uTt2LiBpM4Y1pJ4NfQcrpLQsCBJ4KJMYPzXs0NxNZPlVrT9wKQNW8ithejt0
Biography

2011年6月于华东师大软院获软工学士,17年1月于中科院大学获信安博士(信工所培养),导师林东岱教授。17年9月至19年7月于比利时法语鲁汶大学博后,导师F.-X. Standaert。研究方向为对称密码可证明安全性,设计的哈希函数据查已被微软等使用,详见科学研究-研究领域。获中国密码学会密码创新奖、ACM SIGSAC China新星奖、山东省泰山青年学者。先后获批主持NSFC青年及面上项目、科技部重点研发计划青年科学家项目等。

山东大学电子邮箱访问不便,因此邮件敬请联系chun.guo.sc@gmail.com

The address chun.guo.sc@gmail.com is strongly recommended for email contact.

Education Background
  • 2004-09-01-2007-07-01
    安徽省淮北市第一中学
  • 2011-09-01-2017-01-08
    中国科学院大学
    信息安全
  • 2007-09-01-2011-07-15
    上海市华东师范大学
    Software Engineering
  • 2001-09-01-2004-07-01
    安徽省淮北市第二中学
  • 1995-09-01-2001-06-01
    安徽省淮北市第一实验小学
Work Experience
  • 2017-09 — 2019-08
    天主教鲁汶大学(法语)
Working-Papers

Dr. Guo has concentrated on the design, provable security, and generic attacks on symmetric crypto schemes (it shall be noted that provable security and generic attacks are just two sides of the same coin). This field concerns with constructing sophisticated cryptosystems (including message authentication codes, authenticated encryption, tweakable blockciphers, garbled circuits, cryptocurrency systems) from "simple" primitives (e.g., blockciphers, hash functions, crypto permutations). In particular, it includes (but not restricted to) the following:

1. Structural analysis and provable security of blockciphers, including Feistel networks, Even-Mansour schemes, and new approaches, see

https://eprint.iacr.org/2016/894

https://arxiv.org/abs/1810.07428 (IEEE TIT 2019)

2. Design, analysis, and provable security of message authentication, encryption, hash function, and tweakable blockciphers, see

https://eprint.iacr.org/2019/1424 (FSE 2020)

https://eprint.iacr.org/2019/137 (CHES 2020)

3. More sophisticated symmetric primitive-based cryptosystems, including garbling, OT extension, and GGM trees that are frequently used in multiparty computation systems, and symmetric objects in cryptocurrency. (Yes, symmetric crypto exists everywhere!) see

https://eprint.iacr.org/2019/1168 (CRYPTO 2020)

https://eprint.iacr.org/2019/074 (S&P 2020)

4. Security models for symmetric crypto, including models and assumptions for leakage-resilience, open-key security, etc. See

https://eprint.iacr.org/2018/484 (LATINCRYPT 2019)

https://eprint.iacr.org/2020/211 (CRYPTO 2020)






Publication
Research direction
Papers

(1) Shaoxuan Zhang, Chun Guo, Meiqin Wang. Towards Quantum Security of Hirose and Romulus-H .ACISP 2025

(2) Fan Yang, Tian Tian, Chun Guo, Jing Yang. Committing Security Analysis of SMAC .IACR Communications in Cryptology (CIC), 2025

(3) Chun Guo, Xiao Wang, Kang Yang, Yu Yu. On Tweakable Correlation Robust Hashing against Key Leakages .Designs, Codes and Cryptography

(4)郭晓宁. 可调随机置换与随机函数的量子不可区分性紧界 .密码学报 .2025 (0)

(5)田琦. A Code-Based ISE to Protect Boolean Masking in Software .IACR Transactions on Cryptographic Hardware and Embedded Systems .2025 ,Vol. 2025 (No. 2)

(6) Chun Guo, Xiao Wang, Kang Yang, Yu Yu. On Tweakable Correlation Robust Hashing against Key Leakages .Designs, Codes and Cryptography. 2025

(7) Shaoxuan Zhang, Chun Guo, Meiqin Wang. Towards Quantum Security of Hirose Compression Function and Romulus-H .ACISP 2025

(8) Xiaoning Guo, Chun Guo. Tight Bounds for Quantum Indistinguishability of Tweakable Random Permutations from Random Functions .Journal of Cryptologic Research

(9) Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weijia Wang. A Code-Based ISE to Protect Boolean Masking in Software .IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES 2025)

(10) Jiayi Ai, Chun Guo. Sequential Indifferentiability of 7-round Misty Structures .CT-RSA 2025

(11) Zhengyi Dai , Chun Guo, and Chao Li. UFLM: A unified framework for Feistel structure and Lai-Massey structure .INDOCRYPT 2024

(12) Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang and Xiao Wang. Leakage-Resilient Circuit Garbling .ACM CCS 2024

(13) Shaoxuan Zhang, Chun Guo and Qingju Wang. Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations .IET Information Security

(14) Chun Guo, Ling Song. Tight CCA Security for Contracting Quasi-Feistel Ciphers .Designs, Codes and Cryptography

(15) Chun Guo, Yiyuan Luo, Chenyu Xiao. Sequential Indifferentiability of 6-round Lai-Massey .Designs, Codes and Cryptography

(16) Chun Guo, Anjing Huang, Yu Yu. Quantum Q1 Security Proof for the FX Key-length Extension Construction .Journal of Cryptologic Research

(17) Yuqing Zhao and Chun Guo. Towards Minimizing Tweakable Blockcipher-based Generalized Feistel Networks .INDOCRYPT 2023

(18) Jiayun Zhou, Guofeng Qin, Lu Li, Chun Guo and Weijia Wang. ISA Extensions of Shuffling Against Side-channel Attacks .IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

(19) Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo and Hongrui Cui. Algebraic Attacks on Round-Reduced Rain and Full AIM-III .ASIACRYPT 2023

(20) Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei and Zeyu Xu. Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures .ICISC 2022

(21) Yuqing Zhao, Chun Guo and Weijia Wang. Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks .CANS 2023

(22) Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu. Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives .IACR Transactions on Symmetric Cryptology (FSE 2023)

(23) Chun Guo, Xiao Wang, Xiang Xie, Yu Yu. The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets .ACM Transactions on Privacy and Security (TOPS)

(24) Chun Guo, Lei Wang and Dongdai Lin. Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls .EUROCRYPT 2023

(25) Shanjie Xu, Qi Da, and Chun Guo. Chosen-Key Secure Even-Mansour Cipher from a Single Permutation .IACR Transactions on Symmetric Cryptology (FSE 2023)

(26) Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert. Secure Message Authentication in the Presence of Leakage and Faults .IACR Transactions on Symmetric Cryptology (FSE 2023)

(27) Akiko Inoue, Chun Guo, Kazuhiko Minematsu. Nonce-Misuse Resilience of Romulus-N and GIFT-COFB .IET Information Security (2023)

(28) Xin Miao, Chun Guo, Meiqin Wang and Weijia Wang. How Fast Can SM4 Be in Software? .Inscrypt 2022

(29) Shanjie Xu, Qi Da and Chun Guo. Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules) .Indocrypt 2022

(30) Zhongliang Zhang, Zhen Qin and Chun Guo. Just Tweak! Asymptotically Optimal Security for the Cascaded LRW1 Tweakable Blockcipher .Designs, Codes and Cryptography (2022)

(31) Yuan Gao and Chun Guo. Provable Security of HADES Structure .CANS 2022

(32) Shaoxuan Zhang, Chun Guo and Qingju Wang. Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations .Central European Conference on Cryptology - CECC 2022

(33) Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, and Yang Su. Side-channel Masking with Common Shares .IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES 2022)

(34) Chun Guo, Tetsu Iwata, and Kazuhiko Minematsu. New Indifferentiability Security Proof of MDPH Hash Function .IET Information Security

(35) Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo. BAT: An AND-RX Feistel Lightweight Block Cipher Supporting S-box-based Security Evaluations. .Designs, Codes, and Cryptography (2021)

(36) Qi Da, Shanjie Xu, and Chun Guo. Sequential Indifferentiability of Confusion-Diffusion Networks .Indocrypt 2021

(37) Francesco Berti, Chun Guo, Thomas Peters, and François-Xavier Standaert: Efficient Leakage-Resilient MACs without Idealized Assumptions .ASIACRYPT 2021

(38) Chun Guo, Francois-Xavier Standaert, Weijia Wang, Xiao Wang, and Yu Yu. Provable Security of SP Networks with Partial Non-Linear Layers .IACR Transactions on Symmetric Cryptology (FSE 2021) .2021

(39) Yuqing Zhao, Wenqi Yu, and Chun Guo. Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions .CT-RSA 2021

(40) Chun Guo and Guoyan Zhang. Beyond-Birthday Security for Permutation-based Feistel Networks .Designs, Codes, and Cryptography

(41) Chun Guo, Mustafa Khairallah, and Thomas Peyrin. AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family .NIST Lightweight Cryptography Workshop, 2020

(42) Wenqi Yu, Yuqing Zhao and Chun Guo. Provable Related-key Security of Contracting Feistel Networks .Inscrypt

(43) Zhenzhen Bao, Chun Guo, Jian Guo, Eik List, and Ling Song. Towards Closing the Security Gap of Tweak-aNd-Tweak .ASIACRYPT 2020

(44) Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers. Packed Multiplication: How to Amortize the Cost of Side-channel Masking? .ASIACRYPT 2020

(45) Yuan Gao, Chun Guo, Meiqin Wang, Weijia Wang, and Jiejing Wen. Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks .IACR Transactions on Symmetric Cryptology (FSE 2021)

(46) Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle .CRYPTO 2020 .2020

(47) Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, and Yu Yu. Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting) .CRYPTO 2020 .2020

(48) Zhenzhen Bao, Chun Guo, Jian Guo, and Ling Song. TNT: How to Tweak a Block Cipher .EUROCRYPT 2020

(49) Chun Guo, Olivier Pereira, Thomas Peters, and Francois-Xavier Standaert. Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction .IACR Transactions on Symmetric Cryptology (FSE 2020)

(50) Yaobin Shen, Chun Guo, and Lei Wang. Improved Security Bounds for Generalized Feistel Networks .IACR Transactions on Symmetric Cryptology (FSE 2020)

(51) Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaetan Cassiers, Sebastien Duval, Chun Guo, Gregor Leandery, Gaetan Leurentz, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, Francois-Xavier Standaert, Friedrich Wiemery. Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher .IACR Transactions on Symmetric Cryptology (FSE 2020) special issue for NIST LWC

(52) Chun Guo, Hailong Zhang, and Dongdai Lin. Estimating Differential-Linear Distinguishers and Applications to CTC2 .ISPEC 2015

(53) Chun Guo and Dongdai Lin. On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation .Theory of Cryptography -- TCC 2015

(54) Chun Guo and Dongdai Lin. A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers .ASIACRYPT 2015

(55) Chun Guo and Lei Wang. Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security .AISACRYPT 2018

(56) Chun Guo, Jonathan Katz, Xiao Wang, and Yu Yu. Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers .IEEE Symposium on Security and Privacy 2020

(57) Chun Guo, Olivier Pereira, Thomas Peters, and François-Xavier Standaert. Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions .LATINCRYPT 2019

(58) Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters, and François-Xavier Standaert. SpookChain: Chaining a Sponge-Based AEAD with Beyong-Birthday Security .SPACE 2019

(59) Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, and Xiangxue Li. Collision Resistant Hashing from Sub-exponential Learning Parity with Noise .ASIACRYPT 2019

(60) Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, and François-Xavier Standaert. Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions .Inscrypt 2019

(61) Chun Guo and Dongdai Lin. Improved Domain Extender for the Ideal Cipher .Cryptography and Communications

(62) Chun Guo and Dongdai Lin: Separating Invertible Key Derivations from Non-invertible Ones: Sequential Indifferentiability of 3-round Even-Mansour .Designs, Codes, and Cryptography

(63) Chun Guo, Yaobin Shen, Lei Wang, and Dawu Gu. Beyond-Birthday Secure Domain-Preserving PRFs from a Single Permutation .Designs, Codes and Cryptography

(64) Chun Guo. Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective .IEEE Transactions on Information Theory

(65) Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, and François-Xavier Standaert. TEDT, a Leakage Resilient AEAD mode for High (Physical) Security Applications .IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES 2020)

(66) Chun Guo, Francois-Xavier Standaert, Weijia Wang, and Yu Yu. Efficient Side-Channel Secure Message Authentication with Better Bounds .IACR Transactions on Symmetric Cryptology (FSE 2020)

组件异常,请联系管理员... 组件模板格式错误
Teaching Experience
Student Information
  • 张路鹏  2023-09-23 Hits:[] Times
  • 李瑞阳  2023-09-23 Hits:[] Times
  • 郭晓宁  2023-09-23 Hits:[] Times
  • 张绍煊  2023-09-23 Hits:[] Times
  • 樊昊  2023-09-23 Hits:[] Times
  • 车珺  2023-09-23 Hits:[] Times
  • 许善杰  2023-09-23 Hits:[] Times
  • 达祺  2023-09-23 Hits:[] Times
  • 高源  2023-09-23 Hits:[] Times
  • 赵玉庆  2020-03-20 Hits:[] Times
  • 于文奇  2020-03-20 Hits:[] Times
  • Copyright All Rights Reserved Shandong University Address: No. 27 Shanda South Road, Jinan City, Shandong Province, China: 250100
    Information desk: (86) - 0531-88395114
    On Duty Telephone: (86) - 0531-88364731 Construction and Maintenance: Information Work Office of Shandong University