Meet-in-the-Middle Attacks

List of co-authored works

          Meet-in-the-Middle Preimage Attacks against hash functions, occasionally for key recovery attacks on block ciphers and collisions.
  1. Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu: MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing, 2021
  2. Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT 2021
  3. Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. IACR Trans. Symmetric Cryptol. 2019(4): 318-347 (2019)
  4. Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou: (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145
  5. Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling: Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ACISP 2011: 433-438
  6. Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. ASIACRYPT 2010: 56-75
  7. Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang: Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597

    Demirci-Selçuk Meet-in-the-Middle Attacks, mainly for key recovery attacks against block ciphers

  8. Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Extended meet-in-the-middle attacks on some Feistel constructions. Des. Codes Cryptogr. 80(3): 587-618 (2016)
  9. Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Trans. Symmetric Cryptol. 2016(2): 307-337 (2016)
  10. Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Meet-in-the-Middle Attacks on Generic Feistel Constructions. ASIACRYPT (1) 2014: 458-477