Browsing by Author Guo, Jian

Showing results 1 to 19 of 19
Issue DateTitleAuthor(s)
2010Advanced meet-in-the-middle preimage attacks : first results on full Tiger, and improved results on MD4 and SHA-2Guo, Jian; Ling, San; Rechberger, Christian; Wang, Huaxiong
2023Automatic preimage attack framework on Ascon using a linearize-and-guess approachLi, Huina; He, Le; Chen, Shiyao; Guo, Jian; Qiu, Weidong
2021Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashingBao, Zhenzhen; Dong, Xiaoyang; Guo, Jian; Li, Zheng; Shi, Danping; Sun, Siwei; Wang, Xiaoyun
2009Cryptanalysis of the LAKE hash familyBiryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikoli´c, Ivica; Pieprzyk, Josef; Wang, Huaxiong
2020Extended truncated-differential distinguishers on round-reduced AESBao, Zhenzhen; Guo, Jian; List, Eik
2018Functional graphs and their applications in generic attacks on iterated hash constructionsBao, Zhenzhen; Wang, Lei; Guo, Jian
2019Generic attacks on hash combinersBao, Zhenzhen; Dinur, Itai; Guo, Jian; Leurent, Gaëtan; Wang, Lei
2011Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster)Wei, Lei; Rechberger, Christian; Guo, Jian; Wu, Hongjun; Wang, Huaxiong; Ling, San
2020Improved meet-in-the-middle preimage attacks against AES hashing modesBao, Zhenzhen; Ding, Lin; Guo, Jian; Wang, Haoyang; Zhang, Wenying
2020Improved security evaluation of SPN block ciphers and its applications in the single-key attack on SKINNYZhang, Wenying; Cao, Meichun; Guo, Jian; Pasalic, Enes
2019PEIGEN – a platform for evaluation, implementation, and generation of S-boxesSasaki, Yu; Ling, San; Guo, Jian; Bao, Zhenzhen
2019Practical collision attacks against round-reduced SHA-3Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling
2009Practical pseudo-collisions for hash functions ARIRANG-224/384Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars R.; Ling, San; Wang, Huaxiong
2022Related-key differential cryptanalysis of GMiMC used in post-quantum signaturesChen, Shiyao; Guo, Chun; Guo, Jian; Liu, Li; Wang, Meiqin; Wei, Puwen; Xu, Zeyu
2020TNT : how to tweak a block cipherBao, Zhenzhen; Guo, Chun; Guo, Jian; Song, Ling
2020Towards closing the security gap of Tweak-aNd-Tweak (TNT)Guo, Chun; Guo, Jian; List, Eik; Song, Ling
2023Towards the links of cryptanalytic methods on MPC/FHE/ZK-friendly symmetric-key primitivesChen, Shiyao; Guo, Chun; Guo, Jian; Liu, Li; Wang, Meiqin; Wei, Puwen; Xu, Zeyu
2019Zero-correlation attacks on tweakable block ciphers with linear tweakey expansionAnkele, Ralph; Todo, Yosuke; Guo, Jian; Dobraunig, Christoph; Lambooij, Eran; Leander, Gregor
2019ZOCB and ZOTR : tweakable blockcipher modes for authenticated encryption with full absorptionBao, Zhenzhen; Guo, Jian; Iwata, Tetsu; Minematsu, Kazuhiko