Chun Guo

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards minimizing tweakable blockcipher-based generalized Feistel networks
 
2024-10-23Paper
Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
 
2024-08-30Paper
CCA security for contracting (quasi-)Feistel constructions with tight round complexity
Designs, Codes and Cryptography
2024-08-13Paper
Towards minimizing non-linearity in type-II generalized Feistel networks
 
2024-06-05Paper
On the sequential indifferentiability of the Lai-Massey construction
Designs, Codes and Cryptography
2024-05-27Paper
SpookChain: chaining a sponge-based AEAD with beyond-birthday security
 
2024-03-12Paper
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
How fast can SM4 be in software?
Information Security and Cryptology
2023-08-21Paper
Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)
Lecture Notes in Computer Science
2023-08-14Paper
Sequential indifferentiability of confusion-diffusion networks
Lecture Notes in Computer Science
2023-05-12Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)
 
2023-03-21Paper
Packed multiplication: how to amortize the cost of side-channel masking?
 
2023-03-21Paper
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Designs, Codes and Cryptography
2023-03-17Paper
TNT: how to tweak a block cipher
 
2022-03-23Paper
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
Designs, Codes and Cryptography
2022-01-19Paper
Related-key analysis of generalized Feistel networks with expanding round functions
 
2021-12-20Paper
Provable related-key security of contracting Feistel networks
 
2021-12-08Paper
A combined modelling and experimental study of heat shock factor SUMOylation in response to heat shock
Journal of Theoretical Biology
2021-10-21Paper
Beyond-birthday security for permutation-based Feistel networks
Designs, Codes and Cryptography
2021-03-17Paper
Collision resistant hashing from sub-exponential learning parity with noise
 
2020-05-05Paper
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
IEEE Transactions on Information Theory
2019-07-19Paper
Beyond-birthday secure domain-preserving PRFs from a single permutation
Designs, Codes and Cryptography
2019-05-24Paper
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
 
2018-12-20Paper
Estimating differential-linear distinguishers and applications to CTC2
 
2018-12-07Paper
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
Designs, Codes and Cryptography
2016-08-31Paper
A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Improved domain extender for the ideal cipher
Cryptography and Communications
2015-11-19Paper
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Theory of Cryptography
2015-07-06Paper
Optimization algorithm of BP networks based on ant colony algorithm
Journal of Computer Applications
2012-08-30Paper
Exact solution for a time-dependent multi-mode coupled quadratic Bose system
Journal of Physics A: Mathematical and Theoretical
2010-12-03Paper
\(H^{\infty}\) variable universe fuzzy control for hysteretic systems
 
2009-03-06Paper


Research outcomes over time


This page was built for person: Chun Guo