Follow
Chun Guo
Chun Guo
Verified email at sdu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
852020
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020
812020
TEDT, a leakage-resilient AEAD mode for high (physical) security applications
F Berti, C Guo, O Pereira, T Peters, FX Standaert
Cryptology ePrint Archive, 2019
73*2019
Efficient and secure multiparty computation from fixed-key block ciphers
C Guo, J Katz, X Wang, Y Yu
2020 IEEE Symposium on Security and Privacy (SP), 825-841, 2020
642020
Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction
C Guo, O Pereira, T Peters, FX Standaert
Cryptology ePrint Archive, 2019
49*2019
Authenticated encryption with nonce misuse and physical leakage: Definitions, separation results and first construction
C Guo, O Pereira, T Peters, FX Standaert
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
43*2019
Romulus v1. 2
T Iwata, M Khairallah, K Minematsu, T Peyrin, C Guo
Submission to the NIST lightweight cryptography standardization process, 2019
382019
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li, M Wang, W Wang, C Guo
Designs, Codes and Cryptography, 1-44, 2022
362022
Better concrete security for half-gates garbling (in the multi-instance setting)
C Guo, J Katz, X Wang, C Weng, Y Yu
Annual International Cryptology Conference, 793-822, 2020
312020
TNT: how to tweak a block cipher
Z Bao, C Guo, J Guo, L Song
Annual International Conference on the Theory and Applications of …, 2020
252020
Collision resistant hashing from sub-exponential learning parity with noise
Y Yu, J Zhang, J Weng, C Guo, X Li
International Conference on the Theory and Application of Cryptology and …, 2019
232019
Romulus v1. 3
C Guo, T Iwata, M Khairallah, K Minematsu, T Peyrin
Submission to NIST Lightweight Cryptography, 2021
212021
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
C Guo, L Wang
International Conference on the Theory and Application of Cryptology and …, 2018
212018
On the indifferentiability of key-alternating feistel ciphers with no key derivation
C Guo, D Lin
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
192015
Efficient leakage-resilient macs without idealized assumptions
F Berti, C Guo, T Peters, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2021
172021
Strong authenticity with leakage under weak and falsifiable physical assumptions
F Berti, C Guo, O Pereira, T Peters, FX Standaert
International Conference on Information Security and Cryptology, 517-532, 2019
132019
Algebraic Attacks on Round-Reduced Rain and Full AIM-III
K Zhang, Q Wang, Y Yu, C Guo, H Cui
International Conference on the Theory and Application of Cryptology and …, 2023
112023
Improved Security Bounds for Generalized Feistel Networks
Y Shen, C Guo, L Wang
IACR Transactions on Symmetric Cryptology, 425-457, 2020
102020
Beyond-birthday secure domain-preserving PRFs from a single permutation
C Guo, Y Shen, L Wang, D Gu
Designs, Codes and Cryptography 87, 1297-1322, 2019
102019
A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
C Guo, D Lin
International Conference on the Theory and Application of Cryptology and …, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20