default search action
Jintai Ding
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c80]Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding:
Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification. CANS (1) 2024: 3-25 - [c79]Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA Signature Scheme. PQCrypto (2) 2024: 79-91 - [c78]Hao Guo, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding:
Practical and Theoretical Cryptanalysis of VOX. PQCrypto (2) 2024: 186-208 - [c77]Zhen Liu, Vishakha, Jintai Ding, Chi Cheng, Yanbin Pan:
An Improved Practical Key Mismatch Attack Against NTRU. PQCrypto (1) 2024: 322-342 - [i74]Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA signature scheme. IACR Cryptol. ePrint Arch. 2024: 110 (2024) - [i73]Hao Guo, Jintai Ding:
A Practical MinRank Attack Against VOX. IACR Cryptol. ePrint Arch. 2024: 166 (2024) - [i72]Ziyu Zhao, Jintai Ding, Bo-Yin Yang:
BGJ15 Revisited: Sieving with Streamed Memory Access. IACR Cryptol. ePrint Arch. 2024: 739 (2024) - [i71]Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, Chia-Chun Wang:
A Note on the SNOVA Security. IACR Cryptol. ePrint Arch. 2024: 1517 (2024) - 2023
- [j18]Jintai Ding, Vlad Gheorghiu, András Gilyén, Sean Hallgren, Jianqiang Li:
Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems. Quantum 7: 1069 (2023) - [c76]Ziyu Zhao, Jintai Ding:
Practical Improvements on BKZ Algorithm. CSCML 2023: 273-284 - [i70]Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding:
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification. IACR Cryptol. ePrint Arch. 2023: 1863 (2023) - 2022
- [j17]Rui Xu, Xu Wang, Kirill Morozov, Chi Cheng, Jintai Ding:
Revisiting group oriented secret sharing schemes. Inf. Sci. 589: 751-769 (2022) - [j16]Qingxuan Wang, Chi Cheng, Rui Xu, Jintai Ding, Zhe Liu:
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification. IEEE Trans. Serv. Comput. 15(4): 2226-2231 (2022) - [c75]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. ESORICS (1) 2022: 677-697 - [c74]Hao Guo, Jintai Ding:
Algebraic Relation of Three MinRank Algebraic Modelings. WAIFI 2022: 239-249 - [i69]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. IACR Cryptol. ePrint Arch. 2022: 131 (2022) - [i68]Ziyu Zhao, Jintai Ding:
Several Improvements on BKZ Algorithm. IACR Cryptol. ePrint Arch. 2022: 239 (2022) - [i67]Hao Guo, Jintai Ding:
Algebraic Relation of Three MinRank Algebraic Modelings. IACR Cryptol. ePrint Arch. 2022: 1226 (2022) - 2021
- [j15]Jintai Ding, Zheng Zhang, Joshua Deaton:
The singularity attack to the multivariate signature scheme HIMQ-3. Adv. Math. Commun. 15(1): 65-72 (2021) - [j14]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New complexity estimation on the Rainbow-Band-Separation attack. Theor. Comput. Sci. 896: 1-18 (2021) - [c73]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. ASIACRYPT (4) 2021: 92-121 - [c72]Chengdong Tao, Albrecht Petzoldt, Jintai Ding:
Efficient Key Recovery for All HFE Signature Variants. CRYPTO (1) 2021: 70-93 - [c71]Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang:
The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes. EUROCRYPT (1) 2021: 329-347 - [i66]Jintai Ding, Vlad Gheorghiu, András Gilyén, Sean Hallgren, Jianqiang Li:
Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems. CoRR abs/2111.00405 (2021) - [i65]Joshua Deaton, Jintai Ding:
The Distinguishing Attack on HFE. IACR Cryptol. ePrint Arch. 2021: 50 (2021) - [i64]Jintai Ding, Zheng Zhang, Joshua Deaton:
How Much can F5 Really Do. IACR Cryptol. ePrint Arch. 2021: 51 (2021) - [i63]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2021: 123 (2021) - 2020
- [b2]Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt:
Multivariate Public Key Cryptosystems, Second Edition. Advances in Information Security 80, Springer 2020, ISBN 978-1-0716-0985-9, pp. 1-248 - [j13]Jintai Ding, Joshua Deaton, Kurt Schmidt:
Giophantus distinguishing attack is a low dimensional learning with errors problem. Adv. Math. Commun. 14(1): 171-175 (2020) - [j12]Jintai Ding, Sihem Mesnager, Lih-Chung Wang:
Letters for post-quantum cryptography standard evaluation. Adv. Math. Commun. 14(1) (2020) - [j11]Jintai Ding, Joshua Deaton, Kurt Schmidt:
Giophantus distinguishing attack is a low dimensional learning with errors problem. Adv. Math. Commun. 14(4): 573-577 (2020) - [c70]Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang:
Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. CRYPTO (3) 2020: 279-298 - [c69]Jintai Ding, Zheng Zhang, Joshua Deaton, Lih-Chung Wang:
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3. ICICS 2020: 422-440 - [e3]Jintai Ding, Jean-Pierre Tillich:
Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings. Lecture Notes in Computer Science 12100, Springer 2020, ISBN 978-3-030-44222-4 [contents] - [i62]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. IACR Cryptol. ePrint Arch. 2020: 703 (2020) - [i61]Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang:
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes. IACR Cryptol. ePrint Arch. 2020: 967 (2020) - [i60]Jintai Ding, Doug Emery, Johannes Müller, Peter Y. A. Ryan, Vonn Kee Wong:
Post-Quantum Anonymous Veto Networks. IACR Cryptol. ePrint Arch. 2020: 1023 (2020) - [i59]Chengdong Tao, Albrecht Petzoldt, Jintai Ding:
Improved Key Recovery of the HFEv- Signature Scheme. IACR Cryptol. ePrint Arch. 2020: 1424 (2020)
2010 – 2019
- 2019
- [j10]Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. Comput. J. 62(8): 1132-1147 (2019) - [j9]Xinwei Gao, Jintai Ding, R. V. Saraswathy, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. Int. J. High Perform. Comput. Netw. 13(2): 141-152 (2019) - [c68]Jintai Ding:
A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations. ACNS Workshops 2019: 97-107 - [c67]Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. ACNS 2019: 323-343 - [c66]Jintai Ding, Kevin Schmitt, Zheng Zhang:
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem. C2SI 2019: 105-117 - [c65]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. ESORICS (2) 2019: 504-520 - [c64]Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. IMACC 2019: 78-101 - [e2]Jintai Ding, Rainer Steinwandt:
Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11505, Springer 2019, ISBN 978-3-030-25509-1 [contents] - [i58]Jintai Ding, Chi Cheng, Yue Qin:
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). IACR Cryptol. ePrint Arch. 2019: 271 (2019) - [i57]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. IACR Cryptol. ePrint Arch. 2019: 435 (2019) - [i56]Jintai Ding, Pedro Branco, Kevin Schmitt:
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption. IACR Cryptol. ePrint Arch. 2019: 665 (2019) - [i55]Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. IACR Cryptol. ePrint Arch. 2019: 726 (2019) - [i54]Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha:
The Singularity Attack to the Multivariate Signature Scheme Himq-3. IACR Cryptol. ePrint Arch. 2019: 895 (2019) - [i53]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i52]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
LLL and stochastic sandpile models. IACR Cryptol. ePrint Arch. 2019: 1009 (2019) - [i51]Jintai Ding, Joshua Deaton, Zheng Zhang, Kurt Schmidt, Vishakha:
A Simple Key Reuse Attack on Ntru Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 1022 (2019) - [i50]Yue Qin, Chi Cheng, Jintai Ding:
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber. IACR Cryptol. ePrint Arch. 2019: 1343 (2019) - [i49]Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang:
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme. IACR Cryptol. ePrint Arch. 2019: 1490 (2019) - 2018
- [j8]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. Int. J. Netw. Secur. 20(5): 923-930 (2018) - [j7]Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu:
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018) - [c63]Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. ACISP 2018: 467-486 - [c62]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. PQCrypto 2018: 375-395 - [i48]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models. CoRR abs/1804.03285 (2018) - [i47]Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough:
How to validate the secret of a Ring Learning with Errors (RLWE) key. IACR Cryptol. ePrint Arch. 2018: 81 (2018) - [i46]Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption. IACR Cryptol. ePrint Arch. 2018: 1155 (2018) - 2017
- [j6]Jintai Ding, Albrecht Petzoldt:
Current State of Multivariate Cryptography. IEEE Secur. Priv. 15(4): 28-36 (2017) - [c61]Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. Inscrypt 2017: 99-116 - [c60]Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. CT-RSA 2017: 183-204 - [c59]Jintai Ding, Saed Alsayigh, R. V. Saraswathy, Scott R. Fluhrer, Xiaodong Lin:
Leakage of signal function with reused keys in RLWE key exchange. ICC 2017: 1-6 - [c58]Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu:
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. ISPEC 2017: 551-565 - [c57]Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. IWSEC 2017: 19-35 - [c56]Albrecht Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang:
HMFEv - An Efficient Multivariate Signature Scheme. PQCrypto 2017: 205-223 - [i45]Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. IACR Cryptol. ePrint Arch. 2017: 471 (2017) - [i44]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. IACR Cryptol. ePrint Arch. 2017: 1149 (2017) - [i43]Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. IACR Cryptol. ePrint Arch. 2017: 1178 (2017) - [i42]Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage. IACR Cryptol. ePrint Arch. 2017: 1185 (2017) - [i41]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS. IACR Cryptol. ePrint Arch. 2017: 1192 (2017) - [i40]Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. IACR Cryptol. ePrint Arch. 2017: 1196 (2017) - 2016
- [c55]Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. IWSEC 2016: 305-315 - [c54]Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems. PQCrypto 2016: 182-196 - [i39]Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang:
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 10 (2016) - [i38]Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld. IACR Cryptol. ePrint Arch. 2016: 552 (2016) - [i37]Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott R. Fluhrer:
Leakage of Signal function with reused keys in RLWE key exchange. IACR Cryptol. ePrint Arch. 2016: 1176 (2016) - 2015
- [j5]Chengdong Tao, Hong Xiang, Albrecht Petzoldt, Jintai Ding:
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption. Finite Fields Their Appl. 35: 352-368 (2015) - [c53]Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding:
Design Principles for HFEv- Based Multivariate Signature Schemes. ASIACRYPT (1) 2015: 311-334 - [c52]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen:
Authenticated Key Exchange from Ideal Lattices. EUROCRYPT (2) 2015: 719-751 - [i36]Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. IACR Cryptol. ePrint Arch. 2015: 18 (2015) - [i35]Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2015: 1184 (2015) - [i34]Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction. IACR Cryptol. ePrint Arch. 2015: 1229 (2015) - 2014
- [j4]Qinglong Wang, Jintai Ding:
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. Cryptologia 38(4): 370-376 (2014) - [j3]Jintai Ding, Crystal Clough, Roberto Araújo:
Inverting square systems algebraically is exponential. Finite Fields Their Appl. 26: 32-48 (2014) - [j2]Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang:
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distributed Syst. 25(12): 3253-3263 (2014) - [c51]Jintai Ding, Albrecht Petzoldt, Lih-Chung Wang:
The Cubic Simple Matrix Encryption Scheme. PQCrypto 2014: 76-87 - [c50]Jaiberth Porras, John Baena, Jintai Ding:
ZHFE, a New Multivariate Public Key Encryption Scheme. PQCrypto 2014: 229-245 - [i33]Jintai Ding, Chengdong Tao:
A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD. IACR Cryptol. ePrint Arch. 2014: 42 (2014) - [i32]Jaiberth Porras, John Baena, Jintai Ding:
New candidates for multivariate trapdoor functions. IACR Cryptol. ePrint Arch. 2014: 387 (2014) - [i31]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook:
Authenticated Key Exchange from Ideal Lattices. IACR Cryptol. ePrint Arch. 2014: 589 (2014) - 2013
- [c49]Jintai Ding, Dieter Schmidt:
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields. Number Theory and Cryptography 2013: 34-49 - [c48]Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai:
A variant of rainbow with shorter secret key and faster signature generation. AsiaPKC@AsiaCCS 2013: 57-62 - [c47]Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng:
A Practical Attack on Patched MIFARE Classic. Inscrypt 2013: 150-164 - [c46]Jintai Ding, Bo-Yin Yang:
Degree of Regularity for HFEv and HFEv-. PQCrypto 2013: 52-66 - [c45]Chengdong Tao, Adama Diene, Shaohua Tang, Jintai Ding:
Simple Matrix Scheme for Encryption. PQCrypto 2013: 231-242 - [p2]Jintai Ding:
Multivariate cryptographic systems. Handbook of Finite Fields 2013: 764-783 - 2012
- [c44]Jintai Ding, Yanbin Pan, Yingpu Deng:
An Algebraic Broadcast Attack against NTRU. ACISP 2012: 124-137 - [c43]Jintai Ding, Ai Ren, Chengdong Tao:
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. Inscrypt 2012: 122-136 - [i30]Jintai Ding, Dieter Schmidt:
Algebraic attack on lattice based cryptosystems via solving equations over real numbers. IACR Cryptol. ePrint Arch. 2012: 94 (2012) - [i29]Jintai Ding:
New cryptographic constructions using generalized learning with errors problem. IACR Cryptol. ePrint Arch. 2012: 387 (2012) - [i28]Jintai Ding:
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem. IACR Cryptol. ePrint Arch. 2012: 688 (2012) - 2011
- [c42]Jintai Ding, Timothy J. Hodges:
Inverting HFE Systems Is Quasi-Polynomial for All Fields. CRYPTO 2011: 724-742 - [c41]Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin:
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. ISPEC 2011: 168-180 - [c40]Daniel Cabarcas, Jintai Ding:
Linear algebra to compute syzygies and Gröbner bases. ISSAC 2011: 67-74 - [c39]Jintai Ding:
Algebraic solvers for certain lattice-related problems. ITW 2011: 405-409 - [c38]Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen:
High-Speed Hardware Implementation of Rainbow Signature on FPGAs. PQCrypto 2011: 228-243 - [c37]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann:
Towards Algebraic Cryptanalysis of HFE Challenge 2. ISA 2011: 123-131 - [i27]Shaohua Tang, Jintai Ding, Zhiming Yang:
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere. IACR Cryptol. ePrint Arch. 2011: 216 (2011) - [i26]Shaohua Tang, Jintai Ding, Yujun Liang:
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry. IACR Cryptol. ePrint Arch. 2011: 225 (2011) - [i25]Jintai Ding:
Inverting the Square systems is exponential. IACR Cryptol. ePrint Arch. 2011: 275 (2011) - [i24]Jintai Ding, Thorsten Kleinjung:
Degree of regularity for HFE-. IACR Cryptol. ePrint Arch. 2011: 570 (2011) - 2010
- [c36]Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed:
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. AFRICACRYPT 2010: 69-81 - [c35]Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner:
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. CANS 2010: 140-155 - [c34]Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun:
On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13 - [c33]Jintai Ding, Timothy J. Hodges, Victoria Kruglov:
Growth of the Ideal Generated by a Quadratic Boolean Function. PQCrypto 2010: 13-27 - [c32]Jintai Ding, Dieter Schmidt:
Mutant Zhuang-Zi Algorithm. PQCrypto 2010: 28-40 - [c31]Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding:
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. PQCrypto 2010: 41-60 - [c30]Crystal Lee Clough, Jintai Ding:
Secure Variants of the Square Encryption Scheme. PQCrypto 2010: 153-164 - [i23]Jintai Ding:
Solving LWE problem with bounded errors in polynomial time. IACR Cryptol. ePrint Arch. 2010: 558 (2010) - [i22]Jintai Ding:
Fast Algorithm to solve a family of SIS problem with linfty norm. IACR Cryptol. ePrint Arch. 2010: 581 (2010)
2000 – 2009
- 2009
- [c29]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner:
Algebraic Attack on the MQQ Public Key Cryptosystem. CANS 2009: 392-401 - [c28]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang:
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. CHES 2009: 33-48 - [c27]Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen:
Square, a New Multivariate Encryption Scheme. CT-RSA 2009: 252-264 - [c26]Jeremy Erickson, Jintai Ding, Chris Christensen:
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. ICISC 2009: 73-86 - [c25]Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin:
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. ICISC 2009: 87-100 - [p1]Olivier Billet, Jintai Ding:
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography. Gröbner Bases, Coding, and Cryptography 2009: 263-283 - [i21]Johannes Buchmann, Jintai Ding, Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed:
MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis. Symmetric Cryptography 2009 - [i20]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be repaired? IACR Cryptol. ePrint Arch. 2009: 596 (2009) - 2008
- [c24]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. ACNS 2008: 242-257 - [c23]Sundar Balasubramanian, Harold W. Carter, Andrey Bogdanov, Andy Rupp, Jintai Ding:
Fast multivariate signature generation in hardware: The case of rainbow. ASAP 2008: 25-30 - [c22]Sundar Balasubramanian, Andrey Bogdanov, Andy Rupp, Jintai Ding, Harold W. Carter:
Fast Multivariate Signature Generation in Hardware: The Case of Rainbow. FCCM 2008: 281-282 - [c21]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be Repaired?. ICALP (2) 2008: 691-701 - [c20]Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin:
Breaking Instance II of New TTM Cryptosystems. IIH-MSP 2008: 1332-1335 - [c19]Jintai Ding, Dieter Schmidt, Fabian Werner:
Algebraic Attack on HFE Revisited. ISC 2008: 215-227 - [c18]John Baena, Crystal Clough, Jintai Ding:
Square-Vinegar Signature Scheme. PQCrypto 2008: 17-30 - [c17]Jintai Ding, John Wagner:
Cryptanalysis of Rational Multivariate Public Key Cryptosystems. PQCrypto 2008: 124-136 - [c16]Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann:
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. PQCrypto 2008: 203-215 - [e1]Johannes Buchmann, Jintai Ding:
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings. Lecture Notes in Computer Science 5299, Springer 2008, ISBN 978-3-540-88402-6 [contents] - [i19]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. IACR Cryptol. ePrint Arch. 2008: 108 (2008) - [i18]Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann:
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL. IACR Cryptol. ePrint Arch. 2008: 451 (2008) - [i17]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Li, Bo-Yin Yang:
Small Odd Prime Field Multivariate PKCs. IACR Cryptol. ePrint Arch. 2008: 498 (2008) - [i16]Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang:
Odd-Char Multivariate Hidden Field Equations. IACR Cryptol. ePrint Arch. 2008: 543 (2008) - 2007
- [c15]Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann:
Analysis of the SMS4 Block Cipher. ACISP 2007: 158-170 - [c14]Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. ACNS 2007: 104-115 - [c13]Jintai Ding, Bo-Yin Yang:
Multivariates Polynomials for Hashing. Inscrypt 2007: 358-371 - [c12]Xin Jiang, Jintai Ding, Lei Hu:
Kipnis-Shamir Attack on HFE Revisited. Inscrypt 2007: 399-411 - [c11]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Public Key Cryptography 2007: 233-248 - [c10]Jintai Ding, Christopher Wolf, Bo-Yin Yang:
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Public Key Cryptography 2007: 266-281 - [i15]Jintai Ding, Bo-Yin Yang:
Multivariates Polynomials for Hashing. IACR Cryptol. ePrint Arch. 2007: 137 (2007) - [i14]Xin Jiang, Jintai Ding, Lei Hu:
Kipnis-Shamir's Attack on HFE Revisited. IACR Cryptol. ePrint Arch. 2007: 203 (2007) - [i13]Jintai Ding, Richard Lindner:
Identifying Ideal Lattices. IACR Cryptol. ePrint Arch. 2007: 322 (2007) - [i12]Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Chia-Hsin Owen Chen, Vivien Dubois:
Breaking the Symmetry: a Way to Resist the New Differential Attack. IACR Cryptol. ePrint Arch. 2007: 366 (2007) - [i11]Jintai Ding, John Wagner:
Cryptanalysis of Rational Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2007: 367 (2007) - [i10]Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding:
Cryptanalysis of Two New Instances of TTM Cryptosystem. IACR Cryptol. ePrint Arch. 2007: 381 (2007) - [i9]Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding:
Secure PRNGs from Specialized Polynomial Maps over Any Fq. IACR Cryptol. ePrint Arch. 2007: 405 (2007) - 2006
- [b1]Jintai Ding, Jason E. Gower, Dieter Schmidt:
Multivariate Public Key Cryptosystems. Advances in Information Security 25, Springer 2006, ISBN 978-0-387-32229-2, pp. 1-260 - [j1]Jintai Ding, Dieter Schmidt, Zhijun Yin:
Cryptanalysis of the new TTS scheme in CHES 2004. Int. J. Inf. Sec. 5(4): 231-240 (2006) - [c9]Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding:
Breaking a New Instance of TTM Cryptosystems. ACNS 2006: 210-225 - [c8]Jintai Ding, Jason E. Gower:
Inoculating Multivariate Schemes Against Differential Attacks. Public Key Cryptography 2006: 290-301 - [i8]Jintai Ding, Jason E. Gower, Dieter Schmidt:
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. IACR Cryptol. ePrint Arch. 2006: 38 (2006) - [i7]Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen:
Note on Design Criteria for Rainbow-Type Multivariates. IACR Cryptol. ePrint Arch. 2006: 307 (2006) - [i6]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2006: 336 (2006) - 2005
- [c7]Jintai Ding, Dieter Schmidt:
Rainbow, a New Multivariable Polynomial Signature Scheme. ACNS 2005: 164-175 - [c6]Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye:
Perturbed Hidden Matrix Cryptosystems. ICCSA (2) 2005: 595-602 - [c5]Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi:
Cryptanalysis of PASS II and MiniPass. ICICS 2005: 159-168 - [c4]Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin:
Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. IMACC 2005: 262-277 - [c3]Jintai Ding, Dieter Schmidt:
Cryptanalysis of HFEv and Internal Perturbation of HFE. Public Key Cryptography 2005: 288-301 - [c2]Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin:
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. WCC 2005: 242-251 - [i5]Jintai Ding, Jason E. Gower:
Inoculating Multivariate Schemes Against Differential Attacks. IACR Cryptol. ePrint Arch. 2005: 255 (2005) - 2004
- [c1]Jintai Ding:
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. Public Key Cryptography 2004: 305-318 - [i4]Jintai Ding, Dieter Schmidt:
Cryptanalysis of SFlash v3. IACR Cryptol. ePrint Arch. 2004: 103 (2004) - [i3]Jintai Ding, Dieter Schmidt:
Multivariable public-key cryptosystems. IACR Cryptol. ePrint Arch. 2004: 350 (2004) - 2003
- [i2]Jintai Ding, Timonthy Hodges:
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem. IACR Cryptol. ePrint Arch. 2003: 84 (2003) - [i1]Jintai Ding, Dieter Schmidt:
A defect of the implementation schemes of the TTM cryptosystem. IACR Cryptol. ePrint Arch. 2003: 85 (2003)
Coauthor Index
aka: Saraswathy RV
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint