j10]Wenying Zhang, Meichun Cao, Jian Guo, Enes Pasalic:
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY. IACR Trans. Symmetric Cryptol. 2019(4): 171-191 (2019) - [j9]Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. IACR Trans. Symmetric Cryptol. 2019(4): 318-347 (2019) - [i41]Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:
Practical Collision Attacks against Round-Reduced SHA-3. IACR Cryptol. ePrint Arch. 2019: 147 (2019) - [i40]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Cryptol. ePrint Arch. 2019: 185 (2019) - [i39]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Cryptol. ePrint Arch. 2019: 209 (2019) - [i38]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Cryptol. ePrint Arch. 2019: 600 (2019) - [i37]Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. IACR Cryptol. ePrint Arch. 2019: 607 (2019) - [i36]Zhenzhen Bao, Jian Guo, Eik List:
Extended Expectation Cryptanalysis on Round-reduced AES. IACR Cryptol. ePrint Arch. 2019: 622 (2019) - [i35]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2019: 755 (2019) - 2018
- [j8]Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song:
Key-Recovery Attacks on Full Kravatte. IACR Trans. Symmetric Cryptol. 2018(1): 5-28 (2018) - [j7]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Trans. Symmetric Cryptol. 2018(1): 201-253 (2018) - [j6]Ling Song, Jian Guo:
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. IACR Trans. Symmetric Cryptol. 2018(3): 182-214 (2018) - [c31]Ling Song, Jian Guo, Danping Shi, San Ling:
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions. ASIACRYPT (2) 2018: 65-95 - [i34]Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Cryptol. ePrint Arch. 2018: 374 (2018) - [i33]Ling Song, Jian Guo:
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. IACR Cryptol. ePrint Arch. 2018: 810 (2018) - 2017
- [j5]Subhadeep Banik, Takanori Isobe, Tingting Cui, Jian Guo:
Some cryptanalytic results on Lizard. IACR Trans. Symmetric Cryptol. 2017(4): 82-98 (2017) - [c30]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. CRYPTO (2) 2017: 404-427 - [c29]Ling Song, Guohong Liao, Jian Guo:
Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. CRYPTO (2) 2017: 428-451 - [c28]Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. EUROCRYPT (3) 2017: 216-243 - [i32]Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2017: 128 (2017) - [i31]Ling Song, Guohong Liao, Jian Guo:
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2017: 529 (2017) - [i30]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2017: 534 (2017) - [i29]Ling Song, Jian Guo, Danping Shi:
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions. IACR Cryptol. ePrint Arch. 2017: 1030 (2017) - 2016
- [j4]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Extended meet-in-the-middle attacks on some Feistel constructions. Des. Codes Cryptogr. 80(3): 587-618 (2016) - [j3]Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Trans. Symmetric Cryptol. 2016(1): 33-56 (2016) - [j2]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Trans. Symmetric Cryptol. 2016(2): 307-337 (2016) - [c27]Jian Guo, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. ASIACRYPT (1) 2016: 249-274 - [c26]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. ASIACRYPT (1) 2016: 455-483 - [c25]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-Like SPN Ciphers. CRYPTO (1) 2016: 605-624 - [c24]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis. EUROCRYPT (1) 2016: 196-213 - [i28]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2016: 96 (2016) - [i27]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-like SPN Ciphers. IACR Cryptol. ePrint Arch. 2016: 533 (2016) - [i26]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. IACR Cryptol. ePrint Arch. 2016: 876 (2016) - [i25]Jian Guo, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2016: 878 (2016) - [i24]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Cryptol. ePrint Arch. 2016: 973 (2016) - [i23]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Cryptol. ePrint Arch. 2016: 1162 (2016) - 2015
- [j1]Jian Guo, Chunhua Su, Wun-She Yap:
An improved preimage attack against HAVAL-3. Inf. Process. Lett. 115(2): 386-393 (2015) - [i22]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. IACR Cryptol. ePrint Arch. 2015: 75 (2015) - [i21]Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. IACR Cryptol. ePrint Arch. 2015: 149 (2015) - [i20]Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:
More Rounds, Less Security? IACR Cryptol. ePrint Arch. 2015: 484 (2015) - [i19]Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Full Midori64. IACR Cryptol. ePrint Arch. 2015: 1189 (2015) - 2014
- [c23]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Generic Feistel Constructions. ASIACRYPT (1) 2014: 458-477 - [c22]Jian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. CRYPTO (1) 2014: 131-148 - [c21]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. CT-RSA 2014: 402-423 - [c20]Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167 - [c19]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590 - [c18]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Selected Areas in Cryptography 2014: 195-211 - [i18]Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. IACR Cryptol. ePrint Arch. 2014: 157 (2014) - [i17]Jian Guo, Jérémy Jean, Thomas Peyrin, Lei Wang:
Breaking POET Authentication with a Single Query. IACR Cryptol. ePrint Arch. 2014: 197 (2014) - [i16]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. IACR Cryptol. ePrint Arch. 2014: 675 (2014) - 2013
- [c17]Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:
Cryptanalysis of HMAC/NMAC-Whirlpool. ASIACRYPT (2) 2013: 21-40 - [c16]Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin:
Implementing Lightweight Block Ciphers on x86 Architectures. Selected Areas in Cryptography 2013: 324-351 - [i15]Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin:
Implementing Lightweight Block Ciphers on x86 Architectures. IACR Cryptol. ePrint Arch. 2013: 445 (2013) - [i14]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. IACR Cryptol. ePrint Arch. 2013: 467 (2013) - [i13]Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang:
Cryptanalysis of Zorro. IACR Cryptol. ePrint Arch. 2013: 713 (2013) - 2012
- [c15]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. AFRICACRYPT 2012: 270-286 - [c14]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145 - [c13]Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei:
Unaligned Rebound Attack: Application to Keccak. FSE 2012: 402-421 - [i12]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). IACR Cryptol. ePrint Arch. 2012: 206 (2012) - [i11]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. IACR Cryptol. ePrint Arch. 2012: 234 (2012) - [i10]Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. IACR Cryptol. ePrint Arch. 2012: 600 (2012) - 2011
- [c12]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ACISP 2011: 433-438 - [c11]Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. CHES 2011: 326-341 - [c10]Jian Guo, Thomas Peyrin, Axel Poschmann:
The PHOTON Family of Lightweight Hash Functions. CRYPTO 2011: 222-239 - [i9]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. IACR Cryptol. ePrint Arch. 2011: 201 (2011) - [i8]Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei:
Unaligned Rebound Attack - Application to Keccak. IACR Cryptol. ePrint Arch. 2011: 420 (2011) - [i7]Jian Guo, Thomas Peyrin, Axel Poschmann:
The PHOTON Family of Lightweight Hash Functions. IACR Cryptol. ePrint Arch. 2011: 609 (2011) - 2010
- [c9]Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. ASIACRYPT 2010: 56-75 - [c8]Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and Invertibility Properties of BLAKE. FSE 2010: 318-332 - [c7]Jian Guo, Søren S. Thomsen:
Deterministic Differential Properties of the Compression Function of BMW. Selected Areas in Cryptography 2010: 338-350 - [i6]Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. IACR Cryptol. ePrint Arch. 2010: 16 (2010) - [i5]Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and invertibility properties of BLAKE (full version). IACR Cryptol. ePrint Arch. 2010: 43 (2010)
2000 – 2009
- 2009
- [c6]Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang:
Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597 - [c5]Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [c4]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Selected Areas in Cryptography 2009: 141-156 - [i4]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical pseudo-collisions for hash functions ARIRANG-224/384. IACR Cryptol. ePrint Arch. 2009: 197 (2009) - [i3]Jian Guo, Krystian Matusiewicz:
Preimages for Step-Reduced SHA-2. IACR Cryptol. ePrint Arch. 2009: 477 (2009) - 2008
- [c3]Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97 - [c2]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63 - [c1]Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. FSE 2008: 207-223 - [i2]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. IACR Cryptol. ePrint Arch. 2008: 296 (2008) - 2007
- [i1]Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. IACR Cryptol. ePrint Arch. 2007: 430 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint