Mathematics

[26] A simplified multilayer perceptron detector for the hybrid WENO scheme

Zhengyang Xue University of Science and Technology of China Yinhua Xia University of Science and Technology of China Chen Li State Key Laboratory of Aerodynamics Xianxu Yuan State Key Laboratory of Aerodynamics

Numerical Analysis and Scientific Computing mathscidoc:2208.25003

Computers and Fluids, 244, 105584, 2022.8
[ Download ] [ 2022-08-24 11:12:20 uploaded by yhxia ] [ 255 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[27] A new hybrid WENO scheme with the high-frequency region for hyperbolic conservation laws

Yifei Wan University of Science and Technology of China Yinhua Xia University of Science and Technology of China

Numerical Analysis and Scientific Computing mathscidoc:2208.25002

Communications on Applied Mathematics and Computation, 2021.7
[ Download ] [ 2022-08-24 11:07:10 uploaded by yhxia ] [ 413 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[28] Arbitrary Lagrangian-Eulerian discontinuous Galerkin methods for KdV type equations

Xue Hong University of Science and Technology of China Yinhua Xia University of Science and Technology of China

Numerical Analysis and Scientific Computing mathscidoc:2208.25001

Communications on Applied Mathematics and Computation, 4, 530-562, 2022.6
[ Download ] [ 2022-08-24 11:02:30 uploaded by yhxia ] [ 396 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[29] A dichotomy on the self-similarity of graph-directed attractors

Kenneth J. Falconer University of St-Andrews, Scotland, UK Jiaxin Hu Department of Mathematical Sciences, Tsinghua University, Beijing, China Junda Zhang Department of Mathematical Sciences, Tsinghua University, Beijing, China

Dynamical Systems mathscidoc:2208.11001

2022.8
[ Download ] [ 2022-08-10 09:09:35 uploaded by jiaxinhu ] [ 337 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[30] The weak elliptic Harnack inequality revisited

Jiaxin Hu Department of Mathematical Sciences, Tsinghua University, Beijing, China Zhenyu Yu Department of Mathematical Sciences, Tsinghua University, Beijing, China

Geometric Analysis and Geometric Topology mathscidoc:2208.15001

2022.4
[ Download ] [ 2022-08-10 09:05:34 uploaded by jiaxinhu ] [ 285 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[31] Continuity Scaling: A Rigorous Framework for Detecting and Quantifying Causality Accurately

Xiong Ying Fudan University Si-Yang Leng Fudan University Huan-Fei Ma Soochow University Qing Nie University of California, Irvine Ying-Cheng Lai Arizona State University Wei Lin Fudan University

Dynamical Systems Data Analysis, Bio-Statistics, Bio-Mathematics Data Analysis mathscidoc:2207.11002

RESEARCH, 2022, 9870149, 2022.5
[ Download ] [ 2022-07-31 15:14:15 uploaded by wlinfudan ] [ 321 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[32] Rank-one sheaves and stable pairs on surfaces

Thomas Goller Korea Institute for Advanced Study Yinbang Lin Tongji University

Algebraic Geometry mathscidoc:2207.45003

Advances in Mathematics, 401, 2022.6
[ Download ] [ 2022-07-31 10:12:03 uploaded by yinbanglin ] [ 286 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[33] Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems

Jintai Ding University of Cincinnati, OH, USA; Yau Math. Sci. Center, Tsinghua University; Ding Lab, Beijing Institute of Mathematical Sciences and Applications Vlad Gheorghiu softwareQ Inc.; Institute for Quantum Computing / Dept. of Combinatorics & Optimization, University of Waterloo, ON, Canada András Gilyén Institute for Quantum Information and Matter, Caltech, Pasadena CA, USA; Alfréd Rényi Institute of Mathematics, Budapest, Hungary Sean Hallgren Department of Computer Science and Engineering, Pennsylvania State University, PA, USA Jianqiang Li Department of Computer Science and Engineering, Pennsylvania State University, PA, USA

TBD mathscidoc:2207.43135

arXiv, 2021.10
[ Download ] [ 2022-07-23 11:02:55 uploaded by dingjt ] [ 232 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[34] Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange

Yue Qin China University of Geosciences, Wuhan, 430074, China Ruoyu Ding China University of Geosciences, Wuhan, 430074, China Chi Cheng China University of Geosciences, Wuhan, 430074, China Nina Bindel IQC and University of Waterloo, Waterloo, ON, Canada Yanbin Pan Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences Jintai Ding Tsinghua University, Beijing

TBD mathscidoc:2207.43134

IACR Cryptol. ePrint Arch., 2022.2
[ Download ] [ 2022-07-23 10:59:48 uploaded by dingjt ] [ 245 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[35] Several Improvements on BKZ Algorithm

Ziyu Zhao Tsinghua University, Beijing Jintai Ding Tsinghua University, Beijing

TBD mathscidoc:2207.43133

IACR Cryptol. ePrint Arch., 2022.2
[ Download ] [ 2022-07-23 10:56:26 uploaded by dingjt ] [ 254 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[36] The Distinguishing Attack on HFE

Joshua Deaton University of Cincinnati, OH, USA Jintai Ding University of Cincinnati, OH, USA

TBD mathscidoc:2207.43132

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:47:01 uploaded by dingjt ] [ 228 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[37] How Much can F5 Really Do

Jintai Ding University of Cincinnati, OH, USA Zheng Zhang University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA

TBD mathscidoc:2207.43131

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:45:49 uploaded by dingjt ] [ 190 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[38] The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes

Jintai Ding University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA Vishakha University of Cincinnati, OH, USA Bo-Yin Yang Institute of Information Science and Research Center of Information Technology and Innovation, Academia Sinica, 128 Section 2 Academia Road, Taipei 115-29, Taiwan

TBD mathscidoc:2207.43130

IACR Cryptol. ePrint Arch., 2020.9
[ Download ] [ 2022-07-22 17:39:37 uploaded by dingjt ] [ 145 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[39] Post-Quantum Anonymous Veto Networks

Jintai Ding University of Cincinnati, Ohio, USA Doug Emery University of Cincinnati, Ohio, USA Johannes Mueller SnT, University of Luxembourg, Luxembourg Peter Y. A. Ryan SnT, University of Luxembourg, Luxembourg Vonn Kee Wong University of Cincinnati, Ohio, USA

TBD mathscidoc:2207.43129

IACR Cryptol. ePrint Arch., 2020.8
[ Download ] [ 2022-07-22 17:37:52 uploaded by dingjt ] [ 200 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[40] Improved Key Recovery of the HFEv- Signature Scheme

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China

TBD mathscidoc:2207.43128

IACR Cryptol. ePrint Arch., 2020.11
[ Download ] [ 2022-07-22 17:35:24 uploaded by dingjt ] [ 152 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[41] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 174 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[42] Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption

Jintai Ding University of Cincinnati Pedro Branco SQIG-IT; IST-Universidade de Lisboa Kevin Schmitt University of Cincinnati

TBD mathscidoc:2207.43126

IACR Cryptol. ePrint Arch., 2019.6
[ Download ] [ 2022-07-22 17:30:42 uploaded by dingjt ] [ 164 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[43] Homomorphic Encryption Standard

Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai Vinod Vaikuntanathan

TBD mathscidoc:2207.43125

IACR Cryptol. ePrint Arch., 2019.8
[ Download ] [ 2022-07-22 17:25:49 uploaded by dingjt ] [ 225 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[44] A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem

Jintai Ding Joshua Deaton Kurt Schmidt Vishakha Zheng Zhang

TBD mathscidoc:2207.43124

IACR Cryptol. ePrint Arch., 2020.6
[ Download ] [ 2022-07-22 17:19:06 uploaded by dingjt ] [ 116 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[45] An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber

Yue Qin Chi Cheng Jintai Ding

TBD mathscidoc:2207.43123

IACR Cryptol. ePrint Arch., 2019.11
[ Download ] [ 2022-07-22 17:16:41 uploaded by dingjt ] [ 121 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[46] LLL and stochastic sandpile models

Jintai Ding Seungki Kim Tsuyoshi Takagi Yuntao Wang

Number Theory arXiv subject: Statistical Mechanics (cond-mat.stat-mech) mathscidoc:2207.24001

arXiv, 2020.3
[ Download ] [ 2022-07-22 17:11:34 uploaded by dingjt ] [ 248 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[47] How to validate the secret of a Ring Learning with Errors (RLWE) key

Jintai Ding University of Cincinnati Saraswathy RV University of Cincinnati Saed Alsayigh University of Cincinnati Crystal Clough University of Cincinnati

TBD mathscidoc:2207.43122

IACR Cryptol. ePrint Arch., 2018.1
[ Download ] [ 2022-07-22 17:01:54 uploaded by dingjt ] [ 156 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[48] Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption

Pedro Branco SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Jintai Ding Department of Mathematical Sciences, University of Cincinnati Manuel Goulão SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Paulo Mateus SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa

TBD mathscidoc:2207.43121

IACR Cryptol. ePrint Arch., 2018.12
[ Download ] [ 2022-07-22 16:59:22 uploaded by dingjt ] [ 171 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[49] Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree

Jacob Alperin-Sheriff National Institute for Standards and Technology, Gaithersburg, Maryland, USA Jintai Ding University of Cincinnati, Ohio, USA Albrecht Petzoldt National Institute for Standards and Technology, Gaithersburg, Maryland, USA Daniel Smith Tone National Institute for Standards and Technology, Gaithersburg, Maryland, USA; University of Louisville, Kentucky, USA

TBD mathscidoc:2207.43120

IACR Cryptol. ePrint Arch., 2017.5
[ Download ] [ 2022-07-22 16:56:32 uploaded by dingjt ] [ 121 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[50] Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA R.V. Saraswathy Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China

TBD mathscidoc:2207.43119

International Journal of High Performance Computing and Networking, 13, (2), 2019.1
[ Download ] [ 2022-07-22 16:53:27 uploaded by dingjt ] [ 216 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved