Obserwuj
Qian Guo
Tytuł
Cytowane przez
Cytowane przez
Rok
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2016
2062016
A side-channel attack on a masked IND-CCA secure saber KEM implementation
K Ngo, E Dubrova, Q Guo, T Johansson
IACR Transactions on Cryptographic Hardware and Embedded Systems, 676-707, 2021
952021
Coded-BKW: Solving LWE using lattice codes
Q Guo, T Johansson, P Stankovski
Annual Cryptology Conference, 23-42, 2015
872015
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Q Guo, T Johansson, A Nilsson
Annual International Cryptology Conference, 359-386, 2020
842020
Solving LPN using covering codes
Q Guo, T Johansson, C Löndahl
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
722014
A reaction attack on the QC-LDPC McEliece cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
712017
Decryption failure attacks on IND-CCA secure lattice-based schemes
JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ...
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
622019
Connecting and improving direct sum masking and inner product masking
R Poussier, Q Guo, FX Standaert, C Carlet, S Guilley
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
362018
A novel CCA attack using decryption errors against LAC
Q Guo, T Johansson, J Yang
International Conference on the Theory and Application of Cryptology and …, 2019
332019
Don’t reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE
Q Guo, C Hlauschek, T Johansson, N Lahr, A Nilsson, RL Schröder
IACR Transactions on Cryptographic Hardware and Embedded Systems, 223-263, 2022
312022
Faster dual lattice attacks for solving LWE with applications to CRYSTALS
Q Guo, T Johansson
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
282021
Modeling soft analytical side-channel attacks from a coding theory viewpoint
Q Guo, V Grosso, FX Standaert, O Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020
282020
A Key Recovery Reaction Attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845 - 1861, 2019
272019
A new algorithm for solving ring-lpn with a reducible polynomial
Q Guo, T Johansson, C Löndahl
IEEE Transactions on Information Theory 61 (11), 6204-6212, 2015
242015
Coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
232017
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles–A case study of Kyber
M Shen, C Cheng, X Zhang, Q Guo, T Jiang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 89-112, 2023
202023
Solving LPN using covering codes
Q Guo, T Johansson, C Löndahl
Journal of Cryptology 33 (1), 1-33, 2020
202020
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
Q Guo, A Johansson, T Johansson
IACR Transactions on Cryptographic Hardware and Embedded Systems, 800-827, 2022
152022
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
Q Guo, T Johansson
Information Processing Letters 146, 30-34, 2019
152019
On the asymptotics of solving the LWE problem using coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
152019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20