Qian Guoaffiliated with the university
More filtering options
  1. 2017
  2. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson 2017 Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS, p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. Coded-BKW with Sieving: An Improved Algorithm for Solving the LWE Problem

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 323-346 (Lecture Notes in Computer Science; vol. 10624)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. 2016
  6. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson 2016 Jul 10 IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1356-1360 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  7. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski 2016 Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, Vol. 10031 LNCS, p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Qian Guo 2016 Department of Electrical and Information Technology, Lund University. 243 p.

    Research output: ThesisDoctoral Thesis (compilation)

  9. 2015
  10. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Löndahl, C. 2015 In : IEEE Transactions on Information Theory. 61, 11, p. 6204-6212

    Research output: Contribution to journalArticle

  11. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski 2015 Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215, p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. 2014
  13. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C. 2014 Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (eds.). Springer, Vol. 8873, p. 1-20

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding