Jian Guo
ScholarGPS® ID: 48116428907960
Affiliation History
Discipline
Mathematics
Top Specialties
Cryptography | Collision
Metrics Summary
Publication Count
44
Predicted Citations
762
Predicted h-index
15
Ranking
Publications and Citation History
Publications based on Top Specialties
Types of Publication
- Publications
- Books
- Patents
- NIH/NSF
Add
Delete
|
---|
Diving Deep into the Preimage Security of AES-Like Hashing (book chapter) In Advances in Cryptology – EUROCRYPT 2024 Springer Nature Switzerland (2024) |
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures (book chapter) In Information Security and Cryptology – ICISC 2022 Springer Nature Switzerland (2023) |
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3 (book chapter) In Advances in Cryptology – ASIACRYPT 2022 Springer Nature Switzerland (2022) |
Enhancing Differential-Neural Cryptanalysis (book chapter) In Advances in Cryptology – ASIACRYPT 2022 Springer Nature Switzerland (2022) |
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings (book chapter) In Network and System Security Springer Nature Switzerland (2022) |
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256 (book chapter) In Information Security and Privacy Springer International Publishing (2022) |
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing (book chapter) In Advances in Cryptology – CRYPTO 2022 Springer Nature Switzerland (2022) |
New Constructions of Complete Permutations (journal article) IEEE Transactions on Information Theory, volume 67, issue 11, pages 7561-7567 (2021). |
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing (book chapter) In Advances in Cryptology – EUROCRYPT 2021 Springer International Publishing (2021) |
Extended Truncated-differential Distinguishers on Round-reduced AES (journal article) IACR Transactions on Symmetric Cryptology (2020). |
Generic Attacks on Hash Combiners (journal article) Journal of Cryptology, volume 33, issue 3, pages 742-823 (2020). |
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes (journal article) IACR Transactions on Symmetric Cryptology (2020). |
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY (journal article) IACR Transactions on Symmetric Cryptology (2020). |
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT) (book chapter) In Advances in Cryptology – ASIACRYPT 2020 Springer International Publishing (2020) |
TNT: How to Tweak a Block Cipher (book chapter) In Advances in Cryptology – EUROCRYPT 2020 Springer International Publishing (2020) |
Practical Collision Attacks against Round-Reduced SHA-3 (journal article) Journal of Cryptology, volume 33, issue 1, pages 228-270 (2020). |
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption (journal article) IACR Transactions on Symmetric Cryptology (2019). |
IACR Transactions on Symmetric Cryptology (2019). |
IACR Transactions on Symmetric Cryptology (2019). |
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions (journal article) IACR Cryptology ePrint Archive, volume 2018, issue 1, pages 201-253 (2018). |