Browsing by Author Guo, Jian
Showing results 1 to 17 of 17
Issue Date | Title | Author(s) | |
---|---|---|---|
![]() | 2010 | Advanced meet-in-the-middle preimage attacks : first results on full Tiger, and improved results on MD4 and SHA-2 | Guo, Jian; Ling, San; Rechberger, Christian; Wang, Huaxiong |
![]() | 2011 | Analysis of cryptographic hash functions | Guo, Jian |
![]() | 2021 | Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing | Bao, Zhenzhen; Dong, Xiaoyang; Guo, Jian; Li, Zheng; Shi, Danping; Sun, Siwei; Wang, Xiaoyun |
![]() | 2009 | Cryptanalysis of the LAKE hash family | Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikoli´c, Ivica; Pieprzyk, Josef; Wang, Huaxiong |
![]() | 2020 | Extended truncated-differential distinguishers on round-reduced AES | Bao, Zhenzhen; Guo, Jian; List, Eik |
![]() | 2018 | Functional graphs and their applications in generic attacks on iterated hash constructions | Bao, Zhenzhen; Wang, Lei; Guo, Jian |
![]() | 2019 | Generic attacks on hash combiners | Bao, Zhenzhen; Dinur, Itai; Guo, Jian; Leurent, Gaëtan; Wang, Lei |
![]() | 2011 | Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster) | Wei, Lei; Rechberger, Christian; Guo, Jian; Wu, Hongjun; Wang, Huaxiong; Ling, San |
![]() | 2020 | Improved meet-in-the-middle preimage attacks against AES hashing modes | Bao, Zhenzhen; Ding, Lin; Guo, Jian; Wang, Haoyang; Zhang, Wenying |
![]() | 2020 | Improved security evaluation of SPN block ciphers and its applications in the single-key attack on SKINNY | Zhang, Wenying; Cao, Meichun; Guo, Jian; Pasalic, Enes |
![]() | 2019 | PEIGEN – a platform for evaluation, implementation, and generation of S-boxes | Sasaki, Yu; Ling, San; Guo, Jian; Bao, Zhenzhen |
![]() | 2019 | Practical collision attacks against round-reduced SHA-3 | Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling |
![]() | 2009 | Practical pseudo-collisions for hash functions ARIRANG-224/384 | Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars R.; Ling, San; Wang, Huaxiong |
![]() | 2020 | TNT : how to tweak a block cipher | Bao, Zhenzhen; Guo, Chun; Guo, Jian; Song, Ling |
![]() | 2020 | Towards closing the security gap of Tweak-aNd-Tweak (TNT) | Guo, Chun; Guo, Jian; List, Eik; Song, Ling |
![]() | 2019 | Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion | Ankele, Ralph; Todo, Yosuke; Guo, Jian; Dobraunig, Christoph; Lambooij, Eran; Leander, Gregor |
![]() | 2019 | ZOCB and ZOTR : tweakable blockcipher modes for authenticated encryption with full absorption | Bao, Zhenzhen; Guo, Jian; Iwata, Tetsu; Minematsu, Kazuhiko |