Publications

Conference & Journal Papers, Preprint/Archive, Misc

2021

  • Z. Bao, J. Guo, S. Li, P. Pham
    Quantum Multi-Collision Distinguishers
    eprint

  • Z. Bao, J. Guo, M. Liu, L. Ma,Y. Tu
    Conditional Differential-Neural Cryptanalysis
    eprint

  • Z. Bao, J. Guo, D. Shi, Y. Tu
    MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing
    eprint

  • Z. Bao, X. Dong, J. Guo, Z. Li, D. Shi, S. Sun, X. Wang
    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
    Advances in Cryptology - EUROCRYPT 2021
    doi-eprint-news-video

  • B. Sun, K. Li, J. Guo, L. Qu
    New Constructions of Complete Permutations
    IEEE Transactions on Information Theory
    doi

2020

  • Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
    Advances in security research in the Asiacrypt region
    Communications of the ACM, Volume 63(4): 76-81 (2020)

  • C. Guo, J. Guo, E. List, L. Song
    Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT)
    Advances in Cryptology - ASIACRYPT 2020
    doi-slides-video

  • Z. Bao, C. Guo, J. Guo, L. Song
    TNT: How to Tweak a Block Cipher
    Advances in Cryptology - EUROCRYPT 2020
    doi-video

  • Z. Bao, J. Guo, E. List
    Extended Truncated-differential Distinguishers on Round-reduced AES
    Fast Software Encryption - FSE 2020 / ToSC 2020 Issue 3
    doi-eprint-slides-video

2019

  • W. Zhang, M. Cao, J. Guo, E. Pasalic
    Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4
    doi-video

  • Z. Bao, L. Ding, J. Guo, H. Wang, W. Zhang
    Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4
    doi-eprint-video

  • Z. Bao, J. Guo, T. Iwata, K. Minematsu
    ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 2
    doi-eprint-code-slides-video

  • Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang
    Generic Attacks on Hash Combiners
    Journal of Cryptology 2019
    doi-eprint-web

  • J. Guo, G. Liao, G. Liu, M. Liu, K. Qiao, L. Song
    Practical Collision Attacks against Round-Reduced SHA-3
    Journal of Cryptology 2019
    doi-eprint-web

  • Z. Bao, J. Guo, S. Ling, Y. Sasaki
    PEIGEN — a Platform for Evaluation, Implementation, and Generation of S-boxes
    Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
    doi-eprint-web

  • R. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo
    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
    doi-eprint

2018

  • L. Song, J. Guo, D. Shi, S. Ling
    New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
    Advances in Cryptology - ASIACRYPT 2018
    doi-eprint-[codes verify & model]

  • L. Song, J. Guo
    Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
    Fast Software Encryption - FSE 2019 / ToSC 2018 Issue 3
    doi-eprint-code

  • Z. Bao, J. Guo, L. Wang
    Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
    Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
    doi-eprint

  • C. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song
    Key-Recovery Attacks on Full Kravatte
    Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
    The Best Paper Award, invited to JoC
    doi

2017

2016

  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    Fast Software Encryption - FSE 2017 / ToSC 2016 Issue 2
    doi-eprint-code-slides

  • J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim
    Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
    Fast Software Encryption - FSE 2017 / ToSC 2016 Issue 1
    doi-eprint-code

  • L. Wang, J. Guo, G. Zhang, J. Zhao, D. Gu
    How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
    Advances in Cryptology - ASIACRYPT 2016
    doi-eprint

  • J. Guo, M. Liu, L. Song
    Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
    Advances in Cryptology - ASIACRYPT 2016
    doi-eprint

  • B. Sun, M. Liu, J. Guo, L. Qu, V. Rijmen
    New Insights on AES-Like SPN Ciphers
    Advances in Cryptology - CRYPTO 2016
    doi-eprint

  • B. Sun, M. Liu, J. Guo, V. Rijmen, R. Li
    Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
    Advances in Cryptology - EUROCRYPT 2016
    doi-eprint-slides

2015

  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Extended Meet-in-the-Middle Attacks on Some Feistel Constructions
    Designs, Codes, and Cryptography
    doi-paper
    Remark: a preliminary version appeared in Asiacrypt 2014.

  • J. Guo, C. Su, W. Yap
    An Improved Preimage Attack against HAVAL-3
    Information Processing Letters
    doi-paper
    Remark: a preliminary version has appeared in my Ph.D thesis, a few errors have been corrected here.

2014

  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Meet-in-the-Middle Attacks on Generic Feistel Constructions
    Advances in Cryptology - ASIACRYPT 2014. 55/255
    doi-paper-slides-code

  • J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang
    The Usage of Counter Revisisted: Second-Preimage Attack on New Russian Standardized Hash Function
    Selected Areas in Cryptography - SAC 2014. 22/104
    doi-paper-eprint-slides
    The first prize of STREEBOG competition

  • J. Guo, T. Peyrin, Y. Sasaki, L. Wang
    Updates on Generic Attacks against HMAC and NMAC
    Advances in Cryptology - CRYPTO 2014. 60/227
    doi-paper-slides

  • J. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen
    Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
    Fast Software Encryption - FSE 2014. 31/99
    doi-paper-eprint-slides-code

  • T. Iwata, K. Minematsu, J. Guo, S. Morioka
    CLOC: Authenticated Encryption for Short Input
    Fast Software Encryption - FSE 2014. 31/99
    doi-paper-eprint-slides

  • J. Guo, P. Karpman, I. Nikolić, L. Wang, S. Wu
    Analysis of BLAKE2
    The Cryptographer's Track at RSA Conference - CT-RSA 2014. 25/66
    doi-paper-eprint-slides

  • J. Guo, J. Jean, T. Peyrin, L. Wang
    Breaking POET Authentication with a Single Query
    eprint

  • J. Guo
    A program confirmation of the diamond construction by Kortelainen and Kortelainen
    code

2013

  • J. Guo, Y. Sasaki, L. Wang, S. Wu
    Cryptanalysis of HMAC/NMAC-Whirlppol
    Advances in Cryptology - ASIACRYPT 2013. 55/262
    doi-paper-eprint-slides

  • R. Benadjila, J. Guo, V. Lomné, T. Peyrin
    Implementing Lightweight Block Ciphers on x86 Architectures
    Selected Areas in Cryptography - SAC 2013. 26/97
    doi-paper-eprint-slides-code webiste or local copy

  • J. Guo, I. Nikolić, T. Peyrin, L. Wang
    Cryptanalysis of Zorro
    eprint

2012

  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan
    SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
    Progress in Cryptology - AfricaCrypt 2012
    doi-paper-eprint-slides

  • A. Duc, J. Guo, T. Peyrin, L. Wei
    Unaligned Rebound Attack - Application to Keccak
    Fast Software Encryption - FSE 2012. 24/90
    doi-paper-eprint-slides

  • S. Wu, D. Feng, W. Wu, J. Guo, L. Dong, J. Zou
    (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
    Fast Software Encryption - FSE 2012. 24/90
    doi-paper-eprint-slides

2011

  • J. Guo, T. Peyrin, A. Poschmann, M. Robshaw
    The LED Block Cipher
    Cryptographic Hardware and Embedded Systems - CHES 2011. 32/119
    doi-site-paper-eprint-slides

  • J. Guo, T. Peyrin, A. Poschmann
    The PHOTON Family of Lightweight Hash Functions
    ECRYPT II Hash Workshop 2011.
    Advances in Cryptology - CRYPTO 2011. 42/230
    doi-site-paper-eprint-slides-video
    ISO/IEC 29192-5:2016

  • L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, S. Ling
    Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
    Australian Conference on Information Security and Privacy - ACISP 2011. 34/103
    doi-paper-eprint-slides

  • J. Guo
    Analysis of Cryptographic Hash Functions
    PhD Thesis, Nanyang Technological University, Singapore, 2011

2010

  • J. Guo, S. Thomsen
    Deterministic Differential Properties of the Compression Function of BMW
    Second SHA-3 Conference, August 2010;
    Selected Areas in Cryptography - SAC 2010. 24/90
    doi-paper-slides-code

  • J. Guo, S. Ling, C. Rechberger, H. Wang
    Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
    Advances in Cryptology - ASIACRYPT 2010. 35/227
    doi-paper-eprint-slides-code

  • J.-P. Aumasson, J. Guo, S. Knellwolf, K. Matusiewicz, W. Meier
    Differential and Invertibility Properties of BLAKE
    Fast Software Encryption - FSE 2010. 21/67
    doi-paper-eprint-slides-near-collision

2009

  • K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang
    Preimages for Step-Reduced SHA-2
    Advances in Cryptology - ASIACRYPT 2009. 42/300
    doi-eprint-slides

  • J. Guo, K. Matusiewicz, L. Knudsen, S. Ling, H. Wang
    Practical Pseudo-Collisions for Hash Functions ARIRANG-224/384
    Selected Areas in Cryptography - SAC 2009. 28/86
    doi-paper-eprint-slides

  • A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk, H. Wang
    Cryptanalysis of the LAKE Hash Family
    Fast Software Encryption - FSE 2009. 24/76
    doi-paper-slides-submission

2008

  • H. Sun, M. Wu, R. Steinfeld, J. Guo, H. Wang
    Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
    Cryptology And Network Security - CANS 2008. 27/73
    doi-paper-eprint-slides

  • H. Sun, M. Wu, H. Wang, J. Guo
    On the Improvement of the BDF Attack on LSBS-RSA
    Australian Conference on Information Security and Privacy - ACISP 2008. 33/111
    doi-paper-slides

  • R. Steinfeld, S. Contini, K. Matusiewicz, J. Pieprzyk, J. Guo, S. Ling, H. Wang
    Cryptanalysis of LASH
    Fast Software Encryption - FSE 2008. 30/72
    doi-paper-eprint-slides

2007 (Undergraduate)

  • J. Guo, S. Zhou
    Dynamic Assignment of Zones to Servers for Large-Scale Distributed Virtual Environments
    Australian Journal of Intelligent Information Processing Systems, Vol. 9, No. 4, 2007.
    paper

  • J. Guo
    Enhancing the Interactivity of Large-scale Distributed Virtual Environments
    Report for Undergraduate Final Year Project, NTU, 2007.
    thesis

Notes: Authors with underline are those who presented the paper at the conference. xxx/xxx denotes number of accepted papers out of submissions. My DBLP entry is here and google scholar entry is here; for IACR publications, I am available in its database in this entry. Acceptance rate of IACR conferences and workshops is available here. I think it helps a lot for Ph.D students (who are the majority of the cryptanalysis community) to have the source codes used in the differential/result search, hence most of source codes written by myself are online (without much comments though), I encourage you to follow too.