Chun Guo

According to our database1, Chun Guo authored at least 24 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Efficient Side-Channel Secure Message Authentication with Better Bounds.
IACR Cryptology ePrint Archive, 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptology ePrint Archive, 2019

Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).
IACR Cryptology ePrint Archive, 2019

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
IACR Cryptology ePrint Archive, 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptology ePrint Archive, 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptology ePrint Archive, 2019

Beyond-birthday secure domain-preserving PRFs from a single permutation.
Des. Codes Cryptogr., 2019

Efficient Training Support Vector Clustering With Appropriate Boundary Information.
IEEE Access, 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

DataSESec: Security Monitoring for Data Share and Exchange Platform.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

2018
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security.
IACR Cryptology ePrint Archive, 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptology ePrint Archive, 2018

Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective.
CoRR, 2018

2017
FRSVC: Towards making support vector clustering consume less.
Pattern Recognition, 2017

Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptology ePrint Archive, 2017

2016
A two-level hybrid approach for intrusion detection.
Neurocomputing, 2016

Data privacy protection based on sensitive attributes dynamic update.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2014
A distance sum-based hybrid method for intrusion detection.
Appl. Intell., 2014

"My Curiosity was Satisfied, but not in a Good Way": Predicting User Ratings for Online Recipes.
Proceedings of the Second Workshop on Natural Language Processing for Social Media, 2014

2013
Efficient intrusion detection using representative instances.
Comput. Secur., 2013

2011
Preparation of small intestinal submucosa as a scaffold for cardiac tissue engineering.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011


  Loading...