Mathematics

[61] A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem

Jintai Ding Joshua Deaton Kurt Schmidt Vishakha Zheng Zhang

TBD mathscidoc:2207.43124

IACR Cryptol. ePrint Arch., 2020.6
[ Download ] [ 2022-07-22 17:19:06 uploaded by dingjt ] [ 256 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[62] An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber

Yue Qin Chi Cheng Jintai Ding

TBD mathscidoc:2207.43123

IACR Cryptol. ePrint Arch., 2019.11
[ Download ] [ 2022-07-22 17:16:41 uploaded by dingjt ] [ 299 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[63] LLL and stochastic sandpile models

Jintai Ding Seungki Kim Tsuyoshi Takagi Yuntao Wang

Number Theory arXiv subject: Statistical Mechanics (cond-mat.stat-mech) mathscidoc:2207.24001

arXiv, 2020.3
[ Download ] [ 2022-07-22 17:11:34 uploaded by dingjt ] [ 1310 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[64] How to validate the secret of a Ring Learning with Errors (RLWE) key

Jintai Ding University of Cincinnati Saraswathy RV University of Cincinnati Saed Alsayigh University of Cincinnati Crystal Clough University of Cincinnati

TBD mathscidoc:2207.43122

IACR Cryptol. ePrint Arch., 2018.1
[ Download ] [ 2022-07-22 17:01:54 uploaded by dingjt ] [ 441 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[65] Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption

Pedro Branco SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Jintai Ding Department of Mathematical Sciences, University of Cincinnati Manuel Goulão SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Paulo Mateus SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa

TBD mathscidoc:2207.43121

IACR Cryptol. ePrint Arch., 2018.12
[ Download ] [ 2022-07-22 16:59:22 uploaded by dingjt ] [ 364 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[66] Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree

Jacob Alperin-Sheriff National Institute for Standards and Technology, Gaithersburg, Maryland, USA Jintai Ding University of Cincinnati, Ohio, USA Albrecht Petzoldt National Institute for Standards and Technology, Gaithersburg, Maryland, USA Daniel Smith Tone National Institute for Standards and Technology, Gaithersburg, Maryland, USA; University of Louisville, Kentucky, USA

TBD mathscidoc:2207.43120

IACR Cryptol. ePrint Arch., 2017.5
[ Download ] [ 2022-07-22 16:56:32 uploaded by dingjt ] [ 234 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[67] Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA R.V. Saraswathy Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China

TBD mathscidoc:2207.43119

International Journal of High Performance Computing and Networking, 13, (2), 2019.1
[ Download ] [ 2022-07-22 16:53:27 uploaded by dingjt ] [ 406 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[68] Eliminating Decryption Failures from the Simple Matrix Encryption Scheme

Albrecht Petzoldt Kyushu University, Fukuoka, Japan Jintai Ding University of Cincinnati, Ohio, USA Lih-Chung Wang National Dong Hwa University, Taiwan

TBD mathscidoc:2207.43118

IACR Cryptol. ePrint Arch., 2016.1
[ Download ] [ 2022-07-22 16:38:07 uploaded by dingjt ] [ 308 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[69] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld

Jintai Ding University of Cincinnati Saed Alsayigh University of Cincinnati Jean Lancrenon University of Luxembourg Saraswathy RV University of Cincinnati Michael Snook University of Cincinnati

TBD mathscidoc:2207.43117

IACR Cryptol. ePrint Arch., 2016.6
[ Download ] [ 2022-07-22 16:36:05 uploaded by dingjt ] [ 1324 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[70] A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups

Jintai Ding Department of Mathematics, University of Cincinnati, OH, USA Alexei Miasnikov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA Alexander Ushakov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA

Information Theory mathscidoc:2207.19003

IACR Cryptol. ePrint Arch., 2015.1
[ Download ] [ 2022-07-22 16:32:41 uploaded by dingjt ] [ 1121 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved