Information Theory

[1] A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups

Jintai Ding Department of Mathematics, University of Cincinnati, OH, USA Alexei Miasnikov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA Alexander Ushakov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA

Information Theory mathscidoc:2207.19003

IACR Cryptol. ePrint Arch., 2015.1
[ Download ] [ 2022-07-22 16:32:41 uploaded by dingjt ] [ 1092 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[2] Giophantus distinguishing attack is a low dimensional learning with errors problem

Jintai Ding University of Cincinnati, Cincinnati, OH 45219, USA Joshua Deaton University of Cincinnati, Cincinnati, OH 45219, USA Kurt Schmidt University of Cincinnati, Cincinnati, OH 45219, USA

Information Theory mathscidoc:2207.19002

Advances in Mathematics of Communications, 14, (4), 573-577, 2020.11
[ Download ] [ 2022-07-15 11:11:21 uploaded by dingjt ] [ 1112 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[3] Inverting square systems algebraically is exponential

Jintai Ding CPS Lab, Chongqing University, China; Department of Mathematical Sciences, University of Cincinnati, USA Crystal Clough Department of Mathematical Sciences, University of Cincinnati, USA Roberto Araujo Faculdade de Computação, Universidade Federal do Pará, Brazil

Information Theory Algebraic Geometry mathscidoc:2207.19001

Finite Fields and Their Applications, 26, 32-48, 2014.3
[ Download ] [ 2022-07-14 14:37:09 uploaded by dingjt ] [ 1215 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved