[ASIACRYPT'23] SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
Qian Guo, Denis Nabokov , Alexander Nilsson, and Thomas Johansson
Advances in Cryptology–ASIACRYPT 2023.
[ASIACRYPT'21] Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS. [Springer]
Qian Guo, and Thomas Johansson
Advances in Cryptology–ASIACRYPT 2021.
[ASIACRYPT'20] A New Decryption Failure Attack against HQC. [Springer]
Qian Guo, and Thomas Johansson
Advances in Cryptology–ASIACRYPT 2020.
[Crypto'20] A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. [eprint]
Qian Guo, Thomas Johansson, and Alexander Nilsson,
Advances in Cryptology–CRYPTO 2020.
[ASIACRYPT'19] A Novel CCA Attack using Decryption Errors against LAC. [eprint]
Qian Guo, Thomas Johansson, and Jing Yang,
Advances in Cryptology–ASIACRYPT 2019, Kobe, Japan.
[ASIACRYPT'17] Coded-BKW with Sieving. [link]
Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski,
Advances in Cryptology–ASIACRYPT 2017, Hong Kong, China.
[ASIACRYPT'16] A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors. [eprint]
Qian Guo, Thomas Johansson, and Paul Stankovski,
Advances in Cryptology–ASIACRYPT 2016, Hanoi, Vietnam.
[Crypto'15] Coded-BKW: Solving LWE Using Lattice Codes. [eprint]
Qian Guo, Thomas Johansson, and Paul Stankovski,
Advances in Cryptology–CRYPTO 2015, Santa Barbara, CA, USA.
[ASIACRYPT'14] Solving LPN Using Covering Codes. [slides] [link]
Qian Guo, Thomas Johansson, and Carl Löndahl,
Advances in Cryptology–ASIACRYPT 2014, Kaohsiung, Taiwan, China.
Best Paper Award (1 out of 255 submissions)
[Security'24] Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Robin Leander Schröder, Stefan Gast, and Qian Guo
Usenix Security 2024. Acceptance rate: 18.32%.
[Security'24] Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
Qian Guo, Denis Nabokov, Elias Suvanto, and Thomas Johansson
Usenix Security 2024. Acceptance rate: 18.32%.
[TCHES/CHES'25] Multi-Value Plaintext-Checking and Full-Decryption Oracle Based Attacks on HQC from Offline Templates.
Haiyue Dong, Qian Guo
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(4): (2025), to appear.
[TCHES/CHES'25] OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates.
Haiyue Dong, Qian Guo
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1): (2025), to appear.
[TCHES/CHES'23] Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles.
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(1): (2023).
[TCHES/CHES'23] Cache-timing attack against HQC.
Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(3): (2023).
[TCHES/CHES'22] A Key-Recovery Side-Channel Attack on Classic McEliece Implementations.
Qian Guo, Andreas Johansson, and Thomas Johansson
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(4): (2022).
[TCHES/CHES'22] Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE. [eprint]
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, and Robin Leander Schröder
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(3): (2022).
[TCHES/CHES'21] A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM.
Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 676-707 (2021). https://eprint.iacr.org/2021/079
[TCHES/CHES'20] Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint. [eprint]
Qian Guo, Vincent Grosso, Francois-Xavier Standaert, and Olivier Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020(4): 209-238 (2020).
[IEEE TIT] A New Sieving-Style Information-Set Decoding Algorithm
Qian Guo, Thomas Johansson, Vu Nguyen
IEEE Trans. Inf. Theory, 2024.
[IEEE TIT] Revisiting the Concrete Security of Goldreich's Pseudorandom Generator.
Jing Yang, Qian Guo, Thomas Johansson, Michael Lentmaier
IEEE Trans. Inf. Theory 68(2): 1329-1354 (2022)https://arxiv.org/abs/2103.02668
[IEEE TIT] On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. [link]
Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski Wagner,
IEEE Transactions on Information Theory, Volume: 65 , Issue: 8 , Aug. 2019.
Extended version of [ASIACRYPT'17].
[IEEE TIT] A Key Recovery Reaction Attack on QC-MDPC. [link]
Qian Guo, Thomas Johansson, and Paul Stankovski Wagner,
IEEE Transactions on Information Theory, Vol.65, no. 3, pp. 1845-1861, 2019.
Extended version of [ASIACRYPT'16].
[IEEE TIT] A New Algorithm for Solving Ring-LPN with a Reducible Polynomial. [link]
Qian Guo, Thomas Johansson, and Carl Londahl,
IEEE Transactions on Information Theory, Vol. 61, no. 11, pp. 6204 - 6212, 2015.
On cryptology:
[PQCrypto'23]Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber [eprint]
Qian Guo, and Erik Mårtensson,
Post-Quantum Cryptography - 14th International Workshop (PQCrypto 2023), College Park, MD, USA,August, 2023.
[PKC'19] Decryption Failure Attacks on IND-CCA secure Lattice-Based Schemes. [link]
Jan-Pieter D’Anvers, Qian Guo, Thomas Johansson, Alexander Nilsson, Frederik Vercauteren, and Ingrid Verbauwhede,
22nd International Conference on Practice and Theory of Public Key Cryptography (PKC 2019), Beijing, 2019, pp.565-598.
[PQCrypto'17] A Reaction Attack on the QC-LDPC McEliece Cryptosystem. [eprint]
Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, and Thomas Johansson,
Post-Quantum Cryptography - 8th International Workshop (PQCrypto 2017), Utrecht, The Netherlands, June, 2017.
On cryptographic implementations:
[DATE'25] Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber.
Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng:
Design, Automation and Test in Europe Conference, DATE 2025, to appear.
[IndoCrypt'20] Making the BKW Algorithm Practical for LWE
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
INDOCRYPT 2020: 417-439.
[Cardis'17] Connecting and Improving Direct Sum Masking and Inner Product Masking. [link]
Romain Poussier, Qian Guo, Francois-Xavier Standaert, Claude Carlet, and Sylvain Guilley,
the 17th Smart Card Research and Advanced Application Conference (CARDIS 2017), Lugano, Switzerland, Nov. 2017.
On coding and information theory:
[ISIT'24] A Key-recovery Attack on the LCMQ Authentication Protocol.
Vu Nguyen, Thomas Johansson, Qian Guo
IEEE International Symposium on Information Theory Proceedings (ISIT 2024)
[ISIT'21] On the Sample Complexity of solving LWE using BKW-Style Algorithms.
Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
IEEE International Symposium on Information Theory Proceedings (ISIT 2021): 2405-2410
https://arxiv.org/abs/2102.02126
[WCC'19] Improved decoders for p-ary MDPC.
Isaac Canales-Martinez, Qian Guo, and Thomas Johansson,
The 11th international workshop on Coding and Cryptography (WCC 2019), Abbaye de Saint-Jacut de la Mer, France, March 31–April 5, 2019.
[ISIT'18] Ouroboros-E: An efficient Lattice-based Key-Exchange Protocol. [link]
Jean-Christophe Deneuville, Philippe Gaborit, Qian Guo, and Thomas Johansson,
IEEE International Symposium on Information Theory Proceedings (ISIT 2018), Vail, Colorado, USA, June, 2018.
[ISIT'17] Information Set Decoding with Soft Information and some cryptographic applications. [link]
Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski,
IEEE International Symposium on Information Theory Proceedings (ISIT 2017), Aachen, Germany, June, 2017.
[ISIT'16] A p-ary MDPC Scheme. [link]
Qian Guo, and Thomas Johansson,
IEEE International Symposium on Information Theory Proceedings (ISIT 2016), Barcelona, Spain, July, 2016.
[ISIT'13] An Efficient Interpolation-based Systematic Encoder for Low-rate Blaum-Roth Codes. [link]
Qian Guo, and Haibin Kan,
IEEE International Symposium on Information Theory Proceedings (ISIT 2013), Istanbul, Turkey, July, 2013.
[ICACT'12] Direct Erasure-only Decoding for Generalized Reed-Solomon codes. [link]
Man Liang, Qian Guo and Bin Wang,
Advanced Communication Technology (ICACT 2012), PyeongChang, Korea (South), Feb, 2012.
[ISIT'11] On Systematic Encoding for Blaum-Roth Codes. [link]
Qian Guo, and Haibin Kan,
IEEE International Symposium on Information Theory Proceedings (ISIT 2011), St. Petersburg, Russia, July, 2011.
[IACR CiC] The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber. [Link]
Qian Guo, Erik Mårtensson, Adrian Åström
IACR Communications in Cryptology, Issue 3, 2024.
[Cryptography&Communications] On the Sample Complexity of solving LWE using BKW-Style Algorithms. [Link]
Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
Cryptography and Communications, (2023). https://doi.org/10.1007/s12095-022-00597-0.
[Cryptography] Improvements on Making BKW Practical for Solving LWE.
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
Cryptography, 2021, 5(4), 31; https://doi.org/10.3390/cryptography5040031.
[JoC] Solving LPN Using Covering Codes. [link]
Qian Guo, Thomas Johansson, and Carl Löndahl,
Journal of Cryptology, Volume 33, Issue 1, pp 1–33, January 2020
Extended version of [ASIACRYPT'14].
[IPL] A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure. [eprint]
Qian Guo, and Thomas Johansson
Information Processing Letters, Vol 146, pp. 30-34, June 2019.
[AMC] Some Cryptanalytic and Coding Theoretic Applications of A Soft Stern Algorithm. [link] [Authors' Version]
Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski Wagner,
Advances in Mathematics of Communications (AMC), 13(4): 559-578, 2019.
Extended version of [ISIT'17].
[IEICE] Algorithms on Testing the Identity of the Trace Representations of Boolean Functions. [link]
Qian Guo, and Haibin Kan.
IEICE Transactions on Information and Systems Vol. 97-D(3), pp: 583-588, 2014.
[IPL] A Novel Elementary Construction of Matching Vectors. [link]
Chen Yuan, Qian Guo and Haibin Kan,
Information Processing Letters, Vol.112, no.12, pp. 494-496, 30 June, 2012.
[IEICE] An Efficient Interpolation Based Erasure-Only Decoder for High-Rate Reed-Solomon Codes. [link]
Qian Guo, and Haibin Kan.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.95-A(5), pp: 978-981, 2012.
Qian Guo, Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems. [pdf]
Lund University, Sweden, Dec. 2016.