Chun Guo
Orcid: 0000-0002-8520-6301Affiliations:
- Shandong University, Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, China
- Université catholique de Louvain, Institute of Information and Communication Technologies, Electronics and Applied Mathematics, Belgium (former)
- University of the Chinese Academy of Sciences, Beijing, China (former)
According to our database1,
Chun Guo
authored at least 70 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
IACR Cryptol. ePrint Arch., 2025
Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
CCA security for contracting (quasi-)Feistel constructions with tight round complexity.
Des. Codes Cryptogr., August, 2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024
IET Inf. Secur., 2024
Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition.
IET Inf. Secur., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
IACR Cryptol. ePrint Arch., 2024
On Constructing Pseudorandom Involutions: Feistel variants using a single round function.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur., August, 2023
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher.
Des. Codes Cryptogr., March, 2023
IACR Trans. Symmetric Cryptol., 2023
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules).
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective.
IEEE Trans. Inf. Theory, 2019
IACR Cryptol. ePrint Arch., 2019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Des. Codes Cryptogr., 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour.
Des. Codes Cryptogr., 2016
2015
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015