Чланци са овлашћеним јавним приступом - Jian GuoСазнајте више
Није доступно нигде: 2
Extended Meet-in-the-Middle Attacks on Some Feistel Constructions
J Guo, J Jean, I Nikolić, Y Sasaki
Designs, Codes and Cryptography 80 (3), 587-618, 2016
Овлашћења: National Research Foundation, Singapore
New Constructions of Complete Permutations
B Sun, K Li, J Guo, L Qu
IEEE Transactions on Information Theory 67 (11), 7561-7567, 2021
Овлашћења: National Natural Science Foundation of China
Доступно негде: 35
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology 2016 (1), 33-56, 2016
Овлашћења: National Research Foundation, Singapore
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
J Guo, M Liu, L Song
Advances in Cryptology–ASIACRYPT 2016, 249-274, 2016
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
B Sun, M Liu, J Guo, V Rijmen, R Li
Advances in Cryptology – EUROCRYPT 2016, 196-213, 2016
Овлашћења: National Natural Science Foundation of China
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
L Song, G Liao, J Guo
Advances in Cryptology – CRYPTO 2017, 2017
Овлашћења: National Natural Science Foundation of China
New Insights on AES-Like SPN Ciphers
B Sun, M Liu, J Guo, L Qu, V Rijmen
Advances in Cryptology - CRYPTO 2016, 605-624, 2016
Овлашћења: National Natural Science Foundation of China
New Collision Attacks on Round-Reduced Keccak
K Qiao, L Song, M Liu, J Guo
Advances in Cryptology – EUROCRYPT 2017, 216-243, 2017
Овлашћења: National Natural Science Foundation of China
Enhancing Differential-Neural Cryptanalysis
Z Bao, J Guo, M Liu, L Ma, Y Tu
Advances in Cryptology - ASIACRYPT 2022, 2022
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33 (1), 228–270, 2020
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
CLOC and SILC v3
T Iwata, K Minematsu, J Guo, S Morioka, E Kobayashi
Submission to the CAESAR competition, 2016
Овлашћења: National Research Foundation, Singapore
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology – EUROCRYPT 2021, 771-804, 2021
Овлашћења: National Natural Science Foundation of China
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
L Song, J Guo, S Ling, D Shi
Advances in Cryptology–ASIACRYPT 2018, 2018
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
L Wang, J Guo, G Zhang, J Zhao, D Gu
Advances in Cryptology–ASIACRYPT 2016, 455-483, 2016
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
TNT: How to Tweak a Block Cipher
Z Bao, C Guo, J Guo, L Song
Advances in Cryptology – EUROCRYPT 2020, 641-673, 2020
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
Differential and Invertibility Properties of BLAKE
JP Aumasson, J Guo, S Knellwolf, K Matusiewicz, W Meier
Fast Software Encryption 2010, 318-332, 2010
Овлашћења: Swiss National Science Foundation
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
R Ankele, CE Dobraunig, J Guo, E Lambooij, G Leander, Y Todo
IACR Transactions on Symmetric Cryptology 2019 (1), 192-235, 2019
Овлашћења: Austrian Science Fund, European Commission
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
J Guo, J Jean, I Nikolic, Y Sasaki
IACR Transactions on Symmetric Cryptology 2016 (2), 307-337, 2016
Овлашћења: National Research Foundation, Singapore
Updates on generic attacks against HMAC and NMAC
J Guo, T Peyrin, Y Sasaki, L Wang
Advances in Cryptology – CRYPTO 2014, 131-148, 2014
Овлашћења: National Research Foundation, Singapore
Cube-Attack-like cryptanalysis of round-reduced Keccak using MILP
L Song, J Guo
IACR Transactions on Symmetric Cryptology 2018 (3), 182-214, 2018
Овлашћења: Chinese Academy of Sciences, National Natural Science Foundation of China
Публикације и информације о финансирању аутоматски одређује рачунарски програм