TBD

[51] A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope

Yue Qin China University of Geosciences, Wuhan 430074, China Chi Cheng China University of Geosciences, Wuhan 430074, China Jintai Ding University of Cincinnati, Cincinnati 45219, USA

TBD mathscidoc:2207.43086

ESORICS 2019, 504–520, 2019.9
[ Download ] [ 2022-07-15 10:51:35 uploaded by dingjt ] [ 516 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[52] A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange

Pedro Branco SQIG-Instituto de Telecomunicações, Lisbon, Portugal; Department of Mathematics, IST-University of Lisbon, Lisbon, Portugal Jintai Ding University of Cincinnati, Cincinnati, USA Manuel Goulão SQIG-Instituto de Telecomunicações, Lisbon, Portugal; Department of Mathematics, IST-University of Lisbon, Lisbon, Portugal Paulo Mateus SQIG-Instituto de Telecomunicações, Lisbon, Portugal; Department of Mathematics, IST-University of Lisbon, Lisbon, Portugal

TBD mathscidoc:2207.43085

IMACC 2019, 78–101, 2019.12
[ Download ] [ 2022-07-15 10:49:39 uploaded by dingjt ] [ 520 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[53] Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University Jintai Ding Department of Mathematical Sciences, University of Cincinnati Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University Saraswathy RV Department of Mathematical Sciences, University of Cincinnati Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University

TBD mathscidoc:2207.43084

International Journal of Network Security, 20, (5), 923-930, 2018.9
[ Download ] [ 2022-07-15 10:46:22 uploaded by dingjt ] [ 595 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[54] Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, P.R.China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH 45219 Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, P.R.China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, P.R.China

TBD mathscidoc:2207.43083

IEEE Transactions on Computers, 67, (11), 1584-1593, 2018.2
[ Download ] [ 2022-07-15 10:43:30 uploaded by dingjt ] [ 675 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[55] Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage

Jintai Ding University of Cincinnati, Cincinnati, USA Scott Fluhrer Cisco Systems, San Jose, USA Saraswathy Rv University of Cincinnati, Cincinnati, USA

TBD mathscidoc:2207.43082

ACISP 2018, 467–486, 2018.7
[ Download ] [ 2022-07-15 10:40:34 uploaded by dingjt ] [ 529 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved