Jian Guo
Orcid: 0000-0001-8847-6748Affiliations:
- Nanyang Technological University, Division of Mathematical Sciences, Singapore
- Institute for Infocomm Research, Singapore
According to our database1,
Jian Guo
authored at least 86 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
PEO-Store: Delegation-Proof Based Oblivious Storage With Secure Redundancy Elimination.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IACR Trans. Symmetric Cryptol., 2023
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
2022
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing.
IACR Cryptol. ePrint Arch., 2021
2020
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY.
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions.
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Symmetric Cryptol., 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Trans. Symmetric Cryptol., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
2015
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015
2014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007