TBD

[1] Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems

Jintai Ding University of Cincinnati, OH, USA; Yau Math. Sci. Center, Tsinghua University; Ding Lab, Beijing Institute of Mathematical Sciences and Applications Vlad Gheorghiu softwareQ Inc.; Institute for Quantum Computing / Dept. of Combinatorics & Optimization, University of Waterloo, ON, Canada András Gilyén Institute for Quantum Information and Matter, Caltech, Pasadena CA, USA; Alfréd Rényi Institute of Mathematics, Budapest, Hungary Sean Hallgren Department of Computer Science and Engineering, Pennsylvania State University, PA, USA Jianqiang Li Department of Computer Science and Engineering, Pennsylvania State University, PA, USA

TBD mathscidoc:2207.43135

arXiv, 2021.10
[ Download ] [ 2022-07-23 11:02:55 uploaded by dingjt ] [ 17 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[2] Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange

Yue Qin China University of Geosciences, Wuhan, 430074, China Ruoyu Ding China University of Geosciences, Wuhan, 430074, China Chi Cheng China University of Geosciences, Wuhan, 430074, China Nina Bindel IQC and University of Waterloo, Waterloo, ON, Canada Yanbin Pan Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences Jintai Ding Tsinghua University, Beijing

TBD mathscidoc:2207.43134

IACR Cryptol. ePrint Arch., 2022.2
[ Download ] [ 2022-07-23 10:59:48 uploaded by dingjt ] [ 16 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[3] Several Improvements on BKZ Algorithm

Ziyu Zhao Tsinghua University, Beijing Jintai Ding Tsinghua University, Beijing

TBD mathscidoc:2207.43133

IACR Cryptol. ePrint Arch., 2022.2
[ Download ] [ 2022-07-23 10:56:26 uploaded by dingjt ] [ 14 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[4] The Distinguishing Attack on HFE

Joshua Deaton University of Cincinnati, OH, USA Jintai Ding University of Cincinnati, OH, USA

TBD mathscidoc:2207.43132

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:47:01 uploaded by dingjt ] [ 13 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[5] How Much can F5 Really Do

Jintai Ding University of Cincinnati, OH, USA Zheng Zhang University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA

TBD mathscidoc:2207.43131

IACR Cryptol. ePrint Arch., 2021.1
[ Download ] [ 2022-07-23 10:45:49 uploaded by dingjt ] [ 13 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[6] The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes

Jintai Ding University of Cincinnati, OH, USA Joshua Deaton University of Cincinnati, OH, USA Vishakha University of Cincinnati, OH, USA Bo-Yin Yang Institute of Information Science and Research Center of Information Technology and Innovation, Academia Sinica, 128 Section 2 Academia Road, Taipei 115-29, Taiwan

TBD mathscidoc:2207.43130

IACR Cryptol. ePrint Arch., 2020.9
[ Download ] [ 2022-07-22 17:39:37 uploaded by dingjt ] [ 12 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[7] Post-Quantum Anonymous Veto Networks

Jintai Ding University of Cincinnati, Ohio, USA Doug Emery University of Cincinnati, Ohio, USA Johannes Mueller SnT, University of Luxembourg, Luxembourg Peter Y. A. Ryan SnT, University of Luxembourg, Luxembourg Vonn Kee Wong University of Cincinnati, Ohio, USA

TBD mathscidoc:2207.43129

IACR Cryptol. ePrint Arch., 2020.8
[ Download ] [ 2022-07-22 17:37:52 uploaded by dingjt ] [ 17 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[8] Improved Key Recovery of the HFEv- Signature Scheme

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China

TBD mathscidoc:2207.43128

IACR Cryptol. ePrint Arch., 2020.11
[ Download ] [ 2022-07-22 17:35:24 uploaded by dingjt ] [ 24 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[9] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 15 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[10] Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption

Jintai Ding University of Cincinnati Pedro Branco SQIG-IT; IST-Universidade de Lisboa Kevin Schmitt University of Cincinnati

TBD mathscidoc:2207.43126

IACR Cryptol. ePrint Arch., 2019.6
[ Download ] [ 2022-07-22 17:30:42 uploaded by dingjt ] [ 12 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[11] Homomorphic Encryption Standard

Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai Vinod Vaikuntanathan

TBD mathscidoc:2207.43125

IACR Cryptol. ePrint Arch., 2019.8
[ Download ] [ 2022-07-22 17:25:49 uploaded by dingjt ] [ 9 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[12] A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem

Jintai Ding Joshua Deaton Kurt Schmidt Vishakha Zheng Zhang

TBD mathscidoc:2207.43124

IACR Cryptol. ePrint Arch., 2020.6
[ Download ] [ 2022-07-22 17:19:06 uploaded by dingjt ] [ 9 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[13] An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber

Yue Qin Chi Cheng Jintai Ding

TBD mathscidoc:2207.43123

IACR Cryptol. ePrint Arch., 2019.11
[ Download ] [ 2022-07-22 17:16:41 uploaded by dingjt ] [ 9 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[14] How to validate the secret of a Ring Learning with Errors (RLWE) key

Jintai Ding University of Cincinnati Saraswathy RV University of Cincinnati Saed Alsayigh University of Cincinnati Crystal Clough University of Cincinnati

TBD mathscidoc:2207.43122

IACR Cryptol. ePrint Arch., 2018.1
[ Download ] [ 2022-07-22 17:01:54 uploaded by dingjt ] [ 5 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[15] Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption

Pedro Branco SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Jintai Ding Department of Mathematical Sciences, University of Cincinnati Manuel Goulão SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Paulo Mateus SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa

TBD mathscidoc:2207.43121

IACR Cryptol. ePrint Arch., 2018.12
[ Download ] [ 2022-07-22 16:59:22 uploaded by dingjt ] [ 16 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[16] Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree

Jacob Alperin-Sheriff National Institute for Standards and Technology, Gaithersburg, Maryland, USA Jintai Ding University of Cincinnati, Ohio, USA Albrecht Petzoldt National Institute for Standards and Technology, Gaithersburg, Maryland, USA Daniel Smith Tone National Institute for Standards and Technology, Gaithersburg, Maryland, USA; University of Louisville, Kentucky, USA

TBD mathscidoc:2207.43120

IACR Cryptol. ePrint Arch., 2017.5
[ Download ] [ 2022-07-22 16:56:32 uploaded by dingjt ] [ 8 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[17] Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA R.V. Saraswathy Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China

TBD mathscidoc:2207.43119

International Journal of High Performance Computing and Networking, 13, (2), 2019.1
[ Download ] [ 2022-07-22 16:53:27 uploaded by dingjt ] [ 8 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[18] Eliminating Decryption Failures from the Simple Matrix Encryption Scheme

Albrecht Petzoldt Kyushu University, Fukuoka, Japan Jintai Ding University of Cincinnati, Ohio, USA Lih-Chung Wang National Dong Hwa University, Taiwan

TBD mathscidoc:2207.43118

IACR Cryptol. ePrint Arch., 2016.1
[ Download ] [ 2022-07-22 16:38:07 uploaded by dingjt ] [ 4 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[19] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld

Jintai Ding University of Cincinnati Saed Alsayigh University of Cincinnati Jean Lancrenon University of Luxembourg Saraswathy RV University of Cincinnati Michael Snook University of Cincinnati

TBD mathscidoc:2207.43117

IACR Cryptol. ePrint Arch., 2016.6
[ Download ] [ 2022-07-22 16:36:05 uploaded by dingjt ] [ 3 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[20] A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem

Jintai Ding University of Cincinnati; ChongQing University; Academia Sinica Chengdong Tao South China University of Technology

TBD mathscidoc:2207.43116

IACR Cryptol. ePrint Arch., 2014.1
[ Download ] [ 2022-07-22 16:21:11 uploaded by dingjt ] [ 3 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[21] New candidates for multivariate trapdoor functions

Jaiberth Porras Universidad Nacional de Colombia, Medell´ın, Colombia John B. Baena Universidad Nacional de Colombia, Medell´ın, Colombia Jintai Ding University of Cincinnati, Cincinnati, OH, USA

TBD mathscidoc:2207.43115

IACR Cryptol. ePrint Arch., 2014.5
[ Download ] [ 2022-07-22 16:15:07 uploaded by dingjt ] [ 4 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[22] Algebraic attack on lattice based cryptosystems via solving equations over real numbers

Jintai Ding University of Cincinnati Dieter Schmidt University of Cincinnati

TBD mathscidoc:2207.43114

IACR Cryptol. ePrint Arch., 2012.2
[ Download ] [ 2022-07-21 15:20:54 uploaded by dingjt ] [ 10 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[23] New cryptographic constructions using generalized learning with errors problem

Jintai Ding

TBD mathscidoc:2207.43113

IACR Cryptol. ePrint Arch., 2012.7
[ Download ] [ 2022-07-21 15:19:37 uploaded by dingjt ] [ 10 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[24] A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem

Jintai Ding University of Cincinnati Xiang Xie Chinese Academy of Sciences Xiaodong Lin Rutgers University

TBD mathscidoc:2207.43112

IACR Cryptol. ePrint Arch., 2012.12
[ Download ] [ 2022-07-21 15:18:20 uploaded by dingjt ] [ 10 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[25] A Simple and Efficient New Group Key Management Approach Based on Linear Geometry

Shaohua Tang School of Computer Science & Engineering, South China University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati, OH, USA Jintai Ding Department of Mathematical Sciences, University of Cincinnati, OH, USA; Department of Applied Mathematics, South China University of Technology, China Yujun Liang School of Computer Science & Engineering, South China University of Technology, Guangzhou, China

TBD mathscidoc:2207.43111

IACR Cryptol. ePrint Arch., 2011.5
[ Download ] [ 2022-07-21 15:10:19 uploaded by dingjt ] [ 24 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved