Jian Guo
Jian Guo
Verified email at ntu.edu.sg - Homepage
TitleCited byYear
The LED Block Cipher
J Guo, T Peyrin, A Poschmann, M Robshaw
Cryptographic Hardware and Embedded Systems–CHES 2011, 326-341, 2011
681*2011
The PHOTON Family of Lightweight Hash Functions
J Guo, T Peyrin, A Poschmann
Advances in Cryptology–CRYPTO 2011, 222-239, 2011
3272011
Preimages for Step-Reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
Advances in Cryptology–ASIACRYPT 2009, 578-597, 2009
1182009
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
Advances in Cryptology-ASIACRYPT 2010, 56-75, 2010
1032010
Unaligned Rebound Attack: Application to Keccak
A Duc, J Guo, T Peyrin, L Wei
Fast Software Encryption, 402-421, 2012
562012
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling
Australasian Conference on Information Security and Privacy, 433-438, 2011
492011
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology 2016 (1), 33-56, 2016
39*2016
CLOC: Authenticated Encryption for Short Input
T Iwata, K Minematsu, J Guo, S Morioka
Fast Software Encryption, 149-167, 2014
352014
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
S Wu, D Feng, W Wu, J Guo, L Dong, J Zou
Fast Software Encryption, 127-145, 2012
292012
Differential and Invertibility Properties of BLAKE
JP Aumasson, J Guo, S Knellwolf, K Matusiewicz, W Meier
Fast Software Encryption, 318-332, 2010
28*2010
Cryptanalysis of Zorro
J Guo, I Nikolic, T Peyrin, L Wang
IACR Cryptology ePrint Archive 2013, 713, 2013
252013
Analysis of BLAKE2
J Guo, P Karpman, I Nikolić, L Wang, S Wu
Cryptographers’ Track at the RSA Conference, 402-423, 2014
24*2014
Meet-in-the-Middle Attacks on Generic Feistel Constructions
J Guo, J Jean, I Nikolić, Y Sasaki
Advances in Cryptology–ASIACRYPT 2014, 458-477, 2014
242014
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
J Guo, M Liu, L Song
Advances in Cryptology–ASIACRYPT 2016, 249-274, 2016
232016
SILC: SImple Lightweight CFB
T Iwata, K Minematsu, J Guo, S Morioka, E Kobayashi
Submission to the CAESAR competition, 2014
222014
Implementing Lightweight Block Ciphers on x86 Architectures
R Benadjila, J Guo, V Lomné, T Peyrin
Selected Areas in Cryptography--SAC 2013, 324-351, 2014
212014
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology – EUROCRYPT 2016, 196-213, 2016
182016
Updates on generic attacks against HMAC and NMAC
J Guo, T Peyrin, Y Sasaki, L Wang
Advances in Cryptology – CRYPTO 2014, 131-148, 2014
172014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
J Guo, J Jean, G Leurent, T Peyrin, L Wang
Selected Areas in Cryptography--SAC 2014, 195-211, 2014
162014
New Insights on AES-Like SPN Ciphers
B Sun, M Liu, J Guo, L Qu, V Rijmen
Advances in Cryptology - CRYPTO 2016, 605-624, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20