Mathematics

[51] Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange

Yue Qin China University of Geosciences, Wuhan, 430074, China Ruoyu Ding China University of Geosciences, Wuhan, 430074, China Chi Cheng China University of Geosciences, Wuhan, 430074, China Nina Bindel IQC and University of Waterloo, Waterloo, ON, Canada Yanbin Pan Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences Jintai Ding Tsinghua University, Beijing

TBD mathscidoc:2207.43134

IACR Cryptol. ePrint Arch., 2022.2
[ Download ] [ 2022-07-23 10:59:48 uploaded by dingjt ] [ 1232 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[52] Several Improvements on BKZ Algorithm

Ziyu Zhao Tsinghua University, Beijing Jintai Ding Tsinghua University, Beijing

TBD mathscidoc:2207.43133

IACR Cryptol. ePrint Arch., 2022.2
[ Download ] [ 2022-07-23 10:56:26 uploaded by dingjt ] [ 1306 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[53] The Distinguishing Attack on HFE

Joshua Deaton University of Cincinnati, OH, USA Jintai Ding University of Cincinnati, OH, USA

TBD mathscidoc:2207.43132

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:47:01 uploaded by dingjt ] [ 1188 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[54] How Much can F5 Really Do

Jintai Ding University of Cincinnati, OH, USA Zheng Zhang University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA

TBD mathscidoc:2207.43131

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:45:49 uploaded by dingjt ] [ 457 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[55] The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes

Jintai Ding University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA Vishakha University of Cincinnati, OH, USA Bo-Yin Yang Institute of Information Science and Research Center of Information Technology and Innovation, Academia Sinica, 128 Section 2 Academia Road, Taipei 115-29, Taiwan

TBD mathscidoc:2207.43130

IACR Cryptol. ePrint Arch., 2020.9
[ Download ] [ 2022-07-22 17:39:37 uploaded by dingjt ] [ 438 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[56] Post-Quantum Anonymous Veto Networks

Jintai Ding University of Cincinnati, Ohio, USA Doug Emery University of Cincinnati, Ohio, USA Johannes Mueller SnT, University of Luxembourg, Luxembourg Peter Y. A. Ryan SnT, University of Luxembourg, Luxembourg Vonn Kee Wong University of Cincinnati, Ohio, USA

TBD mathscidoc:2207.43129

IACR Cryptol. ePrint Arch., 2020.8
[ Download ] [ 2022-07-22 17:37:52 uploaded by dingjt ] [ 571 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[57] Improved Key Recovery of the HFEv- Signature Scheme

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China

TBD mathscidoc:2207.43128

IACR Cryptol. ePrint Arch., 2020.11
[ Download ] [ 2022-07-22 17:35:24 uploaded by dingjt ] [ 336 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[58] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 497 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[59] Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption

Jintai Ding University of Cincinnati Pedro Branco SQIG-IT; IST-Universidade de Lisboa Kevin Schmitt University of Cincinnati

TBD mathscidoc:2207.43126

IACR Cryptol. ePrint Arch., 2019.6
[ Download ] [ 2022-07-22 17:30:42 uploaded by dingjt ] [ 1035 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[60] Homomorphic Encryption Standard

Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai Vinod Vaikuntanathan

TBD mathscidoc:2207.43125

IACR Cryptol. ePrint Arch., 2019.8
[ Download ] [ 2022-07-22 17:25:49 uploaded by dingjt ] [ 422 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved