TBD

[6] How Much can F5 Really Do

Jintai Ding University of Cincinnati, OH, USA Zheng Zhang University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA

TBD mathscidoc:2207.43131

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:45:49 uploaded by dingjt ] [ 649 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[7] The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes

Jintai Ding University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA Vishakha University of Cincinnati, OH, USA Bo-Yin Yang Institute of Information Science and Research Center of Information Technology and Innovation, Academia Sinica, 128 Section 2 Academia Road, Taipei 115-29, Taiwan

TBD mathscidoc:2207.43130

IACR Cryptol. ePrint Arch., 2020.9
[ Download ] [ 2022-07-22 17:39:37 uploaded by dingjt ] [ 578 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[8] Post-Quantum Anonymous Veto Networks

Jintai Ding University of Cincinnati, Ohio, USA Doug Emery University of Cincinnati, Ohio, USA Johannes Mueller SnT, University of Luxembourg, Luxembourg Peter Y. A. Ryan SnT, University of Luxembourg, Luxembourg Vonn Kee Wong University of Cincinnati, Ohio, USA

TBD mathscidoc:2207.43129

IACR Cryptol. ePrint Arch., 2020.8
[ Download ] [ 2022-07-22 17:37:52 uploaded by dingjt ] [ 2208 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[9] Improved Key Recovery of the HFEv- Signature Scheme

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China

TBD mathscidoc:2207.43128

IACR Cryptol. ePrint Arch., 2020.11
[ Download ] [ 2022-07-22 17:35:24 uploaded by dingjt ] [ 511 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[10] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 663 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved