Jie Guan

Orcid: 0000-0003-4135-7017

According to our database1, Jie Guan authored at least 66 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes.
IEEE Trans. Computers, February, 2024

Design Frameworks for Spatial Zone Agents in XRI Metaverse Smart Environments.
CoRR, 2024

2023
New method for combining Matsui's bounding conditions with sequential encoding method.
Des. Codes Cryptogr., November, 2023

Weak rotational property and its application.
Des. Codes Cryptogr., October, 2023

Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework.
Des. Codes Cryptogr., September, 2023

Fast Correlation Attacks on K2 Stream Cipher.
IEEE Trans. Inf. Theory, August, 2023

A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis.
Sci. China Inf. Sci., March, 2023

Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers.
IEEE Trans. Inf. Theory, February, 2023

Design Frameworks for Hyper-Connected Social XRI Immersive Metaverse Environments.
IEEE Netw., 2023

Selecting Rotation Constants on SIMON-Type Ciphers.
J. Database Manag., 2023

New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

Extending the Metaverse: Hyper-Connected Smart Environments with Mixed Reality and the Internet of Things.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

Cross-Reality for Extending the Metaverse: Designing Hyper-Connected Immersive Environments with XRI.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

2022
Research on the Security Level of μ2 against Impossible Differential cryptanalysis.
KSII Trans. Internet Inf. Syst., 2022

Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher.
J. Inf. Secur. Appl., 2022

Fault attacks on authenticated encryption modes for GIFT.
IET Inf. Secur., 2022

The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method.
IACR Cryptol. ePrint Arch., 2022

Practical Attacks on the Full-round FRIET.
IACR Cryptol. ePrint Arch., 2022

Internet Of Rights(IOR) In Role Based Block Chain.
CoRR, 2022

Improved Topological Optimization Method Based on Particle Swarm Optimization Algorithm.
IEEE Access, 2022

Extended Reality and Internet of Things for Hyper-Connected Metaverse Environments.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022

Extended-XRI Body Interfaces for Hyper-Connected Metaverse Environments.
Proceedings of the IEEE Games, Entertainment, Media Conference, 2022

2021
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks.
J. Inf. Secur. Appl., 2021

Breaking LWC candidates: sESTATE and Elephant in quantum setting.
Des. Codes Cryptogr., 2021

Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher.
Comput. J., 2021

Improved Guess and Determine attack on the MASHA stream cipher.
Sci. China Inf. Sci., 2021

An XRI Mixed-Reality Internet-of-Things Architectural Framework Toward Immersive and Adaptive Smart Environments.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2021

2020
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property.
IACR Trans. Symmetric Cryptol., 2020

Differential attacks on reduced-round SNOW 3G and SNOW 3G<sup>⊕</sup>.
IET Inf. Secur., 2020

Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity.
IACR Cryptol. ePrint Arch., 2020

On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function.
IACR Cryptol. ePrint Arch., 2020

Exploring a Mixed Reality Framework for the Internet-of-Things: Toward Visualization and Interaction with Hybrid Objects and Avatars.
Proceedings of the 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2020

Toward Mixed Reality Hybrid Objects with IoT Avatar Agents.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

A New General Method of Searching for Cubes in Cube Attacks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

On the Structure Property of PCR's Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.
Secur. Commun. Networks, 2019

Complete analysis of Simon's quantum algorithm with additional collisions.
Quantum Inf. Process., 2019

Cryptanalysis of the Authentication in ACORN.
KSII Trans. Internet Inf. Syst., 2019

Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1.
IET Inf. Secur., 2019

A Practical Method to Recover Exact Superpoly in Cube Attack.
IACR Cryptol. ePrint Arch., 2019

Real-time state recovery attack against MORUS in nonce-misuse setting.
Sci. China Inf. Sci., 2019

MILP-aided Method of Searching Division Property Using Three Subsets and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Improved Conditional Differential Attacks on Round-Reduced Grain v1.
KSII Trans. Internet Inf. Syst., 2018

On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR.
Int. J. Found. Comput. Sci., 2018

Security evaluation on Simeck against zero-correlation linear cryptanalysis.
IET Inf. Secur., 2018

MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets.
IACR Cryptol. ePrint Arch., 2018

2017
On Equivalence with Output Sequence of Grain Model.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers.
Secur. Commun. Networks, 2016

Zero Correlation Linear Cryptanalysis on LEA Family Ciphers.
J. Commun., 2016

Impossible Differential Cryptanalysis on DVB-CSA.
KSII Trans. Internet Inf. Syst., 2016

Differential distribution properties of the SIMON block cipher family.
Proceedings of the International Conference on Computer, 2016

2015
Improved conditional differential cryptanalysis.
Secur. Commun. Networks, 2015

Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.
Pervasive Mob. Comput., 2015

Distinguishing attack on common scrambling algorithm.
Int. Arab J. Inf. Technol., 2015

Cryptanalysis of WG Family of Stream Ciphers.
Comput. J., 2015

New Related Key Attacks on the RAKAPOSHI Stream Cipher.
Proceedings of the Information Security Practice and Experience, 2015

2014
Cryptanalysis of Lightweight WG-8 Stream Cipher.
IEEE Trans. Inf. Forensics Secur., 2014

Cryptanalysis of Loiss Stream Cipher-Revisited.
J. Appl. Math., 2014

New Treatment of the BSW Sampling and Its Applications to Stream Ciphers.
IACR Cryptol. ePrint Arch., 2014

2013
Related Key Chosen IV Attack on Grain-128a Stream Cipher.
IEEE Trans. Inf. Forensics Secur., 2013

Cryptanalysis of MICKEY family of stream ciphers.
Secur. Commun. Networks, 2013

Independent component analysis-based multimodal classification of Alzheimer's disease versus healthy controls.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2012
New Results of Related-key Attacks on All Py-Family of Stream Ciphers.
J. Univers. Comput. Sci., 2012

Real Time Related Key Attack on Hummingbird-2.
KSII Trans. Internet Inf. Syst., 2012

Cryptanalysis of RAKAPOSHI Stream Cipher.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of Loiss Stream Cipher.
Comput. J., 2012


  Loading...