Qian Guo

Orcid: 0000-0003-0930-3174

Affiliations:
  • Lund University, Department of Electrical and Information Technology, Sweden (PhD 2017)
  • University of Bergen, Department of Informatics, Selmer Center, Norway (former)
  • Université catholique de Louvain, Louvain-la-Neuve, Begium (2017)


According to our database1, Qian Guo authored at least 44 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2024

2023
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms.
Cryptogr. Commun., March, 2023

Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Cache-Timing Attack Against HQC.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023

A New Sieving-Style Information-Set Decoding Algorithm.
IACR Cryptol. ePrint Arch., 2023

2022
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator.
IEEE Trans. Inf. Theory, 2022

A Key-Recovery Side-Channel Attack on Classic McEliece Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

A Key-Recovery Side-Channel Attack on Classic McEliece.
IACR Cryptol. ePrint Arch., 2022

Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber.
IACR Cryptol. ePrint Arch., 2022

2021
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM.
IACR Cryptol. ePrint Arch., 2021

Improvements on Making BKW Practical for Solving LWE.
Cryptogr., 2021

On the Sample Complexity of solving LWE using BKW-Style Algorithms.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Solving LPN Using Covering Codes.
J. Cryptol., 2020

A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM.
IACR Cryptol. ePrint Arch., 2020

Making the BKW Algorithm Practical for LWE.
IACR Cryptol. ePrint Arch., 2020

A New Decryption Failure Attack Against HQC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
A Key Recovery Reaction Attack on QC-MDPC.
IEEE Trans. Inf. Theory, 2019

On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving.
IEEE Trans. Inf. Theory, 2019

A new birthday-type algorithm for attacking the fresh re-keying countermeasure.
Inf. Process. Lett., 2019

A Novel CCA Attack using Decryption Errors against LAC.
IACR Cryptol. ePrint Arch., 2019

A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke.
IACR Cryptol. ePrint Arch., 2019

Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.
Adv. Math. Commun., 2019

Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Cryptol. ePrint Arch., 2018

Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
A Reaction Attack on the QC-LDPC McEliece Cryptosystem.
IACR Cryptol. ePrint Arch., 2017

Information set decoding with soft information and some cryptographic applications.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Coded-BKW with Sieving.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems.
PhD thesis, 2016

A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.
IACR Cryptol. ePrint Arch., 2016

Coded-BKW: Solving LWE Using Lattice Codes.
IACR Cryptol. ePrint Arch., 2016

A p-ary MDPC scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial.
IEEE Trans. Inf. Theory, 2015

2014
An Average-Case Efficient Algorithm on Testing the Identity of Boolean Functions in Trace Representation.
IEICE Trans. Inf. Syst., 2014

2013
An efficient interpolation-based systematic encoder for low-rate Blaum-Roth codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
A novel elementary construction of matching vectors.
Inf. Process. Lett., 2012

An Efficient Interpolation Based Erasure-Only Decoder for High-Rate Reed-Solomon Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
On systematic encoding for Blaum-Roth codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011


  Loading...