Jian Guo

Orcid: 0000-0001-8847-6748

Affiliations:
  • Nanyang Technological University, Division of Mathematical Sciences, Singapore
  • Institute for Infocomm Research, Singapore


According to our database1, Jian Guo authored at least 82 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2024

Diving Deep into the Preimage Security of AES-like Hashing.
IACR Cryptol. ePrint Arch., 2024

2023
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach.
IACR Cryptol. ePrint Arch., 2023

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2023

2022
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective.
IACR Cryptol. ePrint Arch., 2022

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3.
IACR Cryptol. ePrint Arch., 2022

Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs.
IACR Cryptol. ePrint Arch., 2022

Triangulating Rebound Attack on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2022

Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings.
IACR Cryptol. ePrint Arch., 2022

Rebound Attacks on SKINNY Hashing with Automatic Tools.
IACR Cryptol. ePrint Arch., 2022

Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256.
IACR Cryptol. ePrint Arch., 2022

Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Enhancing Differential-Neural Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
New Constructions of Complete Permutations.
IEEE Trans. Inf. Theory, 2021

MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing.
IACR Cryptol. ePrint Arch., 2021

Quantum Multi-Collision Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Conditional Differential-Neural Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

2020
Extended Truncated-differential Distinguishers on Round-reduced AES.
IACR Trans. Symmetric Cryptol., 2020

Practical Collision Attacks against Round-Reduced SHA-3.
J. Cryptol., 2020

Generic Attacks on Hash Combiners.
J. Cryptol., 2020

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY.
IACR Trans. Symmetric Cryptol., 2019

PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Trans. Symmetric Cryptol., 2019

SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Cryptol. ePrint Arch., 2019

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes.
IACR Cryptol. ePrint Arch., 2019

Extended Expectation Cryptanalysis on Round-reduced AES.
IACR Cryptol. ePrint Arch., 2019

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Cryptol. ePrint Arch., 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptol. ePrint Arch., 2019

2018
Key-Recovery Attacks on Full Kravatte.
IACR Trans. Symmetric Cryptol., 2018

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.
IACR Cryptol. ePrint Arch., 2018

Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions.
IACR Cryptol. ePrint Arch., 2018

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Some cryptanalytic results on Lizard.
IACR Trans. Symmetric Cryptol., 2017

Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2017

New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions.
IACR Cryptol. ePrint Arch., 2017

New Collision Attacks on Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2017

Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
IACR Cryptol. ePrint Arch., 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2016

New Insights on AES-like SPN Ciphers.
IACR Cryptol. ePrint Arch., 2016

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
IACR Cryptol. ePrint Arch., 2016

Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak.
IACR Cryptol. ePrint Arch., 2016

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016

Extended meet-in-the-middle attacks on some Feistel constructions.
Des. Codes Cryptogr., 2016

2015
An improved preimage attack against HAVAL-3.
Inf. Process. Lett., 2015

Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of HMAC/NMAC-Whirlpool.
IACR Cryptol. ePrint Arch., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

More Rounds, Less Security?
IACR Cryptol. ePrint Arch., 2015

2014
CLOC: Authenticated Encryption for Short Input.
IACR Cryptol. ePrint Arch., 2014

Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014

Updates on Generic Attacks against HMAC and NMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Implementing Lightweight Block Ciphers on x86 Architectures.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of Zorro.
IACR Cryptol. ePrint Arch., 2013

Analysis of BLAKE2.
IACR Cryptol. ePrint Arch., 2013

2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012

SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks.
IACR Cryptol. ePrint Arch., 2012

The LED Block Cipher.
IACR Cryptol. ePrint Arch., 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN.
IACR Cryptol. ePrint Arch., 2011

The PHOTON Family of Lightweight Hash Functions.
IACR Cryptol. ePrint Arch., 2011

Unaligned Rebound Attack - Application to Keccak.
IACR Cryptol. ePrint Arch., 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Differential and invertibility properties of BLAKE (full version).
IACR Cryptol. ePrint Arch., 2010

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
IACR Cryptol. ePrint Arch., 2010

Deterministic Differential Properties of the Compression Function of BMW.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Differential and Invertibility Properties of BLAKE.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Practical pseudo-collisions for hash functions ARIRANG-224/384.
IACR Cryptol. ePrint Arch., 2009

Preimages for Step-Reduced SHA-2.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Preimages for Step-Reduced SHA-2.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
IACR Cryptol. ePrint Arch., 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Cryptanalysis of LASH.
IACR Cryptol. ePrint Arch., 2007


  Loading...