Publications
Conference & Journal Papers, Preprint/Archive, Misc
2024
Y. Chen, X. Dong, J. Guo, Y. Shen, A. Wang, X. Wang
Hard-Label Cryptanalytic Extraction of Neural Network Models
Advances in Cryptology - ASIACRYPT 2024
doi-eprintZ. Bao, J. Guo, S. Li, P. Pham
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm
Australian Conference on Information Security and Privacy - ACISP 2024
doi-eprintS. Chen, J. Guo, E. List, D. Shi, T. Zhang
Diving Deep into the Preimage Security of AES-like Hashing
Advances in Cryptology - EUROCRYPT 2024
doi-eprintX. Dong, J. Guo, S. Li, P. Pham, T. Zhang
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Fast Software Encryption - FSE 2024 / ToSC 2024 Issue 1
doi-eprint
2023
H. Li, L. He, S. Chen, J. Guo, W. Qiu
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach
Fast Software Encryption - FSE 2024 / ToSC 2023 Issue 3
doi-eprintS. Chen, C. Guo, J. Guo, L. Liu, M. Wang, P. Wei, Z. Xu
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives
Fast Software Encryption - FSE 2024 / ToSC 2023 Issue 2
doi-eprint
2022
S. Chen, C. Guo, J. Guo, L. Liu, M. Wang, P. Wei, Z. Xu
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures
Internatonal Conference on Information Security and Cryptology - ICISC 2022
doi-archiveZ. Bao, J. Guo, S. Li, P. Pham
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings
International Conference on Network and System Security - NSS 2022
doi-eprint
J. Guo, G. Liu, L. Song, Y. Tu
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3
Advances in Cryptology - ASIACRYPT 2022
doi-eprintZ. Bao, J. Guo, M. Liu, L. Ma, Y. Tu
Enhancing Differential-Neural Cryptanalysis
Advances in Cryptology - ASIACRYPT 2022
doi-eprintZ. Bao, J. Guo, D. Shi, Y. Tu
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
Advances in Cryptology - CRYPTO 2022
doi-eprintX. Dong, J. Guo, S. Li, P. Pham
Triangulating Rebound Attack on AES-like Hashing
Advances in Cryptology - CRYPTO 2022
doi-eprintJ. Guo, L. Song, H. Wang
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
Australian Conference on Information Security and Privacy - ACISP 2022
doi-eprint
Best Paper Award
2021
Z. Bao, X. Dong, J. Guo, Z. Li, D. Shi, S. Sun, X. Wang
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Advances in Cryptology - EUROCRYPT 2021
doi-eprint-news-videoB. Sun, K. Li, J. Guo, L. Qu
New Constructions of Complete Permutations
IEEE Transactions on Information Theory
doi
2020
Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
Advances in security research in the Asiacrypt region
Communications of the ACM, Volume 63(4): 76-81 (2020)C. Guo, J. Guo, E. List, L. Song
Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT)
Advances in Cryptology - ASIACRYPT 2020
doi-slides-videoZ. Bao, C. Guo, J. Guo, L. Song
TNT: How to Tweak a Block Cipher
Advances in Cryptology - EUROCRYPT 2020
doi-videoZ. Bao, J. Guo, E. List
Extended Truncated-differential Distinguishers on Round-reduced AES
Fast Software Encryption - FSE 2020 / ToSC 2020 Issue 3
doi-eprint-slides-video
2019
W. Zhang, M. Cao, J. Guo, E. Pasalic
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4
doi-videoZ. Bao, L. Ding, J. Guo, H. Wang, W. Zhang
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4
doi-eprint-videoZ. Bao, J. Guo, T. Iwata, K. Minematsu
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 2
doi-eprint-code-slides-videoZ. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang
Generic Attacks on Hash Combiners
Journal of Cryptology 2019
doi-eprint-webJ. Guo, G. Liao, G. Liu, M. Liu, K. Qiao, L. Song
Practical Collision Attacks against Round-Reduced SHA-3
Journal of Cryptology 2019
doi-eprint-webZ. Bao, J. Guo, S. Ling, Y. Sasaki
PEIGEN — a Platform for Evaluation, Implementation, and Generation of S-boxes
Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
doi-eprint-webR. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
doi-eprint
2018
L. Song, J. Guo, D. Shi, S. Ling
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
Advances in Cryptology - ASIACRYPT 2018
doi-eprint-[codes verify & model]L. Song, J. Guo
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Fast Software Encryption - FSE 2019 / ToSC 2018 Issue 3
doi-eprint-codeZ. Bao, J. Guo, L. Wang
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
doi-eprintC. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song
Key-Recovery Attacks on Full Kravatte
Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
The Best Paper Award, invited to JoC
doi
2017
S. Banik, T. Isobe, T. Cui, J. Guo
Some Cryptanalysis Results on Lizard
Fast Software Encryption - FSE 2018 / ToSC 2017 Issue 4
doiZ. Bao, L. Wang, J. Guo, D. Gu
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
Advances in Cryptology - CRYPTO 2017
doi-eprintL. Song, G. Liao, J. Guo
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
Advances in Cryptology - CRYPTO 2017
doi-eprint-GPU Implementation of KeccakK. Qiao, L. Song, M. Liu, J. Guo
New Collision Attacks on Round-Reduced Keccak
Advances in Cryptology - EUROCRYPT 2017
doi-eprint-slides
2016
J. Guo, J. Jean, I. Nikolić, Y. Sasaki
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Fast Software Encryption - FSE 2017 / ToSC 2016 Issue 2
doi-eprint-code-slidesJ. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Fast Software Encryption - FSE 2017 / ToSC 2016 Issue 1
doi-eprint-codeL. Wang, J. Guo, G. Zhang, J. Zhao, D. Gu
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
Advances in Cryptology - ASIACRYPT 2016
doi-eprintJ. Guo, M. Liu, L. Song
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
Advances in Cryptology - ASIACRYPT 2016
doi-eprintB. Sun, M. Liu, J. Guo, L. Qu, V. Rijmen
New Insights on AES-Like SPN Ciphers
Advances in Cryptology - CRYPTO 2016
doi-eprintB. Sun, M. Liu, J. Guo, V. Rijmen, R. Li
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Advances in Cryptology - EUROCRYPT 2016
doi-eprint-slides
2015
J. Guo, J. Jean, I. Nikolić, Y. Sasaki
Extended Meet-in-the-Middle Attacks on Some Feistel Constructions
Designs, Codes, and Cryptography
doi-paper
Remark: a preliminary version appeared in Asiacrypt 2014.J. Guo, C. Su, W. Yap
An Improved Preimage Attack against HAVAL-3
Information Processing Letters
doi-paper
Remark: a preliminary version has appeared in my Ph.D thesis, a few errors have been corrected here.
2014
J. Guo, J. Jean, I. Nikolić, Y. Sasaki
Meet-in-the-Middle Attacks on Generic Feistel Constructions
Advances in Cryptology - ASIACRYPT 2014. 55/255
doi-paper-slides-codeJ. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang
The Usage of Counter Revisisted: Second-Preimage Attack on New Russian Standardized Hash Function
Selected Areas in Cryptography - SAC 2014. 22/104
doi-paper-eprint-slides
The first prize of STREEBOG competitionJ. Guo, T. Peyrin, Y. Sasaki, L. Wang
Updates on Generic Attacks against HMAC and NMAC
Advances in Cryptology - CRYPTO 2014. 60/227
doi-paper-slidesJ. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Fast Software Encryption - FSE 2014. 31/99
doi-paper-eprint-slides-codeT. Iwata, K. Minematsu, J. Guo, S. Morioka
CLOC: Authenticated Encryption for Short Input
Fast Software Encryption - FSE 2014. 31/99
doi-paper-eprint-slidesJ. Guo, P. Karpman, I. Nikolić, L. Wang, S. Wu
Analysis of BLAKE2
The Cryptographer's Track at RSA Conference - CT-RSA 2014. 25/66
doi-paper-eprint-slidesJ. Guo, J. Jean, T. Peyrin, L. Wang
Breaking POET Authentication with a Single Query
eprintJ. Guo
A program confirmation of the diamond construction by Kortelainen and Kortelainen
code
2013
J. Guo, Y. Sasaki, L. Wang, S. Wu
Cryptanalysis of HMAC/NMAC-Whirlppol
Advances in Cryptology - ASIACRYPT 2013. 55/262
doi-paper-eprint-slidesR. Benadjila, J. Guo, V. Lomné, T. Peyrin
Implementing Lightweight Block Ciphers on x86 Architectures
Selected Areas in Cryptography - SAC 2013. 26/97
doi-paper-eprint-slides-code webiste or local copyJ. Guo, I. Nikolić, T. Peyrin, L. Wang
Cryptanalysis of Zorro
eprint
2012
J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Progress in Cryptology - AfricaCrypt 2012
doi-paper-eprint-slidesA. Duc, J. Guo, T. Peyrin, L. Wei
Unaligned Rebound Attack - Application to Keccak
Fast Software Encryption - FSE 2012. 24/90
doi-paper-eprint-slidesS. Wu, D. Feng, W. Wu, J. Guo, L. Dong, J. Zou
(Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
Fast Software Encryption - FSE 2012. 24/90
doi-paper-eprint-slides
2011
J. Guo, T. Peyrin, A. Poschmann, M. Robshaw
The LED Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2011. 32/119
doi-site-paper-eprint-slidesJ. Guo, T. Peyrin, A. Poschmann
The PHOTON Family of Lightweight Hash Functions
ECRYPT II Hash Workshop 2011.
Advances in Cryptology - CRYPTO 2011. 42/230
doi-site-paper-eprint-slides-video
ISO/IEC 29192-5:2016L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, S. Ling
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
Australian Conference on Information Security and Privacy - ACISP 2011. 34/103
doi-paper-eprint-slidesJ. Guo
Analysis of Cryptographic Hash Functions
PhD Thesis, Nanyang Technological University, Singapore, 2011
2010
J. Guo, S. Thomsen
Deterministic Differential Properties of the Compression Function of BMW
Second SHA-3 Conference, August 2010;
Selected Areas in Cryptography - SAC 2010. 24/90
doi-paper-slides-codeJ. Guo, S. Ling, C. Rechberger, H. Wang
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Advances in Cryptology - ASIACRYPT 2010. 35/227
doi-paper-eprint-slides-codeJ.-P. Aumasson, J. Guo, S. Knellwolf, K. Matusiewicz, W. Meier
Differential and Invertibility Properties of BLAKE
Fast Software Encryption - FSE 2010. 21/67
doi-paper-eprint-slides-near-collision
2009
K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang
Preimages for Step-Reduced SHA-2
Advances in Cryptology - ASIACRYPT 2009. 42/300
doi-eprint-slidesJ. Guo, K. Matusiewicz, L. Knudsen, S. Ling, H. Wang
Practical Pseudo-Collisions for Hash Functions ARIRANG-224/384
Selected Areas in Cryptography - SAC 2009. 28/86
doi-paper-eprint-slidesA. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk, H. Wang
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption - FSE 2009. 24/76
doi-paper-slides-submission
2008
H. Sun, M. Wu, R. Steinfeld, J. Guo, H. Wang
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Cryptology And Network Security - CANS 2008. 27/73
doi-paper-eprint-slidesH. Sun, M. Wu, H. Wang, J. Guo
On the Improvement of the BDF Attack on LSBS-RSA
Australian Conference on Information Security and Privacy - ACISP 2008. 33/111
doi-paper-slidesR. Steinfeld, S. Contini, K. Matusiewicz, J. Pieprzyk, J. Guo, S. Ling, H. Wang
Cryptanalysis of LASH
Fast Software Encryption - FSE 2008. 30/72
doi-paper-eprint-slides
2007 (Undergraduate)
J. Guo, S. Zhou
Dynamic Assignment of Zones to Servers for Large-Scale Distributed Virtual Environments
Australian Journal of Intelligent Information Processing Systems, Vol. 9, No. 4, 2007.
paperJ. Guo
Enhancing the Interactivity of Large-scale Distributed Virtual Environments
Report for Undergraduate Final Year Project, NTU, 2007.
thesis
Notes: Authors with underline are those who presented the paper at the conference. xxx/xxx denotes number of accepted papers out of submissions. My DBLP entry is here and google scholar entry is here; for IACR publications, I am available in its database in this entry. Acceptance rate of IACR conferences and workshops is available here. I think it helps a lot for Ph.D students (who are the majority of the cryptanalysis community) to have the source codes used in the differential/result search, hence most of source codes written by myself are online (without much comments though), I encourage you to follow too.