Qian Guo

ORCID: 0000-0003-0930-3174
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Quantum Computing Algorithms and Architecture
  • Chaos-based Image/Signal Encryption
  • Quantum-Dot Cellular Automata
  • Cellular Automata and Applications
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Power Systems and Technologies
  • graph theory and CDMA systems
  • Embedded Systems and FPGA Design
  • Advanced Computational Techniques and Applications
  • High-Voltage Power Transmission Systems
  • Complexity and Algorithms in Graphs
  • Color perception and design
  • Error Correcting Code Techniques
  • Advanced Algorithms and Applications
  • DNA and Biological Computing
  • Evaluation and Optimization Models
  • Cryptography and Residue Arithmetic
  • Technology and Security Systems
  • Quinazolinone synthesis and applications
  • Innovative Educational Techniques
  • Information and Cyber Security
  • Synthesis and biological activity

Lund University
2015-2025

Harbin Institute of Technology
2025

Lanzhou Jiaotong University
2025

Wuhan University of Science and Technology
2022-2025

University of Hong Kong
2024

Beijing Anzhen Hospital
2024

Capital Medical University
2024

Guangxi University of Science and Technology
2023

China National Petroleum Corporation (China)
2023

Sanya University
2023

In this paper, we present a side-channel attack on first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and long-term secret from 24 traces using deep neural network created at profiling stage. The proposed message recovery approach learns higher-order model directly, without explicitly extracting random masks each execution. This eliminates need for fully controllable device which is required in previous attacks implementations...

10.46586/tches.v2021.i4.676-707 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2021-08-11

Well before large-scale quantum computers will be available, traditional cryptosystems must transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims standardize suitable cryptographic Candidates are evaluated not only on their formal security strengths, but also judged based the with regard resistance against side-channel attacks. Although round 3 candidates have already been intensively vetted such attacks, one important attack vector has hitherto missed: PQ schemes...

10.46586/tches.v2022.i3.223-263 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2022-06-08

Neddylation of the Cullin-RING E3 ligases (CRLs) regulates homeostasis approximately 20% cellular proteins. Defective in cullin neddylation 1 (DCN1), as a co-E3 ligase, interacts with UBE2M to enhance activation CRLs, and this interaction is emerging therapeutic target for human diseases. Here, we present series pyrimidin-based small molecular inhibitors targeting DCN1-UBE2M interaction. After finding novel inhibitor DC-1 IC50 = 1.2 μM, performed chemical optimizations, which finally led...

10.1021/acs.jmedchem.9b00003 article EN Journal of Medicinal Chemistry 2019-06-03

10.1109/tit.2024.3457150 article EN IEEE Transactions on Information Theory 2024-01-01

Side-channel resilience is a crucial feature when assessing whether postquantum cryptographic proposal sufficiently mature to be deployed. In this paper, we propose generic and efficient adaptive approach improve the sample complexity (i.e., required number of traces) plaintext-checking (PC) oracle-based sidechannel attacks (SCAs), major class key recovery chosen-ciphertext SCAs on lattice-based encapsulation mechanisms (KEMs). This new preferable constructed PC oracle imperfect, which...

10.46586/tches.v2023.i1.89-112 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2022-11-29

There are only eight approved small molecule antiviral drugs for treating COVID-19. Among them, four nucleotide analogues (remdesivir, JT001, molnupiravir, and azvudine), while the other protease inhibitors (nirmatrelvir, ensitrelvir, leritrelvir, simnotrelvir-ritonavir). Antiviral resistance, unfavourable drug‒drug interaction, toxicity have been reported in previous studies. Thus there is a dearth of new treatment options SARS-CoV-2. In this work, three-tier cell-based screening was...

10.1016/j.apsb.2024.05.026 article EN cc-by-nc-nd Acta Pharmaceutica Sinica B 2024-05-31

In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in NIST Post-quantum Cryptography Standardization Project. Our novel idea is to design an algorithm where submit special ciphertexts decryption oracle that correspond cases of single errors. Decoding such involves only entry large secret permutation, which part key. Through identified leakage additive FFT step used evaluate error locator polynomial, permutation can be determined....

10.46586/tches.v2022.i4.800-827 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2022-08-31

This paper proposes an intelligent orchard-picking system for agricultural machinery based on image processing technology. The uses binocular vision technology to obtain high-precision 3D point cloud data of fruit trees and the Mask RCNN algorithm detect segment fruit. design includes two parts: hardware selection software implementation. part mainly a camera, robot arm end actuator, while integrates preprocessing, target recognition positioning, path planning, grasp control. In simulation...

10.12694/scpe.v26i3.4324 article EN Scalable Computing Practice and Experience 2025-04-01

A ship’s diesel–electric hybrid power system is complex, with hardware configuration and energy management parameters being crucial to its economic performance. However, existing optimization methods typically involve designing optimizing the on basis of typical operating conditions, followed by design parameters, which makes it difficult achieve optimal Moreover, when co-optimizing configurations parameter relationships complex constraints often lead conventional algorithms converge slowly...

10.3390/jmse13040731 article EN cc-by Journal of Marine Science and Engineering 2025-04-05
Coming Soon ...