Chun Guo

From MaRDI portal
(Redirected from Person:306056)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards minimizing tweakable blockcipher-based generalized Feistel networks2024-10-23Paper
Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}2024-08-30Paper
CCA security for contracting (quasi-)Feistel constructions with tight round complexity
Designs, Codes and Cryptography
2024-08-13Paper
Towards minimizing non-linearity in type-II generalized Feistel networks2024-06-05Paper
On the sequential indifferentiability of the Lai-Massey construction
Designs, Codes and Cryptography
2024-05-27Paper
SpookChain: chaining a sponge-based AEAD with beyond-birthday security2024-03-12Paper
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
How fast can SM4 be in software?
Information Security and Cryptology
2023-08-21Paper
Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)
Lecture Notes in Computer Science
2023-08-14Paper
Sequential indifferentiability of confusion-diffusion networks
Lecture Notes in Computer Science
2023-05-12Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
Packed multiplication: how to amortize the cost of side-channel masking?2023-03-21Paper
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Designs, Codes and Cryptography
2023-03-17Paper
TNT: how to tweak a block cipher2022-03-23Paper
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
Designs, Codes and Cryptography
2022-01-19Paper
Related-key analysis of generalized Feistel networks with expanding round functions2021-12-20Paper
Provable related-key security of contracting Feistel networks2021-12-08Paper
A combined modelling and experimental study of heat shock factor SUMOylation in response to heat shock
Journal of Theoretical Biology
2021-10-21Paper
Beyond-birthday security for permutation-based Feistel networks
Designs, Codes and Cryptography
2021-03-17Paper
Collision resistant hashing from sub-exponential learning parity with noise2020-05-05Paper
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
IEEE Transactions on Information Theory
2019-07-19Paper
Beyond-birthday secure domain-preserving PRFs from a single permutation
Designs, Codes and Cryptography
2019-05-24Paper
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security2018-12-20Paper
Estimating differential-linear distinguishers and applications to CTC22018-12-07Paper
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
Designs, Codes and Cryptography
2016-08-31Paper
A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Improved domain extender for the ideal cipher
Cryptography and Communications
2015-11-19Paper
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Theory of Cryptography
2015-07-06Paper
Optimization algorithm of BP networks based on ant colony algorithm
Journal of Computer Applications
2012-08-30Paper
Exact solution for a time-dependent multi-mode coupled quadratic Bose system
Journal of Physics A: Mathematical and Theoretical
2010-12-03Paper
\(H^{\infty}\) variable universe fuzzy control for hysteretic systems2009-03-06Paper


Research outcomes over time


This page was built for person: Chun Guo