Conference & Journal Papers, Preprint/Archive, Misc2021 - Z. Bao, X. Dong, J. Guo, Z. Li, D. Shi, S. Sun, X. Wang
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing Advances in Cryptology - EUROCRYPT 2021 doi-eprint
2020 - Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
Advances in security research in the Asiacrypt region Communications of the ACM, Volume 63(4): 76-81 (2020)
- C. Guo, J. Guo, E. List, L. Song
Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) Advances in Cryptology - ASIACRYPT 2020 doi-slides-video
- Z. Bao, C. Guo, J. Guo, L. Song
TNT: How to Tweak a Block Cipher Advances in Cryptology - EUROCRYPT 2020 doi-video
- Z. Bao, J. Guo, E. List
Extended Truncated-differential Distinguishers on Round-reduced AES Fast Software Encryption - FSE 2020 / ToSC 2020 Issue 3 doi-eprint-slides-video
2019 - W. Zhang, M. Cao, J. Guo, E. Pasalic
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4 doi-video
- Z. Bao, L. Ding, J. Guo, H. Wang, W. Zhang
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4 doi-eprint-video
- Z. Bao, J. Guo, T. Iwata, K. Minematsu
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 2 doi-eprint-code-slides-video
- Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang
Generic Attacks on Hash Combiners Journal of Cryptology 2019 doi-eprint-web
- J. Guo, G. Liao, G. Liu, M. Liu, K. Qiao, L. Song
Practical Collision Attacks against Round-Reduced SHA-3 Journal of Cryptology 2019 doi-eprint-web
- Z. Bao, J. Guo, S. Ling, Y. Sasaki
PEIGEN — a Platform for Evaluation, Implementation, and Generation of S-boxes Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1 doi-eprint-web
- R. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1 doi-eprint
2018 - L. Song, J. Guo, D. Shi, S. Ling
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions Advances in Cryptology - ASIACRYPT 2018 doi-eprint-[codes verify & model]
- L. Song, J. Guo
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP Fast Software Encryption - FSE 2019 / ToSC 2018 Issue 3 doi-eprint-code
- Z. Bao, J. Guo, L. Wang
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1 doi-eprint
- C. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song
Key-Recovery Attacks on Full Kravatte Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1 The Best Paper Award, invited to JoC doi
2017 - S. Banik, T. Isobe, T. Cui, J. Guo
Some Cryptanalysis Results on Lizard Fast Software Encryption - FSE 2018 / ToSC 2017 Issue 4 doi
- Z. Bao, L. Wang, J. Guo, D. Gu
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Advances in Cryptology - CRYPTO 2017 doi-eprint
- L. Song, G. Liao, J. Guo
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Advances in Cryptology - CRYPTO 2017 doi-eprint-GPU Implementation of Keccak
- K. Qiao, L. Song, M. Liu, J. Guo
New Collision Attacks on Round-Reduced Keccak Advances in Cryptology - EUROCRYPT 2017 doi-eprint-slides
2016 - J. Guo, J. Jean, I. Nikolić, Y. Sasaki
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions Fast Software Encryption - FSE 2017 / ToSC 2016 Issue 2 doi-eprint-code-slides
- J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs Fast Software Encryption - FSE 2017 / ToSC 2016 Issue 1 doi-eprint-code
- L. Wang, J. Guo, G. Zhang, J. Zhao, D. Gu
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers Advances in Cryptology - ASIACRYPT 2016 doi-eprint
- J. Guo, M. Liu, L. Song
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak Advances in Cryptology - ASIACRYPT 2016 doi-eprint
- B. Sun, M. Liu, J. Guo, L. Qu, V. Rijmen
New Insights on AES-Like SPN Ciphers Advances in Cryptology - CRYPTO 2016 doi-eprint
- B. Sun, M. Liu, J. Guo, V. Rijmen, R. Li
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis Advances in Cryptology - EUROCRYPT 2016 doi-eprint-slides
2015 - J. Guo, J. Jean, I. Nikolić, Y. Sasaki
Extended Meet-in-the-Middle Attacks on Some Feistel Constructions Designs, Codes, and Cryptography doi-paper Remark: a preliminary version appeared in Asiacrypt 2014.
- J. Guo, C. Su, W. Yap
An Improved Preimage Attack against HAVAL-3 Information Processing Letters doi-paper Remark: a preliminary version has appeared in my Ph.D thesis, a few errors have been corrected here.
2014 - J. Guo, J. Jean, I. Nikolić, Y. Sasaki
Meet-in-the-Middle Attacks on Generic Feistel Constructions Advances in Cryptology - ASIACRYPT 2014. 55/255 doi-paper-slides-code
- J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang
The Usage of Counter Revisisted: Second-Preimage Attack on New Russian Standardized Hash Function Selected Areas in Cryptography - SAC 2014. 22/104 doi-paper-eprint-slides The first prize of STREEBOG competition
- J. Guo, T. Peyrin, Y. Sasaki, L. Wang
Updates on Generic Attacks against HMAC and NMAC Advances in Cryptology - CRYPTO 2014. 60/227 doi-paper-slides
- J. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Fast Software Encryption - FSE 2014. 31/99 doi-paper-eprint-slides-code
- T. Iwata, K. Minematsu, J. Guo, S. Morioka
CLOC: Authenticated Encryption for Short Input Fast Software Encryption - FSE 2014. 31/99 doi-paper-eprint-slides
2013 - J. Guo, I. Nikolić, T. Peyrin, L. Wang
Cryptanalysis of Zorro eprint
2012
- J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Progress in Cryptology - AfricaCrypt 2012
doi-paper-eprint-slides
- A. Duc, J. Guo, T. Peyrin, L. Wei
Unaligned Rebound Attack - Application to Keccak
Fast Software Encryption - FSE 2012. 24/90
doi-paper-eprint-slides
- S. Wu, D. Feng, W. Wu, J. Guo, L. Dong, J. Zou
(Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
Fast Software Encryption - FSE 2012. 24/90
doi-paper-eprint-slides
2011
- J. Guo, T. Peyrin, A. Poschmann, M. Robshaw
The LED Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2011. 32/119
doi-site-paper-eprint-slides
- J. Guo, T. Peyrin, A. Poschmann
The PHOTON Family of Lightweight Hash Functions
ECRYPT II Hash Workshop 2011.
Advances in Cryptology - CRYPTO 2011. 42/230
doi-site-paper-eprint-slides-video ISO/IEC 29192-5:2016
- L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, S. Ling
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
Australian Conference on Information Security and Privacy - ACISP 2011. 34/103
doi-paper-eprint-slides
- J. Guo
Analysis of Cryptographic Hash Functions
PhD Thesis, Nanyang Technological University, Singapore, 2011
2010
- J. Guo, S. Thomsen
Deterministic Differential Properties of the Compression Function of BMW
Second SHA-3 Conference, August 2010;
Selected Areas in Cryptography - SAC 2010. 24/90
doi-paper-slides-code
- J. Guo, S. Ling, C. Rechberger, H. Wang
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Advances in Cryptology - ASIACRYPT 2010. 35/227
doi-paper-eprint-slides-code
- J.-P. Aumasson, J. Guo, S. Knellwolf, K. Matusiewicz, W. Meier
Differential and Invertibility Properties of BLAKE
Fast Software Encryption - FSE 2010. 21/67
doi-paper-eprint-slides-near-collision
2009
- K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang
Preimages for Step-Reduced SHA-2
Advances in Cryptology - ASIACRYPT 2009. 42/300
doi-eprint-slides
- J. Guo, K. Matusiewicz, L. Knudsen, S. Ling, H. Wang
Practical Pseudo-Collisions for Hash Functions ARIRANG-224/384
Selected Areas in Cryptography - SAC 2009. 28/86
doi-paper-eprint-slides
- A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk, H. Wang
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption - FSE 2009. 24/76
doi-paper-slides-submission
2008
- H. Sun, M. Wu, R. Steinfeld, J. Guo, H. Wang
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Cryptology And Network Security - CANS 2008. 27/73
doi-paper-eprint-slides
- H. Sun, M. Wu, H. Wang, J. Guo
On the Improvement of the BDF Attack on LSBS-RSA
Australian Conference on Information Security and Privacy - ACISP 2008. 33/111
doi-paper-slides
- R. Steinfeld, S. Contini, K. Matusiewicz, J. Pieprzyk, J. Guo, S. Ling, H. Wang
Cryptanalysis of LASH
Fast Software Encryption - FSE 2008. 30/72
doi-paper-eprint-slides
2007 (Undergraduate)
- J. Guo, S. Zhou
Dynamic Assignment of Zones to Servers for Large-Scale Distributed Virtual Environments
Australian Journal of Intelligent Information Processing Systems, Vol. 9, No. 4, 2007.
paper
- J. Guo
Enhancing the Interactivity of Large-scale Distributed Virtual Environments
Report for Undergraduate Final Year Project, NTU, 2007.
thesis
Notes: Authors with underline are those who presented the paper at the conference. xxx/xxx denotes number of accepted papers out of submissions. My DBLP entry is here and google scholar entry is here; for IACR publications, I am available in its database in this entry. Acceptance rate of IACR conferences and workshops is available here. I think it helps a lot for Ph.D students (who are the majority of the cryptanalysis community) to have the source codes used in the differential/result search, hence most of source codes written by myself are online (without much comments though), I encourage you to follow too.
|
|