Conference & Journal Papers, Preprint/Archive, Misc

  • Z. Bao, X. Dong, J. Guo, Z. Li,  D. Shi, S. Sun, X. Wang
    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

  • C. Guo, J. Guo, E. List, L. Song
    Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT)
    Advances in Cryptology - ASIACRYPT 2020

  • Z. Bao, C. Guo, J. Guo, L. Song
    TNT: How to Tweak a Block Cipher
    Advances in Cryptology - EUROCRYPT 2020

  • Z. Bao, J. Guo, E. List
    Extended Truncated-differential Distinguishers on Round-reduced AES
    Fast Software Encryption - FSE 2020 / ToSC 2020 Issue 3

  • W. Zhang, M. Cao, J. Guo, E. Pasalic
    Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4

  • Z. Bao, L. Ding, J. Guo, H. Wang, W. Zhang
    Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4

  • Z. Bao, J. Guo, T. Iwata, K. Minematsu
    ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 2

  • Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang
    Generic Attacks on Hash Combiners
    Journal of Cryptology 2019

  • J. Guo, G. Liao, G. Liu, M. Liu, K. Qiao, L. Song
    Practical Collision Attacks against Round-Reduced SHA-3
    Journal of Cryptology 2019

  • Z. Bao, J. Guo, S. Ling, Y. Sasaki
    PEIGEN — a Platform for Evaluation, Implementation, and Generation of S-boxes
    Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1

  • R. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo
    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
  • L. Song, J. Guo, D. Shi, S. Ling
    New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
    Advances in Cryptology - ASIACRYPT 2018
    doi-eprint-[codes verify & model]

  • L. Song, J. Guo
    Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
    Fast Software Encryption - FSE 2019 / ToSC 2018 Issue 3

  • Z. Bao, J. Guo, L. Wang
    Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
    Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1

  • C. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song
    Key-Recovery Attacks on Full Kravatte
    Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
    The Best Paper Award, invited to JoC
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    Fast Software Encryption - FSE 2017 ToSC 2016 Issue 2

  • J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim
    Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
    Fast Software Encryption - FSE 2017 ToSC 2016 Issue 1

  • L. Wang, J. Guo, G. Zhang, J. Zhao, D. Gu
    How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
    Advances in Cryptology - ASIACRYPT 2016

  • J. Guo, M. Liu, L. Song
    Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
    Advances in Cryptology - ASIACRYPT 2016

  • B. Sun, M. Liu, J. Guo, L. Qu, V. Rijmen
    New Insights on AES-Like SPN Ciphers
    Advances in Cryptology - CRYPTO 2016

  • B. Sun, M. Liu, J. Guo, V. Rijmen, R. Li
    Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
    Advances in CryptologyEUROCRYPT 2016
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Extended Meet-in-the-Middle Attacks on Some Feistel Constructions
    Designs, Codes, and Cryptography

    Remark: a preliminary version appeared in Asiacrypt 2014.

  • J. Guo, C. Su, W. Yap
    An Improved Preimage Attack against HAVAL-3
    Information Processing Letters
    Remark: a preliminary version has appeared in my Ph.D thesis, a few errors have been corrected here.
  • T. Iwata, K. Minematsu, J. Guo, S. Morioka
    CLOC: Authenticated Encryption for Short Input
    Fast Software Encryption - FSE 2014. 31/99
  • doi-paper-eprint-slides
  • J. Guo, I. Nikolić, T. Peyrin, L. Wang
    Cryptanalysis of Zorro
  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan
    SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
    Progress in Cryptology - AfricaCrypt 2012

  • A. Duc, J. Guo, T. Peyrin, L. Wei
    Unaligned Rebound Attack - Application to Keccak
    Fast Software Encryption - FSE 2012. 24/90

  • S. Wu, D. Feng, W. Wu, J. Guo, L. Dong, J. Zou
    (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
    Fast Software Encryption - FSE 2012. 24/90
2011 2010
  • K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang
    Preimages for Step-Reduced SHA-2
    Advances in Cryptology - ASIACRYPT 2009. 42/300

  • J. Guo, K. Matusiewicz, L. Knudsen, S. Ling, H. Wang
    Practical Pseudo-Collisions for Hash Functions ARIRANG-224/384
    Selected Areas in Cryptography - SAC 2009. 28/86

  • A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk, H. Wang
    Cryptanalysis of the LAKE Hash Family
    Fast Software Encryption - FSE 2009. 24/76

  • H. Sun, M. Wu, R. Steinfeld, J. Guo, H. Wang
    Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
    Cryptology And Network Security - CANS 2008. 27/73

  • H. Sun, M. Wu, H. Wang, J. Guo
    On the Improvement of the BDF Attack on LSBS-RSA
    Australian Conference on Information Security and Privacy - ACISP 2008. 33/111

  • R. Steinfeld, S. Contini, K. Matusiewicz, J. Pieprzyk, J. Guo, S. Ling, H. Wang
    Cryptanalysis of LASH
    Fast Software Encryption - FSE 2008. 30/72

2007 (Undergraduate)
  • J. Guo, S. Zhou
    Dynamic Assignment of Zones to Servers for Large-Scale Distributed Virtual Environments
    Australian Journal of Intelligent Information Processing Systems, Vol. 9, No. 4, 2007.

  • J. Guo
    Enhancing the Interactivity of Large-scale Distributed Virtual Environments
    Report for Undergraduate Final Year Project, NTU, 2007.

Notes: Authors with underline are those who presented the paper at the conference. xxx/xxx denotes number of accepted papers out of submissions. My DBLP entry is here and google scholar entry is here; for IACR publications, I am available in its database in this entry. Acceptance rate of IACR conferences and workshops is available here. I think it helps a lot for Ph.D students (who are the majority of the cryptanalysis community) to have the source codes used in the differential/result search, hence most of source codes written by myself are online (without much comments though), I encourage you to follow too.