Chun Guo

Orcid: 0000-0002-8520-6301

Affiliations:
  • Shandong University, Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, China
  • Université catholique de Louvain, Institute of Information and Communication Technologies, Electronics and Applied Mathematics, Belgium (former)
  • University of the Chinese Academy of Sciences, Beijing, China (former)


According to our database1, Chun Guo authored at least 55 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ISA Extensions of Shuffling Against Side-Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

On Tweakable Correlation Robust Hashing against Key Leakages.
IACR Cryptol. ePrint Arch., 2024

The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
IACR Cryptol. ePrint Arch., 2024

2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur., August, 2023

Nonce-misuse resilience of Romulus-N and GIFT-COFB.
IET Inf. Secur., May, 2023

Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher.
Des. Codes Cryptogr., March, 2023

Chosen-Key Secure Even-Mansour Cipher from a Single Permutation.
IACR Trans. Symmetric Cryptol., 2023

Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2023

Algebraic Attacks on Round-Reduced RAIN and Full AIM-III.
IACR Cryptol. ePrint Arch., 2023

Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls.
IACR Cryptol. ePrint Arch., 2023

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2023

Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
Side-Channel Masking with Common Shares.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

New indifferentiability security proof of MDPH hash function.
IET Inf. Secur., 2022

Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules).
IACR Cryptol. ePrint Arch., 2022

Secure Message Authentication in the Presence of Leakage and Faults.
IACR Cryptol. ePrint Arch., 2022

SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
Des. Codes Cryptogr., 2022

Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

How Fast Can SM4 be in Software?
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Provable Security of SP Networks with Partial Non-Linear Layers.
IACR Trans. Symmetric Cryptol., 2021

Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions.
IACR Cryptol. ePrint Arch., 2021

Sequential Indifferentiability of Confusion-Diffusion Networks.
IACR Cryptol. ePrint Arch., 2021

Efficient Leakage-Resilient MACs without Idealized Assumptions.
IACR Cryptol. ePrint Arch., 2021

Beyond-birthday security for permutation-based Feistel networks.
Des. Codes Cryptogr., 2021

2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020

Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
IACR Cryptol. ePrint Arch., 2020

Improved Security Bounds for Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Provable Related-Key Security of Contracting Feistel Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective.
IEEE Trans. Inf. Theory, 2019

Efficient Side-Channel Secure Message Authentication with Better Bounds.
IACR Cryptol. ePrint Arch., 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019

Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).
IACR Cryptol. ePrint Arch., 2019

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
IACR Cryptol. ePrint Arch., 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptol. ePrint Arch., 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptol. ePrint Arch., 2019

Beyond-birthday secure domain-preserving PRFs from a single permutation.
Des. Codes Cryptogr., 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018

2017
Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptol. ePrint Arch., 2017

2016
Cascade Ciphers Revisited: Indifferentiability Analysis.
IACR Cryptol. ePrint Arch., 2016

Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation.
IACR Cryptol. ePrint Arch., 2016

Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour.
Des. Codes Cryptogr., 2016

2015
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2015

Improved domain extender for the ideal cipher.
Cryptogr. Commun., 2015

Estimating Differential-Linear Distinguishers and Applications to CTC2.
Proceedings of the Information Security Practice and Experience, 2015

2014
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
IACR Cryptol. ePrint Arch., 2014


  Loading...