Chun Guo

Orcid: 0000-0002-8520-6301

Affiliations:
  • Shandong University, Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, China
  • Université catholique de Louvain, Institute of Information and Communication Technologies, Electronics and Applied Mathematics, Belgium (former)
  • University of the Chinese Academy of Sciences, Beijing, China (former)


According to our database1, Chun Guo authored at least 63 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CCA security for contracting (quasi-)Feistel constructions with tight round complexity.
Des. Codes Cryptogr., August, 2024

ISA Extensions of Shuffling Against Side-Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations.
IET Inf. Secur., 2024

Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition.
IET Inf. Secur., 2024

Leakage-Resilience of Circuit Garbling.
IACR Cryptol. ePrint Arch., 2024

On Tweakable Correlation Robust Hashing against Key Leakages.
IACR Cryptol. ePrint Arch., 2024

The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
IACR Cryptol. ePrint Arch., 2024

On Constructing Pseudorandom Involutions: Feistel variants using a single round function.
IACR Cryptol. ePrint Arch., 2024

AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2024

Leakage-Resilient Circuit Garbling.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur., August, 2023

Nonce-misuse resilience of Romulus-N and GIFT-COFB.
IET Inf. Secur., May, 2023

Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher.
Des. Codes Cryptogr., March, 2023

Chosen-Key Secure Even-Mansour Cipher from a Single Permutation.
IACR Trans. Symmetric Cryptol., 2023

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Trans. Symmetric Cryptol., 2023

Secure Message Authentication in the Presence of Leakage and Faults.
IACR Trans. Symmetric Cryptol., 2023

Bit-Sliced Implementation of SM4 and New Performance Records.
IET Inf. Secur., 2023

Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2023

Algebraic Attacks on Round-Reduced RAIN and Full AIM-III.
IACR Cryptol. ePrint Arch., 2023

Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls.
IACR Cryptol. ePrint Arch., 2023

Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
Side-Channel Masking with Common Shares.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

New indifferentiability security proof of MDPH hash function.
IET Inf. Secur., 2022

Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules).
IACR Cryptol. ePrint Arch., 2022

SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
Des. Codes Cryptogr., 2022

Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

How Fast Can SM4 be in Software?
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Provable Security of SP Networks with Partial Non-Linear Layers.
IACR Trans. Symmetric Cryptol., 2021

Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions.
IACR Cryptol. ePrint Arch., 2021

Sequential Indifferentiability of Confusion-Diffusion Networks.
IACR Cryptol. ePrint Arch., 2021

Efficient Leakage-Resilient MACs without Idealized Assumptions.
IACR Cryptol. ePrint Arch., 2021

Beyond-birthday security for permutation-based Feistel networks.
Des. Codes Cryptogr., 2021

2020
Improved Security Bounds for Generalized Feistel Networks.
IACR Trans. Symmetric Cryptol., 2020

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020

Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Provable Related-Key Security of Contracting Feistel Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Efficient Side-Channel Secure Message Authentication with Better Bounds.
IACR Trans. Symmetric Cryptol., 2019

Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective.
IEEE Trans. Inf. Theory, 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019

Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).
IACR Cryptol. ePrint Arch., 2019

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
IACR Cryptol. ePrint Arch., 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptol. ePrint Arch., 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptol. ePrint Arch., 2019

Beyond-birthday secure domain-preserving PRFs from a single permutation.
Des. Codes Cryptogr., 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018

2017
Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptol. ePrint Arch., 2017

2016
Cascade Ciphers Revisited: Indifferentiability Analysis.
IACR Cryptol. ePrint Arch., 2016

Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation.
IACR Cryptol. ePrint Arch., 2016

Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour.
Des. Codes Cryptogr., 2016

2015
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2015

Improved domain extender for the ideal cipher.
Cryptogr. Commun., 2015

Estimating Differential-Linear Distinguishers and Applications to CTC2.
Proceedings of the Information Security Practice and Experience, 2015

2014
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
IACR Cryptol. ePrint Arch., 2014


  Loading...