Mathematics

[56] The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes

Jintai Ding University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA Vishakha University of Cincinnati, OH, USA Bo-Yin Yang Institute of Information Science and Research Center of Information Technology and Innovation, Academia Sinica, 128 Section 2 Academia Road, Taipei 115-29, Taiwan

TBD mathscidoc:2207.43130

IACR Cryptol. ePrint Arch., 2020.9
[ Download ] [ 2022-07-22 17:39:37 uploaded by dingjt ] [ 499 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[57] Post-Quantum Anonymous Veto Networks

Jintai Ding University of Cincinnati, Ohio, USA Doug Emery University of Cincinnati, Ohio, USA Johannes Mueller SnT, University of Luxembourg, Luxembourg Peter Y. A. Ryan SnT, University of Luxembourg, Luxembourg Vonn Kee Wong University of Cincinnati, Ohio, USA

TBD mathscidoc:2207.43129

IACR Cryptol. ePrint Arch., 2020.8
[ Download ] [ 2022-07-22 17:37:52 uploaded by dingjt ] [ 1638 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[58] Improved Key Recovery of the HFEv- Signature Scheme

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China

TBD mathscidoc:2207.43128

IACR Cryptol. ePrint Arch., 2020.11
[ Download ] [ 2022-07-22 17:35:24 uploaded by dingjt ] [ 396 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[59] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 562 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[60] Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption

Jintai Ding University of Cincinnati Pedro Branco SQIG-IT; IST-Universidade de Lisboa Kevin Schmitt University of Cincinnati

TBD mathscidoc:2207.43126

IACR Cryptol. ePrint Arch., 2019.6
[ Download ] [ 2022-07-22 17:30:42 uploaded by dingjt ] [ 1285 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved