Qian Guo
Title
Cited by
Cited by
Year
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2016
1252016
Coded-BKW: Solving LWE using lattice codes
Q Guo, T Johansson, P Stankovski
Annual Cryptology Conference, 23-42, 2015
542015
Solving LPN using covering codes
Q Guo, T Johansson, C Löndahl
International Conference on the Theory and Application of Cryptology and …, 2014
502014
A reaction attack on the QC-LDPC McEliece cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
International Workshop on Post-Quantum Cryptography, 51-68, 2017
472017
Decryption failure attacks on IND-CCA secure lattice-based schemes
JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ...
IACR International Workshop on Public Key Cryptography, 565-598, 2019
192019
A new algorithm for solving Ring-LPN with a reducible polynomial
Q Guo, T Johansson, C Löndahl
IEEE Transactions on Information Theory 61 (11), 6204-6212, 2015
192015
Coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2017
102017
Connecting and improving direct sum masking and inner product masking
R Poussier, Q Guo, FX Standaert, C Carlet, S Guilley
International Conference on Smart Card Research and Advanced Applications …, 2017
102017
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
Q Guo, T Johansson
Information Processing Letters 146, 30-34, 2019
92019
A novel CCA attack using decryption errors against LAC
Q Guo, T Johansson, J Yang
International Conference on the Theory and Application of Cryptology and …, 2019
82019
A Generic Attack on Lattice-based Schemes using Decryption Errors
Q Guo, T Johansson, A Nilsson
Cryptology ePrint Archive, Report 2019/043, 2019
82019
Modeling soft analytical side-channel attacks from a coding theory viewpoint
Q Guo, V Grosso, FX Standaert, O Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-238, 2020
52020
A Key Recovery Reaction Attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845 - 1861, 2019
52019
A p-ary MDPC scheme
Q Guo, T Johansson
2016 IEEE International Symposium on Information Theory (ISIT), 1356-1360, 2016
52016
A novel elementary construction of matching vectors
C Yuan, Q Guo, H Kan
Information Processing Letters 112 (12), 494-496, 2012
42012
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Q Guo, T Johansson, A Nilsson
Annual International Cryptology Conference, 359-386, 2020
32020
On the asymptotics of solving the lwe problem using coded-bkw with sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
32019
Ouroboros-E: An efficient lattice-based key-exchange protocol
JC Deneuville, P Gaborit, Q Guo, T Johansson
2018 IEEE International Symposium on Information Theory (ISIT), 1450-1454, 2018
32018
Information Set Decoding with Soft Information and some cryptographic applications
Q Guo, T Johansson, E Mårtensson, P Stankovski
2017 IEEE International Symposium on Information Theory (ISIT), 1793-1797, 2017
32017
On systematic encoding for Blaum-Roth codes
Q Guo, H Kan
2011 IEEE International Symposium on Information Theory Proceedings, 2353-2357, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20