Jian Guo

Orcid: 0000-0001-8847-6748

Affiliations:
  • Nanyang Technological University, Division of Mathematical Sciences, Singapore
  • Institute for Infocomm Research, Singapore


According to our database1, Jian Guo authored at least 91 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More.
IACR Trans. Symmetric Cryptol., 2025

Neural-Inspired Advances in Integral Cryptanalysis.
IACR Cryptol. ePrint Arch., 2025

Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems.
IACR Cryptol. ePrint Arch., 2025

Scrutinizing the Security of AES-based Hashing and One-way Functions.
IACR Cryptol. ePrint Arch., 2025

Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
PEO-Store: Delegation-Proof Based Oblivious Storage With Secure Redundancy Elimination.
IEEE Trans. Dependable Secur. Comput., 2024

Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2024

Chosen-Prefix Collisions on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2024

Diving Deep into the Preimage Security of AES-Like Hashing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Hard-Label Cryptanalytic Extraction of Neural Network Models.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation.
IACR Cryptol. ePrint Arch., 2023

Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach.
IACR Cryptol. ePrint Arch., 2023

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2023

2022
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective.
IACR Cryptol. ePrint Arch., 2022

Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs.
IACR Cryptol. ePrint Arch., 2022

Rebound Attacks on SKINNY Hashing with Automatic Tools.
IACR Cryptol. ePrint Arch., 2022

Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings.
Proceedings of the Network and System Security - 16th International Conference, 2022

Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Triangulating Rebound Attack on AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Enhancing Differential-Neural Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
New Constructions of Complete Permutations.
IEEE Trans. Inf. Theory, 2021

MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing.
IACR Cryptol. ePrint Arch., 2021

Quantum Multi-Collision Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Conditional Differential-Neural Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Extended Truncated-differential Distinguishers on Round-reduced AES.
IACR Trans. Symmetric Cryptol., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

TNT: How to Tweak a Block Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY.
IACR Trans. Symmetric Cryptol., 2019

PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Trans. Symmetric Cryptol., 2019

Practical Collision Attacks against Round-Reduced SHA-3.
IACR Cryptol. ePrint Arch., 2019

SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Cryptol. ePrint Arch., 2019

Generic Attacks on Hash Combiners.
IACR Cryptol. ePrint Arch., 2019

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes.
IACR Cryptol. ePrint Arch., 2019

Extended Expectation Cryptanalysis on Round-reduced AES.
IACR Cryptol. ePrint Arch., 2019

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Cryptol. ePrint Arch., 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptol. ePrint Arch., 2019

2018
Key-Recovery Attacks on Full Kravatte.
IACR Trans. Symmetric Cryptol., 2018

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.
IACR Cryptol. ePrint Arch., 2018

Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions.
IACR Cryptol. ePrint Arch., 2018

New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Some cryptanalytic results on Lizard.
IACR Trans. Symmetric Cryptol., 2017

New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions.
IACR Cryptol. ePrint Arch., 2017

New Collision Attacks on Round-Reduced Keccak.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016

Extended meet-in-the-middle attacks on some Feistel constructions.
Des. Codes Cryptogr., 2016

Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

New Insights on AES-Like SPN Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
An improved preimage attack against HAVAL-3.
Inf. Process. Lett., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

More Rounds, Less Security?
IACR Cryptol. ePrint Arch., 2015

2014
Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

CLOC: Authenticated Encryption for Short Input.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Analysis of BLAKE2.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Updates on Generic Attacks against HMAC and NMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Cryptanalysis of Zorro.
IACR Cryptol. ePrint Arch., 2013

Implementing Lightweight Block Ciphers on x86 Architectures.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Cryptanalysis of HMAC/NMAC-Whirlpool.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Unaligned Rebound Attack: Application to Keccak.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN.
IACR Cryptol. ePrint Arch., 2011

The PHOTON Family of Lightweight Hash Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

The LED Block Cipher.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Differential and invertibility properties of BLAKE (full version).
IACR Cryptol. ePrint Arch., 2010

Deterministic Differential Properties of the Compression Function of BMW.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Differential and Invertibility Properties of BLAKE.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Preimages for Step-Reduced SHA-2.
IACR Cryptol. ePrint Arch., 2009

Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Preimages for Step-Reduced SHA-2.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptanalysis of LASH.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008


  Loading...