Publications

Conference & Journal Papers, Preprint/Archive, Misc

2020
  • Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
    Advances in security research in the Asiacrypt region
    Communications of the ACM, Volume 63(4): 76-81 (2020)

  • Z. Bao, X. Dong, J. Guo, Z. Li,  D. Shi, S. Sun, X. Wang
    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
    eprint

  • C. Guo, J. Guo, E. List, L. Song
    Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT)
    Advances in Cryptology - ASIACRYPT 2020
    doi-slides-video

  • Z. Bao, C. Guo, J. Guo, L. Song
    TNT: How to Tweak a Block Cipher
    Advances in Cryptology - EUROCRYPT 2020
    doi-video

  • Z. Bao, J. Guo, E. List
    Extended Truncated-differential Distinguishers on Round-reduced AES
    Fast Software Encryption - FSE 2020 / ToSC 2020 Issue 3

    doi-eprint-slides-video
2019
  • W. Zhang, M. Cao, J. Guo, E. Pasalic
    Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4
    doi-video

  • Z. Bao, L. Ding, J. Guo, H. Wang, W. Zhang
    Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 4
    doi-eprint-video

  • Z. Bao, J. Guo, T. Iwata, K. Minematsu
    ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
    Fast Software Encryption - FSE 2020 / ToSC 2019 Issue 2
    doi-eprint-code-slides-video

  • Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang
    Generic Attacks on Hash Combiners
    Journal of Cryptology 2019
    doi-eprint-web

  • J. Guo, G. Liao, G. Liu, M. Liu, K. Qiao, L. Song
    Practical Collision Attacks against Round-Reduced SHA-3
    Journal of Cryptology 2019
    doi-eprint-web

  • Z. Bao, J. Guo, S. Ling, Y. Sasaki
    PEIGEN — a Platform for Evaluation, Implementation, and Generation of S-boxes
    Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
    doi-eprint-web

  • R. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo
    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    Fast Software Encryption - FSE 2019 / ToSC 2019 Issue 1
    doi-eprint
2018
  • L. Song, J. Guo, D. Shi, S. Ling
    New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
    Advances in Cryptology - ASIACRYPT 2018
    doi-eprint-[codes verify & model]

  • L. Song, J. Guo
    Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
    Fast Software Encryption - FSE 2019 / ToSC 2018 Issue 3
    doi-eprint-code

  • Z. Bao, J. Guo, L. Wang
    Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
    Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
    doi-eprint

  • C. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song
    Key-Recovery Attacks on Full Kravatte
    Fast Software Encryption - FSE 2018 / ToSC 2018 Issue 1
    The Best Paper Award, invited to JoC
    doi
2017
2016
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    Fast Software Encryption - FSE 2017 ToSC 2016 Issue 2
    doi-eprint-code-slides

  • J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim
    Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
    Fast Software Encryption - FSE 2017 ToSC 2016 Issue 1
    doi-eprint-code

  • L. Wang, J. Guo, G. Zhang, J. Zhao, D. Gu
    How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
    Advances in Cryptology - ASIACRYPT 2016
    doi-eprint

  • J. Guo, M. Liu, L. Song
    Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
    Advances in Cryptology - ASIACRYPT 2016
    doi-eprint

  • B. Sun, M. Liu, J. Guo, L. Qu, V. Rijmen
    New Insights on AES-Like SPN Ciphers
    Advances in Cryptology - CRYPTO 2016
    doi-eprint

  • B. Sun, M. Liu, J. Guo, V. Rijmen, R. Li
    Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
    Advances in CryptologyEUROCRYPT 2016
    doi-eprint-slides
2015
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki
    Extended Meet-in-the-Middle Attacks on Some Feistel Constructions
    Designs, Codes, and Cryptography

    doi-paper
    Remark: a preliminary version appeared in Asiacrypt 2014.

  • J. Guo, C. Su, W. Yap
    An Improved Preimage Attack against HAVAL-3
    Information Processing Letters
    doi-paper
    Remark: a preliminary version has appeared in my Ph.D thesis, a few errors have been corrected here.
2014
  • T. Iwata, K. Minematsu, J. Guo, S. Morioka
    CLOC: Authenticated Encryption for Short Input
    Fast Software Encryption - FSE 2014. 31/99
  • doi-paper-eprint-slides
2013
  • J. Guo, I. Nikolić, T. Peyrin, L. Wang
    Cryptanalysis of Zorro
    eprint
2012
  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan
    SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
    Progress in Cryptology - AfricaCrypt 2012
    doi-paper-eprint-slides

  • A. Duc, J. Guo, T. Peyrin, L. Wei
    Unaligned Rebound Attack - Application to Keccak
    Fast Software Encryption - FSE 2012. 24/90
    doi-paper-eprint-slides

  • S. Wu, D. Feng, W. Wu, J. Guo, L. Dong, J. Zou
    (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
    Fast Software Encryption - FSE 2012. 24/90
    doi-paper-eprint-slides
2011 2010
2009
  • K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang
    Preimages for Step-Reduced SHA-2
    Advances in Cryptology - ASIACRYPT 2009. 42/300
    doi-eprint-slides

  • J. Guo, K. Matusiewicz, L. Knudsen, S. Ling, H. Wang
    Practical Pseudo-Collisions for Hash Functions ARIRANG-224/384
    Selected Areas in Cryptography - SAC 2009. 28/86
    doi-paper-eprint-slides

  • A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolić, J. Pieprzyk, H. Wang
    Cryptanalysis of the LAKE Hash Family
    Fast Software Encryption - FSE 2009. 24/76
    doi-paper-slides-submission

2008
  • H. Sun, M. Wu, R. Steinfeld, J. Guo, H. Wang
    Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
    Cryptology And Network Security - CANS 2008. 27/73
    doi-paper-eprint-slides


  • H. Sun, M. Wu, H. Wang, J. Guo
    On the Improvement of the BDF Attack on LSBS-RSA
    Australian Conference on Information Security and Privacy - ACISP 2008. 33/111
    doi-paper-slides


  • R. Steinfeld, S. Contini, K. Matusiewicz, J. Pieprzyk, J. Guo, S. Ling, H. Wang
    Cryptanalysis of LASH
    Fast Software Encryption - FSE 2008. 30/72
    doi-paper-eprint-slides

2007 (Undergraduate)
  • J. Guo, S. Zhou
    Dynamic Assignment of Zones to Servers for Large-Scale Distributed Virtual Environments
    Australian Journal of Intelligent Information Processing Systems, Vol. 9, No. 4, 2007.
    paper


  • J. Guo
    Enhancing the Interactivity of Large-scale Distributed Virtual Environments
    Report for Undergraduate Final Year Project, NTU, 2007.
    thesis 

Notes: Authors with underline are those who presented the paper at the conference. xxx/xxx denotes number of accepted papers out of submissions. My DBLP entry is here and google scholar entry is here; for IACR publications, I am available in its database in this entry. Acceptance rate of IACR conferences and workshops is available here. I think it helps a lot for Ph.D students (who are the majority of the cryptanalysis community) to have the source codes used in the differential/result search, hence most of source codes written by myself are online (without much comments though), I encourage you to follow too.