


Остановите войну!
for scientists:


default search action
Jintai Ding
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c76]Ziyu Zhao
, Jintai Ding
:
Practical Improvements on BKZ Algorithm. CSCML 2023: 273-284 - 2022
- [j17]Rui Xu, Xu Wang, Kirill Morozov, Chi Cheng, Jintai Ding:
Revisiting group oriented secret sharing schemes. Inf. Sci. 589: 751-769 (2022) - [j16]Qingxuan Wang
, Chi Cheng
, Rui Xu, Jintai Ding
, Zhe Liu
:
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification. IEEE Trans. Serv. Comput. 15(4): 2226-2231 (2022) - [c75]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. ESORICS (1) 2022: 677-697 - [c74]Hao Guo
, Jintai Ding
:
Algebraic Relation of Three MinRank Algebraic Modelings. WAIFI 2022: 239-249 - [i69]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. IACR Cryptol. ePrint Arch. 2022: 131 (2022) - [i68]Ziyu Zhao, Jintai Ding:
Several Improvements on BKZ Algorithm. IACR Cryptol. ePrint Arch. 2022: 239 (2022) - [i67]Hao Guo, Jintai Ding:
Algebraic Relation of Three MinRank Algebraic Modelings. IACR Cryptol. ePrint Arch. 2022: 1226 (2022) - 2021
- [j15]Jintai Ding, Zheng Zhang, Joshua Deaton:
The singularity attack to the multivariate signature scheme HIMQ-3. Adv. Math. Commun. 15(1): 65-72 (2021) - [j14]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New complexity estimation on the Rainbow-Band-Separation attack. Theor. Comput. Sci. 896: 1-18 (2021) - [c73]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. ASIACRYPT (4) 2021: 92-121 - [c72]Chengdong Tao, Albrecht Petzoldt, Jintai Ding:
Efficient Key Recovery for All HFE Signature Variants. CRYPTO (1) 2021: 70-93 - [c71]Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang:
The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes. EUROCRYPT (1) 2021: 329-347 - [i66]Jintai Ding, Vlad Gheorghiu, András Gilyén, Sean Hallgren, Jianqiang Li:
Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems. CoRR abs/2111.00405 (2021) - [i65]Joshua Deaton, Jintai Ding:
The Distinguishing Attack on HFE. IACR Cryptol. ePrint Arch. 2021: 50 (2021) - [i64]Jintai Ding, Zheng Zhang, Joshua Deaton:
How Much can F5 Really Do. IACR Cryptol. ePrint Arch. 2021: 51 (2021) - [i63]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2021: 123 (2021) - 2020
- [b2]Jintai Ding
, Albrecht Petzoldt, Dieter S. Schmidt:
Multivariate Public Key Cryptosystems, Second Edition. Advances in Information Security 80, Springer 2020, ISBN 978-1-0716-0985-9, pp. 1-248 - [j13]Jintai Ding, Joshua Deaton, Kurt Schmidt:
Giophantus distinguishing attack is a low dimensional learning with errors problem. Adv. Math. Commun. 14(1): 171-175 (2020) - [j12]Jintai Ding, Sihem Mesnager, Lih-Chung Wang:
Letters for post-quantum cryptography standard evaluation. Adv. Math. Commun. 14(1) (2020) - [j11]Jintai Ding, Joshua Deaton, Kurt Schmidt:
Giophantus distinguishing attack is a low dimensional learning with errors problem. Adv. Math. Commun. 14(4): 573-577 (2020) - [c70]Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang:
Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. CRYPTO (3) 2020: 279-298 - [c69]Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang:
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3. ICICS 2020: 422-440 - [e3]Jintai Ding
, Jean-Pierre Tillich
:
Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings. Lecture Notes in Computer Science 12100, Springer 2020, ISBN 978-3-030-44222-4 [contents] - [i62]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. IACR Cryptol. ePrint Arch. 2020: 703 (2020) - [i61]Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang:
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes. IACR Cryptol. ePrint Arch. 2020: 967 (2020) - [i60]Jintai Ding, Doug Emery, Johannes Müller, Peter Y. A. Ryan, Vonn Kee Wong:
Post-Quantum Anonymous Veto Networks. IACR Cryptol. ePrint Arch. 2020: 1023 (2020) - [i59]Chengdong Tao, Albrecht Petzoldt, Jintai Ding:
Improved Key Recovery of the HFEv- Signature Scheme. IACR Cryptol. ePrint Arch. 2020: 1424 (2020)
2010 – 2019
- 2019
- [j10]Jiahui Chen
, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. Comput. J. 62(8): 1132-1147 (2019) - [j9]Xinwei Gao, Jintai Ding, R. V. Saraswathy, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. Int. J. High Perform. Comput. Netw. 13(2): 141-152 (2019) - [c68]Jintai Ding:
A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations. ACNS Workshops 2019: 97-107 - [c67]Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. ACNS 2019: 323-343 - [c66]Jintai Ding, Kevin Schmitt, Zheng Zhang:
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem. C2SI 2019: 105-117 - [c65]Yue Qin
, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. ESORICS (2) 2019: 504-520 - [c64]Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
:
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. IMACC 2019: 78-101 - [e2]Jintai Ding, Rainer Steinwandt:
Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11505, Springer 2019, ISBN 978-3-030-25509-1 [contents] - [i58]Jintai Ding, Chi Cheng, Yue Qin:
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). IACR Cryptol. ePrint Arch. 2019: 271 (2019) - [i57]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. IACR Cryptol. ePrint Arch. 2019: 435 (2019) - [i56]Jintai Ding, Pedro Branco, Kevin Schmitt:
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption. IACR Cryptol. ePrint Arch. 2019: 665 (2019) - [i55]Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. IACR Cryptol. ePrint Arch. 2019: 726 (2019) - [i54]Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha:
The Singularity Attack to the Multivariate Signature Scheme Himq-3. IACR Cryptol. ePrint Arch. 2019: 895 (2019) - [i53]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i52]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
LLL and stochastic sandpile models. IACR Cryptol. ePrint Arch. 2019: 1009 (2019) - [i51]Jintai Ding, Joshua Deaton, Zheng Zhang, Kurt Schmidt, Vishakha:
A Simple Key Reuse Attack on Ntru Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 1022 (2019) - [i50]Yue Qin, Chi Cheng, Jintai Ding:
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber. IACR Cryptol. ePrint Arch. 2019: 1343 (2019) - [i49]Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang:
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme. IACR Cryptol. ePrint Arch. 2019: 1490 (2019) - 2018
- [j8]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. Int. J. Netw. Secur. 20(5): 923-930 (2018) - [j7]Xinwei Gao
, Jintai Ding
, Lin Li, Jiqiang Liu
:
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018) - [c63]Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. ACISP 2018: 467-486 - [c62]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. PQCrypto 2018: 375-395 - [i48]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models. CoRR abs/1804.03285 (2018) - [i47]Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough:
How to validate the secret of a Ring Learning with Errors (RLWE) key. IACR Cryptol. ePrint Arch. 2018: 81 (2018) - [i46]Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption. IACR Cryptol. ePrint Arch. 2018: 1155 (2018) - 2017
- [j6]Jintai Ding, Albrecht Petzoldt:
Current State of Multivariate Cryptography. IEEE Secur. Priv. 15(4): 28-36 (2017) - [c61]Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. Inscrypt 2017: 99-116 - [c60]Jintai Ding, Saed Alsayigh
, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. CT-RSA 2017: 183-204 - [c59]Jintai Ding, Saed Alsayigh
, R. V. Saraswathy, Scott R. Fluhrer, Xiaodong Lin:
Leakage of signal function with reused keys in RLWE key exchange. ICC 2017: 1-6 - [c58]Xinwei Gao
, Lin Li, Jintai Ding
, Jiqiang Liu, R. V. Saraswathy, Zhe Liu:
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. ISPEC 2017: 551-565 - [c57]Saed Alsayigh
, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang
:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. IWSEC 2017: 19-35 - [c56]Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang:
HMFEv - An Efficient Multivariate Signature Scheme. PQCrypto 2017: 205-223 - [i45]Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. IACR Cryptol. ePrint Arch. 2017: 471 (2017) - [i44]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. IACR Cryptol. ePrint Arch. 2017: 1149 (2017) - [i43]Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. IACR Cryptol. ePrint Arch. 2017: 1178 (2017) - [i42]Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage. IACR Cryptol. ePrint Arch. 2017: 1185 (2017) - [i41]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS. IACR Cryptol. ePrint Arch. 2017: 1192 (2017) - [i40]Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. IACR Cryptol. ePrint Arch. 2017: 1196 (2017) - 2016
- [c55]Jintai Ding, Momonari Kudo
, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. IWSEC 2016: 305-315 - [c54]Alan Szepieniec, Jintai Ding, Bart Preneel
:
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems. PQCrypto 2016: 182-196 - [i39]Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang:
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 10 (2016) - [i38]Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld. IACR Cryptol. ePrint Arch. 2016: 552 (2016) - [i37]Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott R. Fluhrer:
Leakage of Signal function with reused keys in RLWE key exchange. IACR Cryptol. ePrint Arch. 2016: 1176 (2016) - 2015
- [j5]Chengdong Tao, Hong Xiang, Albrecht Petzoldt, Jintai Ding:
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption. Finite Fields Their Appl. 35: 352-368 (2015) - [c53]Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding:
Design Principles for HFEv- Based Multivariate Signature Schemes. ASIACRYPT (1) 2015: 311-334 - [c52]Jiang Zhang
, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen:
Authenticated Key Exchange from Ideal Lattices. EUROCRYPT (2) 2015: 719-751 - [i36]Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. IACR Cryptol. ePrint Arch. 2015: 18 (2015) - [i35]Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2015: 1184 (2015) - [i34]Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction. IACR Cryptol. ePrint Arch. 2015: 1229 (2015) - 2014
- [j4]Qinglong Wang, Jintai Ding:
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. Cryptologia 38(4): 370-376 (2014) - [j3]Jintai Ding, Crystal Clough, Roberto Araújo:
Inverting square systems algebraically is exponential. Finite Fields Their Appl. 26: 32-48 (2014) - [j2]Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang:
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distributed Syst. 25(12): 3253-3263 (2014) - [c51]Jintai Ding, Albrecht Petzoldt, Lih-Chung Wang:
The Cubic Simple Matrix Encryption Scheme. PQCrypto 2014: 76-87 - [c50]Jaiberth Porras, John Baena, Jintai Ding:
ZHFE, a New Multivariate Public Key Encryption Scheme. PQCrypto 2014: 229-245 - [i33]Jintai Ding, Chengdong Tao:
A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD. IACR Cryptol. ePrint Arch. 2014: 42 (2014) - [i32]Jaiberth Porras, John Baena, Jintai Ding:
New candidates for multivariate trapdoor functions. IACR Cryptol. ePrint Arch. 2014: 387 (2014) - [i31]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook:
Authenticated Key Exchange from Ideal Lattices. IACR Cryptol. ePrint Arch. 2014: 589 (2014) - 2013
- [c49]Jintai Ding, Dieter Schmidt:
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields. Number Theory and Cryptography 2013: 34-49 - [c48]Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai:
A variant of rainbow with shorter secret key and faster signature generation. AsiaPKC@AsiaCCS 2013: 57-62 - [c47]Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng:
A Practical Attack on Patched MIFARE Classic. Inscrypt 2013: 150-164 - [c46]Jintai Ding, Bo-Yin Yang:
Degree of Regularity for HFEv and HFEv-. PQCrypto 2013: 52-66 - [c45]Chengdong Tao, Adama Diene, Shaohua Tang, Jintai Ding:
Simple Matrix Scheme for Encryption. PQCrypto 2013: 231-242 - [p2]Jintai Ding:
Multivariate cryptographic systems. Handbook of Finite Fields 2013: 764-783 - 2012
- [c44]Jintai Ding, Yanbin Pan, Yingpu Deng:
An Algebraic Broadcast Attack against NTRU. ACISP 2012: 124-137 - [c43]Jintai Ding, Ai Ren, Chengdong Tao:
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. Inscrypt 2012: 122-136 - [i30]Jintai Ding, Dieter Schmidt:
Algebraic attack on lattice based cryptosystems via solving equations over real numbers. IACR Cryptol. ePrint Arch. 2012: 94 (2012) - [i29]Jintai Ding:
New cryptographic constructions using generalized learning with errors problem. IACR Cryptol. ePrint Arch. 2012: 387 (2012) - [i28]Jintai Ding:
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem. IACR Cryptol. ePrint Arch. 2012: 688 (2012) - 2011
- [c42]Jintai Ding, Timothy J. Hodges:
Inverting HFE Systems Is Quasi-Polynomial for All Fields. CRYPTO 2011: 724-742 - [c41]Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin:
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. ISPEC 2011: 168-180 - [c40]Daniel Cabarcas, Jintai Ding:
Linear algebra to compute syzygies and Gröbner bases. ISSAC 2011: 67-74 - [c39]Jintai Ding:
Algebraic solvers for certain lattice-related problems. ITW 2011: 405-409 - [c38]Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen:
High-Speed Hardware Implementation of Rainbow Signature on FPGAs. PQCrypto 2011: 228-243 - [c37]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann:
Towards Algebraic Cryptanalysis of HFE Challenge 2. ISA 2011: 123-131 - [i27]Shaohua Tang, Jintai Ding, Zhiming Yang:
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere. IACR Cryptol. ePrint Arch. 2011: 216 (2011) - [i26]Shaohua Tang, Jintai Ding, Yujun Liang:
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry. IACR Cryptol. ePrint Arch. 2011: 225 (2011) - [i25]Jintai Ding:
Inverting the Square systems is exponential. IACR Cryptol. ePrint Arch. 2011: 275 (2011) - [i24]Jintai Ding, Thorsten Kleinjung:
Degree of regularity for HFE-. IACR Cryptol. ePrint Arch. 2011: 570 (2011) - 2010
- [c36]Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed:
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. AFRICACRYPT 2010: 69-81 - [c35]Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed
, Fabian Werner:
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. CANS 2010: 140-155 - [c34]Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun:
On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13 - [c33]Jintai Ding, Timothy J. Hodges, Victoria Kruglov:
Growth of the Ideal Generated by a Quadratic Boolean Function. PQCrypto 2010: 13-27 - [c32]Jintai Ding, Dieter Schmidt:
Mutant Zhuang-Zi Algorithm. PQCrypto 2010: 28-40 - [c31]Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding:
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. PQCrypto 2010: 41-60 - [c30]Crystal Lee Clough, Jintai Ding:
Secure Variants of the Square Encryption Scheme. PQCrypto 2010: 153-164 - [i23]Jintai Ding:
Solving LWE problem with bounded errors in polynomial time. IACR Cryptol. ePrint Arch. 2010: 558 (2010) - [i22]Jintai Ding:
Fast Algorithm to solve a family of SIS problem with linfty norm. IACR Cryptol. ePrint Arch. 2010: 581 (2010)
2000 – 2009
- 2009
- [c29]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner:
Algebraic Attack on the MQQ Public Key Cryptosystem. CANS 2009: 392-401 - [c28]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang:
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. CHES 2009: 33-48 - [c27]Crystal Clough, John Baena
, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen:
Square, a New Multivariate Encryption Scheme. CT-RSA 2009: 252-264 - [c26]Jeremy Erickson, Jintai Ding, Chris Christensen:
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. ICISC 2009: 73-86 - [c25]Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin:
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. ICISC 2009: 87-100 - [p1]Olivier Billet, Jintai Ding:
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography. Gröbner Bases, Coding, and Cryptography 2009: 263-283 - [i21]