Qian Guo
Orcid: 0000-0003-0930-3174Affiliations:
- Lund University, Department of Electrical and Information Technology, Sweden (PhD 2017)
- University of Bergen, Department of Informatics, Selmer Center, Norway (former)
- Université catholique de Louvain, Louvain-la-Neuve, Begium (2017)
According to our database1,
Qian Guo
authored at least 48 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, November, 2024
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2024
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber.
IACR Cryptol. ePrint Arch., 2024
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber.
IACR Commun. Cryptol., 2024
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms.
Cryptogr. Commun., March, 2023
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Trans. Inf. Theory, 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber.
IACR Cryptol. ePrint Arch., 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IEEE Trans. Inf. Theory, 2019
Inf. Process. Lett., 2019
IACR Cryptol. ePrint Arch., 2019
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke.
IACR Cryptol. ePrint Arch., 2019
Adv. Math. Commun., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems.
PhD thesis, 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
IEEE Trans. Inf. Theory, 2015
2014
An Average-Case Efficient Algorithm on Testing the Identity of Boolean Functions in Trace Representation.
IEICE Trans. Inf. Syst., 2014
2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
2012
An Efficient Interpolation Based Erasure-Only Decoder for High-Rate Reed-Solomon Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011