Qian Guo
Lunds Universitet
H-index: 16
Europe-Sweden
Top articles of Qian Guo
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Cryptology ePrint Archive
2024
Qian Guo
H-Index: 10
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
33rd USENIX Security Symposium (USENIX Security 24). Philadelphia, PA: USENIX Association
2024
Qian Guo
H-Index: 10
Thomas Johansson
H-Index: 22
Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
2023/12/4
Do not bound to a single position: near-optimal multi-positional mismatch attacks against Kyber and Saber
2023/8/10
Qian Guo
H-Index: 10
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
Cryptography and Communications
2023/3
Qian Guo
H-Index: 10
Paul Stankovski Wagner
H-Index: 7
A new sieving-style information-set decoding algorithm
Cryptology ePrint Archive
2023
Cache-timing attack against HQC
Cryptology ePrint Archive
2023
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles–A case study of Kyber
IACR Transactions on Cryptographic Hardware and Embedded Systems
2023
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022/8/31
Don’t reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022/6/8
Revisiting the concrete security of goldreich’s pseudorandom generator
IEEE Transactions on Information Theory
2021/11/15
Improvements on making BKW practical for solving LWE
Cryptography
2021/12
A side-channel attack on a masked IND-CCA secure saber KEM implementation
IACR Transactions on Cryptographic Hardware and Embedded Systems
2021/8/11
On the sample complexity of solving LWE using BKW-style algorithms
2021/7/12
Qian Guo
H-Index: 10
Paul Stankovski Wagner
H-Index: 7
Faster dual lattice attacks for solving LWE with applications to CRYSTALS
2021
Qian Guo
H-Index: 10
Thomas Johansson
H-Index: 22
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020/8/10
Making the bkw algorithm practical for lwe
2020/12/13
Solving LPN using covering codes
Journal of Cryptology
2020/1
Qian Guo
H-Index: 10
Thomas Johansson
H-Index: 22
Modeling soft analytical side-channel attacks from a coding theory viewpoint
IACR Transactions on Cryptographic Hardware and Embedded Systems
2020