Qian Guo
Titel
Citeras av
Citeras av
År
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2016
1482016
Coded-BKW: Solving LWE using lattice codes
Q Guo, T Johansson, P Stankovski
Annual Cryptology Conference, 23-42, 2015
662015
Solving LPN using covering codes
Q Guo, T Johansson, C Löndahl
International Conference on the Theory and Application of Cryptology and …, 2014
582014
A reaction attack on the QC-LDPC McEliece cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
International workshop on post-quantum cryptography, 51-68, 2017
552017
Decryption failure attacks on IND-CCA secure lattice-based schemes
JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ...
IACR International Workshop on Public Key Cryptography, 565-598, 2019
322019
Connecting and improving direct sum masking and inner product masking
R Poussier, Q Guo, FX Standaert, C Carlet, S Guilley
International Conference on Smart Card Research and Advanced Applications …, 2017
222017
A new algorithm for solving ring-lpn with a reducible polynomial
Q Guo, T Johansson, C Löndahl
IEEE Transactions on Information Theory 61 (11), 6204-6212, 2015
212015
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Q Guo, T Johansson, A Nilsson
Annual International Cryptology Conference, 359-386, 2020
202020
A novel CCA attack using decryption errors against LAC
Q Guo, T Johansson, J Yang
International Conference on the Theory and Application of Cryptology and …, 2019
182019
Coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2017
162017
A generic attack on lattice-based schemes using decryption errors
Q Guo, T Johansson, A Nilsson
Cryptology ePrint Archive, Report 2019/043. 2019 Cited on, 2019
112019
Modeling soft analytical side-channel attacks from a coding theory viewpoint
Q Guo, V Grosso, FX Standaert, O Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-238, 2020
102020
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
Q Guo, T Johansson
Information Processing Letters 146, 30-34, 2019
92019
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM.
K Ngo, E Dubrova, Q Guo, T Johansson
IACR Cryptol. ePrint Arch. 2021, 79, 2021
82021
A Key Recovery Reaction Attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845 - 1861, 2019
82019
On the asymptotics of solving the LWE problem using coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
72019
Solving LPN using covering codes
Q Guo, T Johansson, C Löndahl
Journal of Cryptology 33 (1), 1-33, 2020
62020
Information set decoding with soft information and some cryptographic applications
Q Guo, T Johansson, E Mårtensson, P Stankovski
2017 IEEE International Symposium on Information Theory (ISIT), 1793-1797, 2017
62017
A p-ary MDPC scheme
Q Guo, T Johansson
2016 IEEE International Symposium on Information Theory (ISIT), 1356-1360, 2016
52016
A novel elementary construction of matching vectors
C Yuan, Q Guo, H Kan
Information Processing Letters 112 (12), 494-496, 2012
42012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20