Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Jintai Ding
2010 – today
- 2013
[c45]
[c44]Chengdong Tao, Adama Diene, Shaohua Tang, Jintai Ding: Simple Matrix Scheme for Encryption. PQCrypto 2013: 231-242- 2012
[c43]Jintai Ding, Yanbin Pan, Yingpu Deng: An Algebraic Broadcast Attack against NTRU. ACISP 2012: 124-137
[c42]Jintai Ding, Ai Ren, Chengdong Tao: Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. Inscrypt 2012: 122-136
[i31]Jintai Ding, Dieter Schmidt: Algebraic attack on lattice based cryptosystems via solving equations over real numbers. IACR Cryptology ePrint Archive 2012: 94 (2012)
[i30]Jintai Ding: New cryptographic constructions using generalized learning with errors problem. IACR Cryptology ePrint Archive 2012: 387 (2012)
[i29]Jintai Ding: A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem. IACR Cryptology ePrint Archive 2012: 688 (2012)- 2011
[c41]Jintai Ding, Timothy J. Hodges: Inverting HFE Systems Is Quasi-Polynomial for All Fields. CRYPTO 2011: 724-742
[c40]Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin: Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. ISPEC 2011: 168-180
[c39]Daniel Cabarcas, Jintai Ding: Linear algebra to compute syzygies and Gröbner bases. ISSAC 2011: 67-74
[c38]Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen: High-Speed Hardware Implementation of Rainbow Signature on FPGAs. PQCrypto 2011: 228-243
[c37]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann: Towards Algebraic Cryptanalysis of HFE Challenge 2. ISA 2011: 123-131
[i28]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann: The Complexity Analysis of the MutantXL Family. IACR Cryptology ePrint Archive 2011: 36 (2011)
[i27]Shaohua Tang, Haibo Yi, Huan Chen, Guomin Chen, Jintai Ding: High-speed Hardware Implementation of Rainbow Signatures on FPGAs. IACR Cryptology ePrint Archive 2011: 155 (2011)
[i26]Shaohua Tang, Jintai Ding, Zhiming Yang: Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere. IACR Cryptology ePrint Archive 2011: 216 (2011)
[i25]Shaohua Tang, Jintai Ding, Yujun Liang: A Simple and Efficient New Group Key Management Approach Based on Linear Geometry. IACR Cryptology ePrint Archive 2011: 225 (2011)
[i24]Jintai Ding: Inverting the Square systems is exponential. IACR Cryptology ePrint Archive 2011: 275 (2011)
[i23]Jintai Ding, Thorsten Kleinjung: Degree of regularity for HFE-. IACR Cryptology ePrint Archive 2011: 570 (2011)- 2010
[c36]Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed: Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. AFRICACRYPT 2010: 69-81
[c35]Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner: Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. CANS 2010: 140-155
[c34]Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun: On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13
[c33]Jintai Ding, Timothy J. Hodges, Victoria Kruglov: Growth of the Ideal Generated by a Quadratic Boolean Function. PQCrypto 2010: 13-27
[c32]
[c31]Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding: Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. PQCrypto 2010: 41-60
[c30]Crystal Lee Clough, Jintai Ding: Secure Variants of the Square Encryption Scheme. PQCrypto 2010: 153-164
[i22]Jintai Ding: Solving LWE problem with bounded errors in polynomial time. IACR Cryptology ePrint Archive 2010: 558 (2010)
[i21]Jintai Ding: Fast Algorithm to solve a family of SIS problem with linfty norm. IACR Cryptology ePrint Archive 2010: 581 (2010)
2000 – 2009
- 2009
[c29]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner: Algebraic Attack on the MQQ Public Key Cryptosystem. CANS 2009: 392-401
[c28]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang: SSE Implementation of Multivariate PKCs on Modern x86 CPUs. CHES 2009: 33-48
[c27]Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen: Square, a New Multivariate Encryption Scheme. CT-RSA 2009: 252-264
[c26]Jeremy Erickson, Jintai Ding, Chris Christensen: Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. ICISC 2009: 73-86
[c25]Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin: MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. ICISC 2009: 87-100
[i20]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng: Could SFLASH be repaired? IACR Cryptology ePrint Archive 2009: 596 (2009)- 2008
[c24]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng: New Differential-Algebraic Attacks and Reparametrization of Rainbow. ACNS 2008: 242-257
[c23]Sundar Balasubramanian, Harold W. Carter, Andrey Bogdanov, Andy Rupp, Jintai Ding: Fast multivariate signature generation in hardware: The case of rainbow. ASAP 2008: 25-30
[c22]Sundar Balasubramanian, Andrey Bogdanov, Andy Rupp, Jintai Ding, Harold W. Carter: Fast Multivariate Signature Generation in Hardware: The Case of Rainbow. FCCM 2008: 281-282
[c21]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng: Could SFLASH be Repaired?. ICALP (2) 2008: 691-701
[c20]Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin: Breaking Instance II of New TTM Cryptosystems. IIH-MSP 2008: 1332-1335
[c19]
[c18]
[c17]Jintai Ding, John Wagner: Cryptanalysis of Rational Multivariate Public Key Cryptosystems. PQCrypto 2008: 124-136
[c16]Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann: MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. PQCrypto 2008: 203-215
[e1]Johannes Buchmann, Jintai Ding (Eds.): Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings. Lecture Notes in Computer Science 5299, Springer 2008, ISBN 978-3-540-88402-6
[i19]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng: New Differential-Algebraic Attacks and Reparametrization of Rainbow. IACR Cryptology ePrint Archive 2008: 108 (2008)
[i18]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann: Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL. IACR Cryptology ePrint Archive 2008: 451 (2008)
[i17]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Li, Bo-Yin Yang: Small Odd Prime Field Multivariate PKCs. IACR Cryptology ePrint Archive 2008: 498 (2008)
[i16]Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang: Odd-Char Multivariate Hidden Field Equations. IACR Cryptology ePrint Archive 2008: 543 (2008)- 2007
[c15]Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann: Analysis of the SMS4 Block Cipher. ACISP 2007: 158-170
[c14]Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner: Cryptanalysis of the TRMC-4 Public Key Cryptosystem. ACNS 2007: 104-115
[c13]
[c12]
[c11]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner: High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Public Key Cryptography 2007: 233-248
[c10]Jintai Ding, Christopher Wolf, Bo-Yin Yang: l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Public Key Cryptography 2007: 266-281
[i15]Jintai Ding, Bo-Yin Yang: Multivariates Polynomials for Hashing. IACR Cryptology ePrint Archive 2007: 137 (2007)
[i14]Xin Jiang, Jintai Ding, Lei Hu: Kipnis-Shamir's Attack on HFE Revisited. IACR Cryptology ePrint Archive 2007: 203 (2007)
[i13]Jintai Ding, Richard Lindner: Identifying Ideal Lattices. IACR Cryptology ePrint Archive 2007: 322 (2007)
[i12]Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Chia-Hsin Owen Chen, Vivien Dubois: Breaking the Symmetry: a Way to Resist the New Differential Attack. IACR Cryptology ePrint Archive 2007: 366 (2007)
[i11]Jintai Ding, John Wagner: Cryptanalysis of Rational Multivariate Public Key Cryptosystems. IACR Cryptology ePrint Archive 2007: 367 (2007)
[i10]Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding: Cryptanalysis of Two New Instances of TTM Cryptosystem. IACR Cryptology ePrint Archive 2007: 381 (2007)
[i9]Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding: Secure PRNGs from Specialized Polynomial Maps over Any Fq. IACR Cryptology ePrint Archive 2007: 405 (2007)- 2006
[b1]Jintai Ding, Jason E. Gower, Dieter Schmidt: Multivariate Public Key Cryptosystems. Advances in Information Security 25, Springer 2006, ISBN 978-0-387-32229-2, pp. 1-260
[j1]Jintai Ding, Dieter Schmidt, Zhijun Yin: Cryptanalysis of the new TTS scheme in CHES 2004. Int. J. Inf. Sec. 5(4): 231-240 (2006)
[c9]Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding: Breaking a New Instance of TTM Cryptosystems. ACNS 2006: 210-225
[c8]Jintai Ding, Jason E. Gower: Inoculating Multivariate Schemes Against Differential Attacks. Public Key Cryptography 2006: 290-301
[i8]Jintai Ding, Jason E. Gower, Dieter Schmidt: Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. IACR Cryptology ePrint Archive 2006: 38 (2006)
[i7]Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen: Note on Design Criteria for Rainbow-Type Multivariates. IACR Cryptology ePrint Archive 2006: 307 (2006)
[i6]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner: High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. IACR Cryptology ePrint Archive 2006: 336 (2006)- 2005
[c7]Jintai Ding, Dieter Schmidt: Rainbow, a New Multivariable Polynomial Signature Scheme. ACNS 2005: 164-175
[c6]Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye: Perturbed Hidden Matrix Cryptosystems. ICCSA (2) 2005: 595-602
[c5]Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi: Cryptanalysis of PASS II and MiniPass. ICICS 2005: 159-168
[c4]Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin: Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. IMA Int. Conf. 2005: 262-277
[c3]Jintai Ding, Dieter Schmidt: Cryptanalysis of HFEv and Internal Perturbation of HFE. Public Key Cryptography 2005: 288-301
[c2]Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin: Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. WCC 2005: 242-251
[i5]Jintai Ding, Jason E. Gower: Inoculating Multivariate Schemes Against Differential Attacks. IACR Cryptology ePrint Archive 2005: 255 (2005)- 2004
[c1]Jintai Ding: A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. Public Key Cryptography 2004: 305-318
[i4]Jintai Ding, Dieter Schmidt: Cryptanalysis of SFlash v3. IACR Cryptology ePrint Archive 2004: 103 (2004)
[i3]Jintai Ding, Dieter Schmidt: Multivariable public-key cryptosystems. IACR Cryptology ePrint Archive 2004: 350 (2004)- 2003
[i2]Jintai Ding, Timonthy Hodges: Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem. IACR Cryptology ePrint Archive 2003: 84 (2003)
[i1]Jintai Ding, Dieter Schmidt: A defect of the implementation schemes of the TTM cryptosystem. IACR Cryptology ePrint Archive 2003: 85 (2003)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:57 CEST by the dblp team



