What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chun Guo
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
A Code-Based ISE to Protect Boolean Masking in Software.
Qi Tian
Hao Cheng
Chun Guo
Daniel Page
Meiqin Wang
Weijia Wang
2025
conf/acisp
Towards Quantum Security of Hirose Compression Function and Romulus-H.
Shaoxuan Zhang
Chun Guo
Meiqin Wang
2025
journals/cic
Committing Security Analysis of SMAC.
Fan Yang
Tian Tian
Chun Guo
Jing Yang
2024
conf/ccs
Leakage-Resilient Circuit Garbling.
Ruiyang Li
Yiteng Sun
Chun Guo
François-Xavier Standaert
Weijia Wang
Xiao Wang
2023
journals/tosc
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives.
Shiyao Chen
Chun Guo
Jian Guo
Li Liu
Meiqin Wang
Puwen Wei
Zeyu Xu
2023
journals/tosc
Chosen-Key Secure Even-Mansour Cipher from a Single Permutation.
Shanjie Xu
Qi Da
Chun Guo
2023
journals/tosc
Secure Message Authentication in the Presence of Leakage and Faults.
Francesco Berti
Chun Guo
Thomas Peters
Yaobin Shen
François-Xavier Standaert
2023
conf/eurocrypt
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls.
Chun Guo
Lei Wang
Dongdai Lin
2023
conf/asiacrypt
Algebraic Attacks on Round-Reduced Rain and Full AIM-III.
Kaiyi Zhang
Qingju Wang
Yu Yu
Chun Guo
Hongrui Cui
2023
conf/cans
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.
Yuqing Zhao
Chun Guo
Weijia Wang
2022
journals/tches
Side-Channel Masking with Common Shares.
Weijia Wang
Chun Guo
Yu Yu
Fanjie Ji
Yang Su
2022
conf/icisc
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
Shiyao Chen
Chun Guo
Jian Guo
Li Liu
Meiqin Wang
Puwen Wei
Zeyu Xu
2021
journals/tosc
Provable Security of SP Networks with Partial Non-Linear Layers.
Chun Guo
François-Xavier Standaert
Weijia Wang
Xiao Wang
Yu Yu
2021
conf/ctrsa
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions.
Yuqing Zhao
Wenqi Yu
Chun Guo
2021
conf/asiacrypt
Efficient Leakage-Resilient MACs Without Idealized Assumptions.
Francesco Berti
Chun Guo
Thomas Peters
François-Xavier Standaert
2020
journals/tches
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
Francesco Berti
Chun Guo
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2020
journals/tosc
Improved Security Bounds for Generalized Feistel Networks.
Yaobin Shen
Chun Guo
Lei Wang
2020
journals/tosc
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
Chun Guo
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2020
journals/tosc
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks.
Yuan Gao
Chun Guo
Meiqin Wang
Weijia Wang
Jiejing Wen
2020
journals/tosc
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
Davide Bellizia
Francesco Berti
Olivier Bronchain
Gaëtan Cassiers
Sébastien Duval
Chun Guo
Gregor Leander
Gaëtan Leurent
Itamar Levi
Charles Momin
Olivier Pereira
Thomas Peters
François-Xavier Standaert
Balazs Udvarhelyi
Friedrich Wiemer
2020
conf/crypto
Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting).
Chun Guo
Jonathan Katz
Xiao Wang
Chenkai Weng
Yu Yu
2020
conf/crypto
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle.
Davide Bellizia
Olivier Bronchain
Gaëtan Cassiers
Vincent Grosso
Chun Guo
Charles Momin
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2020
conf/sp
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
Chun Guo
Jonathan Katz
Xiao Wang
Yu Yu
2020
conf/eurocrypt
TNT: How to Tweak a Block Cipher.
Zhenzhen Bao
Chun Guo
Jian Guo
Ling Song
2020
conf/asiacrypt
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Chun Guo
Jian Guo
Eik List
Ling Song
2020
conf/asiacrypt
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
Weijia Wang
Chun Guo
François-Xavier Standaert
Yu Yu
Gaëtan Cassiers
2019
journals/tosc
Efficient Side-Channel Secure Message Authentication with Better Bounds.
Chun Guo
François-Xavier Standaert
Weijia Wang
Yu Yu
2019
conf/latincrypt
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Chun Guo
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2019
conf/asiacrypt
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Yu Yu
Jiang Zhang
Jian Weng
Chun Guo
Xiangxue Li
2018
conf/asiacrypt
Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security.
Chun Guo
Lei Wang
2015
conf/asiacrypt
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers.
Chun Guo
Dongdai Lin
2015
conf/tcc
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation.
Chun Guo
Dongdai Lin
Coauthors
Balazs Udvarhelyi
(1)
Charles Momin
(2)
Chenkai Weng
(1)
Chun Guo
(32)
Daniel Page
(1)
Davide Bellizia
(2)
Dongdai Lin
(3)
Eik List
(1)
Fan Yang
(1)
Fanjie Ji
(1)
Francesco Berti
(4)
François-Xavier Standaert
(11)
Friedrich Wiemer
(1)
Gaëtan Cassiers
(3)
Gaëtan Leurent
(1)
Gregor Leander
(1)
Hao Cheng
(1)
Hongrui Cui
(1)
Itamar Levi
(1)
Jian Guo
(4)
Jian Weng
(1)
Jiang Zhang
(1)
Jiejing Wen
(1)
Jing Yang
(1)
Jonathan Katz
(2)
Kaiyi Zhang
(1)
Lei Wang
(3)
Li Liu
(2)
Ling Song
(2)
Meiqin Wang
(5)
Olivier Bronchain
(2)
Olivier Pereira
(5)
Puwen Wei
(2)
Qi Da
(1)
Qi Tian
(1)
Qingju Wang
(1)
Ruiyang Li
(1)
Sébastien Duval
(1)
Shanjie Xu
(1)
Shaoxuan Zhang
(1)
Shiyao Chen
(2)
Thomas Peters
(7)
Tian Tian
(1)
Vincent Grosso
(1)
Weijia Wang
(8)
Wenqi Yu
(1)
Xiangxue Li
(1)
Xiao Wang
(4)
Yang Su
(1)
Yaobin Shen
(2)
Yiteng Sun
(1)
Yu Yu
(8)
Yuan Gao
(1)
Yuqing Zhao
(2)
Zeyu Xu
(2)
Zhenzhen Bao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to