Established in 2014, we are a group of cryptography researchers from Nanyang Technological University in Singapore. Supported by university and government research fundings, we focus on research of symmetric-key cryptology and privacy-preserving technologies. We are physically hosted by the Division of Mathematical Sciences of the School of Physical and Mathematical Sciences, have been part of Temasek Laboratories @ NTU, Coding and Cryptography Research Group, and Strategic Centre for Research in Privacy-Preserving Technologies and Systems (SCRIPTS), and in collaboration with Shanghai Jiao Tong University, China.
We are constantly hiring post-doctoral research fellows, and maintain a regular visitor/exchange program, if you are interested in joining or visiting us, please contact Jian Guo.
2021/03: NTU News release on the MITM Preimage Attack against 8-Round AES hashing.
2019/12: Invited talk at ASK 2019 on "Generic Attacks on Hash Combiners" by Zhenzhen Bao.
2019/03: Invited talk at FSE 2019 on "Security of SHA-3 and Related Constructions" by Jian Guo.
2018-03-05: Joint with L. Song, J. Guo, and D. Shi, the paper entitled "New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions" won the Kejte cryptanalysis prize.
2018-02-08: Joint with C. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song, the paper entitled "Key-Recovery Attacks on Full Kravatte" won the Best Paper Award of FSE 2018. The paper broke the full Kravatte (a PRF design based on the SHA-3 round function), and several subsequent patched versions.
2017-03-29: We received all 2 prizes of the SKINNY Cryptanalysis Competition 2016-2017, by the papers Related-Key Impossible-Differential Attack on Reduced-Round SKINNY and Security Analysis of SKINNY under Related-Tweakey Settings, refer to this announcement by the SKINNY team.
2016-07-11: We solved the 5-round collision challenge of Keccak[r=640,c=160, nr=5], refer to this announcement and acknowledgement by the Keccak Team.
2016-05-27: We solved the 5-round collision challenge of Keccak[r=1440,c=160, nr=5], refer to this announcement and acknowledgement by the Keccak Team.
2016-04-25: We solved the 3-round preimage challenge of Keccak[r=1440, c=160, nr=3] and Keccak[r=640, c=160, nr=3], refer to this announcement and acknowledgement by the Keccak Team.
[New] 2021/05: CATF has 2 open positions of (senior) postdoc research fellow for 1.5 years, on symmetric-key cryptography including but not limited to quantum attacks, cryptanalysis of AES and SHA-3, FHE/MPC friendly designs, automatic tools or machine learning for cryptanalysis (advertised here: https://www.iacr.org/jobs/item/2575).
Refer to this page if you are interested in joining as a PhD or FYP student.
FSE 2022 (PC: Zhenzhen Bao, Jian Guo)
FSE 2021 (PC: Zhenzhen Bao, Jian Guo); ASIACRYPT 2021 (GC: Jian Guo, PC: Zhenzhen Bao); Inscrypt (PC: Jian Guo); CFail (PC: Zhenzhen Bao, Jian Guo)
FSE 2020 (PC: Zhenzhen Bao, Ling Song); EUROCRYPT 2020 (PC: Jian Guo); ToSC Special Issue on Designs for the NIST Lightweight Standardisation Process (PC: Zhenzhen Bao); ACISP 2020 (PC: Zhenzhen Bao); ASIACRYPT 2020 (PC: Zhenzhen Bao, Jian Guo)
FSE 2019 (PC: Jian Guo, Ling Song); ASIACRYPT 2019 (PC: Zhenzhen Bao, Jian Guo)
FSE 2018 (PC: Jian Guo); EUROCRYPT 2018 (PC: Jian Guo); ASIACRYPT 2018 (PC: Ling Song)
FSE 2017 (PC: Jian Guo); ASIACRYPT 2017 (PC: Jian Guo)
Interests: Symmetric-Key Cryptography, Privacy-Preserving Technologies
Interests: Symmetric-Key Cryptography, Privacy-Preserving Technologies
Interests: Symmetric-Key Cryptography, Privacy-Preserving Technologies, Quantum Cryptanalysis
Interests: Symmetric-Key Cryptography
Affiliation: School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. 07/2018 -
Topic: Symmetric-Key Cryptography, Cryptanalysis and Machine Learning
Affiliation: School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. 07/2019 -
Topic: Quantum Cryptanalysis
Bing Sun National University of Defense Technology, China 17/01/2020 - 14/04/2020
Senyang Huang Haifa University, Israel 17/09/2019 - 07/12/2019
Wenying Zhang Shandong Normal University, China 27/08/2018 - 20/08/2019
Zheng Gong South China Normal University, China 21/01/2019 - 15/02/2019
Kazuhiko Minematsu NEC, Japan 12/12/2018 - 14/12/2018
Tetsu Iwata Nagoya University, Japan 12/02/2018 - 22/02/2018
Tetsu Iwata Nagoya University, Japan 17/10/2016 - 31/03/2017
Jingmei Liu Xidian University, China 01/03/2016 - 01/03/2017
Lei Wang Shanghai Jiao Tong University, China 04/02/2017 - 10/02/2017
Vesselin Velichkov Luxembourg University, Luxembourg 12/12/2016 - 16/12/2016
Qingju Wang Katholieke Universiteit Leuven, Belgium 08/08/2016 - 15/10/2016
Florian Mendel Graz University of Technology, Austria 28/09/2015 - 30/10/2015
Lei Zhang Chinese Academy of Sciences, China 26/09/2015 - 10/10/2015
Lei Wang Shanghai Jiao Tong University, China 20/09/2015 - 04/10/2015
Liting Zhang Chinese Academy of Sciences, China 28/08/2015 - 27/10/2015
Bing Sun National University of Defense Technology, China 13/07/2015 - 12/10/2015
Bin Zhang Chinese Academy of Sciences, China 17/11/2014 - 21/11/2014
Huaijin Wu Shanghai Jiao Tong University, China 01/09/2021 -
Eik List Bauhaus-Universität Weimar, Germany 03/02/2020 - 21/02/2020
Yucheng Chen Guangzhou University, China 03/12/2019 - 02/12/2020
Li Ma Institute of Information Engineering, China 20/11/2019 - 20/05/2020
Jiayuan Ye University of Science and Technology of China 04/07/2019 - 30/09/2019
Yongqing Li Shandong University, China 25/07/2019 - 16/09/2019
Shun Li Institute of Information Engineering, China 03/05/2019 - 17/05/2019
Phuong Pham Thi Minh VNU University of Science, Vietnam 21/01/2019 - 20/04/2019
Eik List Bauhaus-Universität Weimar, Germany 21/01/2019 - 08/02/2019
Tao Ye Guilin University of Electronic Technology, China 19/11/2018 - 18/12/2018
Xianrui Qin Shandong University, China 14/09/2018 - 10/12/2018
Tingting Cui Shandong University, China 10/02/2017 - 25/08/2017
Jiale Guo Shandong University, China 10/11/2016 - 02/03/2017
Ning Luo Shandong University, China 10/11/2016 - 14/02/2017
Guozhen Liu Shanghai Jiao Tong University, China 15/07/2016 - 31/02/2017
Guohong Liao South China Normal University, China 15/07/2016 - 12/10/2016
Kexin Qiao Chinese Academy of Sciences, China 01/12/2015 - 31/05/2016
Haoyang Wang Shandong University, China 01/08/2015 - 31/08/2015
Jingyuan Zhao Shandong University, China 17/02/2015 - 16/05/2015
Name Duration @ CATF Current Position
 B. Sun, K. Li, J. Guo, L. Qu: New Constructions of Complete Permutations, IEEE Transactions on Information Theory
 Z. Bao, X. Dong, J. Guo, Z. Li, D. Shi, S. Sun, X. Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing, EUROCRYPT 2021 [NTU News Release]
 S. Banik, Z. Bao, T. Isobe, H. Kubo, F. Liu, K. Minematsu, K. Sakamoto, N. Shibata, M. Shigeri: WARP: Revisiting GFN for Lightweight 128-bit Block Cipher, SAC 2020
 Z. Bao, J. Guo, E. List: Extended Truncated-differential Distinguishers on Round-reduced AES, FSE 2020/ToSC 2020 Issue 3
 C. Guo, J. Guo, E. List, L. Song: Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT), ASIACRYPT 2020
 Z. Xiang, X. Zeng, D. Lin, Z. Bao, S. Zhang: Optimizing Implementations of Linear Layers, FSE 2020/ToSC 2020 Issue 2
 Z. Bao, C. Guo, J. Guo, L. Song: TNT: How to Tweak a Block Cipher, EUROCRYPT 2020
 G. Liu, W. Qiu, Y. Tu: New Techniques for Searching Differential Trails in Keccak, FSE 2020/ToSC 2019 Issue 4
 Z. Bao, L. Ding, J. Guo, H. Wang, W. Zhang: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes, FSE 2020/ToSC 2019 Issue 4
 W. Zhang, M. Cao, J. Guo, E. Pasalic: Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY, FSE 2020/ToSC 2019 Issue 4
 Z. Bao, J. Guo, T. Iwata, K. Minematsu: ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption, FSE 2020/ToSC 2019 Issue 2
 Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang: Generic Attacks on Hash Combiners, Journal of Cryptology 2019 [web]
 J. Guo, G. Liao, G. Liu, M. Liu, K. Qiao, L. Song: Practical Collision Attacks against Round-Reduced SHA-3, Journal of Cryptology 2019 [web]
 L. Song, X. Qin, L. Hu: Boomerang Connectivity Table Revisited: Applications to SKINNY and AES, FSE 2019/ToSC 2019 Issue 1
 Z. Bao, J. Guo, S. Ling, Y. Sasaki: PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes, FSE 2019/ToSC 2019 Issue 1 [web]
 R. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo: Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion, FSE 2019/ToSC 2019 Issue 1
 C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song: Boomerang Connectivity Table: a New Cryptanalysis Tool, EUROCRYPT 2018
 Z. Bao, J. Guo, L. Wang: Functional Graph and Its Applications in Generic Attacks on Iterated Hash Constructions, FSE 2018 / ToSC 2018 Issue 1 [Experiment codes]
 C. Chaigneau, T. Fuhr, H. Gilbert, J. Guo, J. Jean, J. R. Reinhard, L. Song: Key-Recovery Attacks on Full Kravatte, FSE 2018 / ToSC 2018 Issue 1
~ the Best Paper Award, invited to JoC ~
 P. Derbez, T. Iwata, L. Sun, S. Sun, Y. Todo, H. Wang, Meiqin Wang: Cryptanalysis of AES-PRF and Its Dual, FSE 2019 / ToSC 2018 Issue 2
 L. Song, J. Guo: Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP, FSE 2019/ToSC 2018 Issue 3 [Verification codes]
 Y. Liu, Y. Sasaki, L. Song, G. Wang, Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes, SAC 2018
 Z. Bao, L. Wang, J. Guo, D. Gu: Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners, CRYPTO 2017. [Experiment codes]
 L. Song, G. Liao, J. Guo: Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak, CRYPTO 2017. [Keccak GPU implementations]
 K. Qiao, L. Song, M. Liu, J. Guo: New Collision Attacks on Round-Reduced Keccak, EUROCRYPT 2017.
 S. Banik, S. Pandey, T. Peyrin, Y. Sasaki, S. Sim, Y. Todo: GIFT: A Small Present, CHES 2017.
 S. Banik, T. Isobe, T. Cui, J. Guo: Some Cryptanalysis Results on Lizard, FSE 2018 / ToSC 2017 Issue 4
 G. Liu, M. Ghosh, L. Song: Security Analysis of SKINNY under Related-Tweakey Settings, FSE 2018 / ToSC 2017 Issue 3
 C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song: Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers, FSE 2018 / ToSC 2017 Issue 3
 S. Banik, A. Bogdanov, T. Isobe, M. B. Jepsen: Analysis of Software Countermeasures for Whitebox Encryption, FSE 2017 / ToSC 2017 Issue 1.
 S. Banik, A. Bogdanov, F. Regazzoni: Efficient Configurations for Block Ciphers with Unified ENC/DEC Paths. IEEE HOST 2017
 G. Zhang, M. Liu, A distinguisher on PRESENT-like permutations with application to SPONGENT, Journal of Science China Information Sciences, 2017
 S. Banik, T. Isobe and M. Morii: Analysis and Improvements of the Full Spritz Stream Cipher, IEICE Transactions A, 2017.
 R. Ankele, S. Banik, A. Chakrabarti, E. List, F. Mendel, S. Sim, G. Wang: Related Key Impossible Differential Attack on Reduced Round SKINNY, ACNS 2017.
 L. Wang, J. Guo, G. Zhang, J. Zhao, D. Gu: How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers, ASIACRYPT 2016.
 J. Guo, M. Liu, L. Song: Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak, ASIACRYPT 2016.
 B. Sun, M. Liu, J. Guo, L. Qu, V. Rijmen: New Insights on AES-Like SPN Ciphers, CRYPTO 2016.
 B. Sun, M. Liu, J. Guo, V. Rijmen, R. Li: Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis, EUROCRYPT 2016.
 M. Liu, S. Sim: Lightweight MDS Generalized Circulant Matrices, FSE 2016.
 S. Banik, T. Isobe: Cryptanalysis of the Full Spritz Stream Cipher, FSE 2016.
 J. Guo, J. Jean, I. Nikolić, Y. Sasaki: Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions, FSE 2017 / ToSC 2016 Issue 2.
 J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim: Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs, FSE 2017 / ToSC 2016 Issue 1.
 S. Banik, A. Bogdanov, T. Fanni, C. Sau, L. Raffo, F. Palumbo, F. Regazzoni: Adaptable AES Implementation with Power gating Support, ACM Computing Frontiers 2016.
 L. Song, Z. Huang, Q. Yang: Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA, ACISP 2016.
 D. Sijacic, A. Kidmose, B. Yang, S. Banik, B. Bilgin, A. Bogdanov, I. Verbauwhede: Hold your breath, PRIMATEs are lightweight, SAC 2016.
 S. Jha, S. Banik, T. Isobe, T. Ohigashi. Some results on the use of RC4 in TLS, Indocrypt 2016.
 S. Banik, A. Bogdanov, F. Regazzoni. Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core, Indocrypt 2016.