default search action
Jie Guan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu, Sudong Ma, Hao Bai:
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. Comput. J. 67(4): 1370-1380 (2024) - [j46]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. IEEE Trans. Computers 73(2): 613-620 (2024) - [j45]Tairong Shi, Wenling Wu, Bin Hu, Jie Guan, Han Sui, Senpeng Wang, Mengyuan Zhang:
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs. IEEE Trans. Inf. Forensics Secur. 19: 5971-5984 (2024) - [j44]Sudong Ma, Chenhui Jin, Zhen Shi, Ting Cui, Jie Guan:
Correlation Attacks on SNOW-V-Like Stream Ciphers Based on a Heuristic MILP Model. IEEE Trans. Inf. Theory 70(6): 4478-4491 (2024) - [j43]Kai Zhang, Senpeng Wang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Tairong Shi:
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 70(8): 6025-6040 (2024) - [j42]Sudong Ma, Chenhui Jin, Jie Guan, Ting Cui, Zhen Shi:
Improved Fast Correlation Attack Using Multiple Linear Approximations and Its Application on SOSEMANUK. IEEE Trans. Inf. Theory 70(10): 7484-7497 (2024) - [i19]Jie Guan, Jiamin Liu, Alexis Morris:
Design Frameworks for Spatial Zone Agents in XRI Metaverse Smart Environments. CoRR abs/2401.11040 (2024) - 2023
- [j41]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu:
A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci. China Inf. Sci. 66(3) (2023) - [j40]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. Des. Codes Cryptogr. 91(9): 2845-2878 (2023) - [j39]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Weak rotational property and its application. Des. Codes Cryptogr. 91(10): 3187-3214 (2023) - [j38]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
New method for combining Matsui's bounding conditions with sequential encoding method. Des. Codes Cryptogr. 91(11): 3603-3642 (2023) - [j37]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Selecting Rotation Constants on SIMON-Type Ciphers. J. Database Manag. 34(1): 1-23 (2023) - [j36]Jie Guan, Alexis Morris:
Design Frameworks for Hyper-Connected Social XRI Immersive Metaverse Environments. IEEE Netw. 37(4): 12-21 (2023) - [j35]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 69(2): 1282-1294 (2023) - [j34]Sudong Ma, Chenhui Jin, Jie Guan:
Fast Correlation Attacks on K2 Stream Cipher. IEEE Trans. Inf. Theory 69(8): 5426-5439 (2023) - [c15]Jie Guan, Alexis Morris, Jay Irizawa:
Cross-Reality for Extending the Metaverse: Designing Hyper-Connected Immersive Environments with XRI. VR Workshops 2023: 305-311 - [c14]Jie Guan, Alexis Morris, Jay Irizawa:
Extending the Metaverse: Hyper-Connected Smart Environments with Mixed Reality and the Internet of Things. VR Workshops 2023: 817-818 - [i18]Jie Guan, Jay Irizawa, Alexis Morris:
Extended Reality and Internet of Things for Hyper-Connected Metaverse Environments. CoRR abs/2301.08835 (2023) - [i17]Alexis Morris, Jie Guan, Nadine Lessio, Yiyi Shao:
Toward Mixed Reality Hybrid Objects with IoT Avatar Agents. CoRR abs/2305.11960 (2023) - [i16]Jie Guan, Alexis Morris:
Extended-XRI Body Interfaces for Hyper-Connected Metaverse Environments. CoRR abs/2306.01096 (2023) - [i15]Jie Guan, Alexis Morris, Jay Irizawa:
Cross-Reality for Extending the Metaverse: Designing Hyper-Connected Immersive Environments with XRI. CoRR abs/2306.01113 (2023) - [i14]Jie Guan, Alexis Morris, Jay Irizawa:
Extending the Metaverse: Hyper-Connected Smart Environments with Mixed Reality and the Internet of Things. CoRR abs/2306.01137 (2023) - [i13]Alexis Morris, Jie Guan, Amna Azhar:
An XRI Mixed-Reality Internet-of-Things Architectural Framework Toward Immersive and Adaptive Smart Environments. CoRR abs/2306.01139 (2023) - [i12]Jie Guan, Alexis Morris:
Design Frameworks for Hyper-Connected Social XRI Immersive Metaverse Environments. CoRR abs/2306.06230 (2023) - [i11]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang:
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 316 (2023) - 2022
- [j33]Jie Guan, Wenqun Zhang:
Improved Topological Optimization Method Based on Particle Swarm Optimization Algorithm. IEEE Access 10: 52067-52074 (2022) - [j32]Shuai Liu, Jie Guan, Bin Hu:
Fault attacks on authenticated encryption modes for GIFT. IET Inf. Secur. 16(1): 51-63 (2022) - [j31]Sudong Ma, Chenhui Jin, Jie Guan, Shuai Liu:
Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher. J. Inf. Secur. Appl. 71: 103379 (2022) - [j30]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Research on the Security Level of μ2 against Impossible Differential cryptanalysis. KSII Trans. Internet Inf. Syst. 16(3): 972-985 (2022) - [j29]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on Full-round FRIET. IACR Trans. Symmetric Cryptol. 2022(4): 105-119 (2022) - [c13]Jie Guan, Alexis Morris:
Extended-XRI Body Interfaces for Hyper-Connected Metaverse Environments. GEM 2022: 1-6 - [c12]Jie Guan, Jay Irizawa, Alexis Morris:
Extended Reality and Internet of Things for Hyper-Connected Metaverse Environments. VR Workshops 2022: 163-168 - [i10]Yunling Shi, Jie Guan, Junfeng Xiao, Huai Zhang, Qiang Guo, Yu Yuan:
Internet Of Rights(IOR) In Role Based Block Chain. CoRR abs/2211.00830 (2022) - [i9]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang:
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method. IACR Cryptol. ePrint Arch. 2022: 626 (2022) - [i8]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on the Full-round FRIET. IACR Cryptol. ePrint Arch. 2022: 1121 (2022) - 2021
- [j28]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
Improved Guess and Determine attack on the MASHA stream cipher. Sci. China Inf. Sci. 64(9) (2021) - [j27]Sudong Ma, Jie Guan:
Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher. Comput. J. 64(8): 1253-1263 (2021) - [j26]Tairong Shi, Wenling Wu, Bin Hu, Jie Guan, Sengpeng Wang:
Breaking LWC candidates: sESTATE and Elephant in quantum setting. Des. Codes Cryptogr. 89(7): 1405-1432 (2021) - [j25]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks. J. Inf. Secur. Appl. 63: 103015 (2021) - [c11]Alexis Morris, Jie Guan, Amna Azhar:
An XRI Mixed-Reality Internet-of-Things Architectural Framework Toward Immersive and Adaptive Smart Environments. ISMAR Adjunct 2021: 68-74 - 2020
- [j24]Sudong Ma, Jie Guan:
Differential attacks on reduced-round SNOW 3G and SNOW 3G⊕. IET Inf. Secur. 14(5): 587-594 (2020) - [j23]Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property. IACR Trans. Symmetric Cryptol. 2020(3): 288-304 (2020) - [c10]Congwei Zhou, Jie Guan, Bin Hu, Kuan He:
On the Structure Property of PCR's Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences. Inscrypt 2020: 307-317 - [c9]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - [c8]Alexis Morris, Jie Guan, Nadine Lessio, Yiyi Shao:
Toward Mixed Reality Hybrid Objects with IoT Avatar Agents. SMC 2020: 766-773 - [c7]Jie Guan, Nadine Lessio, Yiyi Shao, Alexis Morris:
Exploring a Mixed Reality Framework for the Internet-of-Things: Toward Visualization and Interaction with Hybrid Objects and Avatars. VR Workshops 2020: 858 - [i7]Congwei Zhou, Bin Hu, Jie Guan:
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function. IACR Cryptol. ePrint Arch. 2020: 835 (2020) - [i6]Congwei Zhou, Bin Hu, Jie Guan:
Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity. IACR Cryptol. ePrint Arch. 2020: 1416 (2020)
2010 – 2019
- 2019
- [j22]Tairong Shi, Jie Guan:
Real-time state recovery attack against MORUS in nonce-misuse setting. Sci. China Inf. Sci. 62(3): 39109:1-39109:3 (2019) - [j21]Jun-Zhi Li, Jie Guan:
Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1. IET Inf. Secur. 13(2): 141-148 (2019) - [j20]Tairong Shi, Jie Guan:
Cryptanalysis of the Authentication in ACORN. KSII Trans. Internet Inf. Syst. 13(8): 4060-4075 (2019) - [j19]Tairong Shi, Chenhui Jin, Bin Hu, Jie Guan, Jing-Yi Cui, Sen-Peng Wang:
Complete analysis of Simon's quantum algorithm with additional collisions. Quantum Inf. Process. 18(11): 334 (2019) - [j18]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. Secur. Commun. Networks 2019: 7429320:1-7429320:5 (2019) - [c6]Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
MILP-aided Method of Searching Division Property Using Three Subsets and Applications. ASIACRYPT (3) 2019: 398-427 - [i5]SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
A Practical Method to Recover Exact Superpoly in Cube Attack. IACR Cryptol. ePrint Arch. 2019: 259 (2019) - 2018
- [j17]Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET Inf. Secur. 12(1): 87-93 (2018) - [j16]Hong Wang, Jie Guan, Lin Ding:
On Equivalence Relations of State Diagram of Cascade Connection of an LFSR into an NFSR. Int. J. Found. Comput. Sci. 29(7): 1107-1117 (2018) - [j15]Junzhi Li, Jie Guan:
Improved Conditional Differential Attacks on Round-Reduced Grain v1. KSII Trans. Internet Inf. Syst. 12(9): 4548-4559 (2018) - [i4]Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets. IACR Cryptol. ePrint Arch. 2018: 1186 (2018) - 2017
- [c5]Hong Wang, Jie Guan:
On Equivalence with Output Sequence of Grain Model. ICCSP 2017: 7-11 - 2016
- [j14]Kai Zhang, Jie Guan, Bin Hu:
Impossible Differential Cryptanalysis on DVB-CSA. KSII Trans. Internet Inf. Syst. 10(4): 1944-1956 (2016) - [j13]Kai Zhang, Jie Guan, Bin Hu:
Zero Correlation Linear Cryptanalysis on LEA Family Ciphers. J. Commun. 11(7): 677-685 (2016) - [j12]Kai Zhang, Jie Guan, Bin Hu:
Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers. Secur. Commun. Networks 9(18): 5746-5755 (2016) - [c4]Xiang-zhong Dong, Jie Guan:
Differential distribution properties of the SIMON block cipher family. CITS 2016: 1-6 - 2015
- [j11]Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Dong Han, Wei Zhao:
Cryptanalysis of WG Family of Stream Ciphers. Comput. J. 58(10): 2677-2685 (2015) - [j10]Kai Zhang, Jie Guan:
Distinguishing attack on common scrambling algorithm. Int. Arab J. Inf. Technol. 12(4): 410-414 (2015) - [j9]Lin Ding, Chenhui Jin, Jie Guan:
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting. Pervasive Mob. Comput. 24: 224-230 (2015) - [j8]Kai Zhang, Jie Guan, Xuliang Fei:
Improved conditional differential cryptanalysis. Secur. Commun. Networks 8(9): 1801-1811 (2015) - [c3]Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao:
New Related Key Attacks on the RAKAPOSHI Stream Cipher. ISPEC 2015: 65-75 - [i3]Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 911 (2015) - 2014
- [j7]Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang:
Cryptanalysis of Loiss Stream Cipher-Revisited. J. Appl. Math. 2014: 457275:1-457275:7 (2014) - [j6]Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang:
Cryptanalysis of Lightweight WG-8 Stream Cipher. IEEE Trans. Inf. Forensics Secur. 9(4): 645-652 (2014) - [c2]Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi:
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers. AFRICACRYPT 2014: 136-146 - [i2]Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi:
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 277 (2014) - 2013
- [j5]Lin Ding, Jie Guan:
Cryptanalysis of MICKEY family of stream ciphers. Secur. Commun. Networks 6(8): 936-941 (2013) - [j4]Lin Ding, Jie Guan:
Related Key Chosen IV Attack on Grain-128a Stream Cipher. IEEE Trans. Inf. Forensics Secur. 8(5): 803-809 (2013) - [c1]Jie Guan, Wenlu Yang:
Independent component analysis-based multimodal classification of Alzheimer's disease versus healthy controls. ICNC 2013: 75-79 - 2012
- [j3]Lin Ding, Jie Guan:
Cryptanalysis of Loiss Stream Cipher. Comput. J. 55(10): 1192-1201 (2012) - [j2]Kai Zhang, Lin Ding, Junzhi Li, Jie Guan:
Real Time Related Key Attack on Hummingbird-2. KSII Trans. Internet Inf. Syst. 6(8): 1946-1963 (2012) - [j1]Lin Ding, Jie Guan, Wen-long Sun:
New Results of Related-key Attacks on All Py-Family of Stream Ciphers. J. Univers. Comput. Sci. 18(12): 1741-756 (2012) - [i1]Lin Ding, Jie Guan:
Cryptanalysis of RAKAPOSHI Stream Cipher. IACR Cryptol. ePrint Arch. 2012: 696 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint