TBD

[26] Inverting the Square systems is exponential

Jintai Ding Southern Chinese University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati , USA

TBD mathscidoc:2207.43110

IACR Cryptol. ePrint Arch., 2011.5
[ Download ] [ 2022-07-21 15:07:26 uploaded by dingjt ] [ 25 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[27] Degree of regularity for HFE-

Jintai Ding Southern Chinese University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati, USA Thorsten Kleinjung EPFL IC LACAL, Lausanne, Switzerland

TBD mathscidoc:2207.43109

IACR Cryptol. ePrint Arch., 2011.10
[ Download ] [ 2022-07-21 15:03:36 uploaded by dingjt ] [ 15 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[28] Solving LWE problem with bounded errors in polynomial time

Jintai Ding Southern China University of technology; University of Cincinnati

TBD mathscidoc:2207.43108

IACR Cryptol. ePrint Arch., 2010.11
[ Download ] [ 2022-07-21 14:58:41 uploaded by dingjt ] [ 18 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[29] Fast Algorithm to solve a family of SIS problem with l_\infty norm

Jintai Ding Southern Chinese University of Technology; University of Cincinnati

TBD mathscidoc:2207.43107

IACR Cryptol. ePrint Arch., 2010.11
[ Download ] [ 2022-07-21 14:56:17 uploaded by dingjt ] [ 14 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[30] MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

Johannes Buchmann TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany Jintai Ding Department of Mathematical Sciences, University of Cincinnati Cincinnati OH 45220, USA Mohamed Saied Emam Mohamed TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany Wael Said Abd Elmageed Mohamed TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany

TBD mathscidoc:2207.43106

Symmetric Cryptography 2009, 2009.3
[ Download ] [ 2022-07-21 14:52:09 uploaded by dingjt ] [ 33 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[31] Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

Mohamed Saied Emam Mohamed TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany Jintai Ding Department of Mathematical Sciences, University of Cincinnati Cincinnati OH 45220, USA Johannes Buchmann TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany

TBD mathscidoc:2207.43105

IACR Cryptol. ePrint Arch., 2008.10
[ Download ] [ 2022-07-21 14:45:11 uploaded by dingjt ] [ 33 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[32] Small Odd Prime Field Multivariate PKCs

Anna Inn-Tung Chen School of EECS, National Taiwan University, Taipei, Taiwan Ming-Shing Chen Institute of Information Science, Academia Sinica, Taipei, Taiwan Tien-Ren Chen Institute of Information Science, Academia Sinica, Taipei, Taiwan Chen-Mou Cheng School of EECS, National Taiwan University, Taipei, Taiwan Jintai Ding Dept. of Math. Sciences, U. of Cincinnati, Cincinnati, Ohio, USA Eric Li-Hsiang Kuo Institute of Information Science, Academia Sinica, Taipei, Taiwan Frost Yu-Shuang Li School of EECS, National Taiwan University, Taipei, Taiwan Bo-Yin Yang Institute of Information Science, Academia Sinica, Taipei, Taiwan

TBD mathscidoc:2207.43104

IACR Cryptol. ePrint Arch., 2008.12
[ Download ] [ 2022-07-21 14:42:37 uploaded by dingjt ] [ 11 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[33] Odd-Char Multivariate Hidden Field Equations

Chia-Hsin Owen Chen IIS, Academia Sinica, Taipei, Taiwan Ming-Shing Chen IIS, Academia Sinica, Taipei, Taiwan Jintai Ding Dept. of Math. Sci., University of Cincinnati, Cincinnati, Ohio Fabian Werner Dept. of Comp. Sci., Technische Universität Darmstadt, Germany Bo-Yin Yang Dept. of Math. Sci., University of Cincinnati, Cincinnati, Ohio

TBD mathscidoc:2207.43103

IACR Cryptol. ePrint Arch., 2008.12
[ Download ] [ 2022-07-21 14:31:00 uploaded by dingjt ] [ 17 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[34] Identifying Ideal Lattices

Jintai Ding University of Cincinnati, Department of Mathematical Sciences, PO Box 210025, Cincinnati, OH 45221-0025, USA Richard Lindner Technische Universit¨at Darmstadt, Department of Computer Science Hochschulstraße 10, 64289 Darmstadt, Germany

TBD mathscidoc:2207.43102

IACR Cryptol. ePrint Arch., 2007.8
[ Download ] [ 2022-07-21 14:21:47 uploaded by dingjt ] [ 21 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[35] Breaking the Symmetry: a Way to Resist the New Differential Attack

Jintai Ding Dept. of Mathematics and Computer Sciences, University of Cincinnati Bo-Yin Yang Institute of Information Sciences, Academia Sinica; Taiwan Information Security Center Chen-Mou Cheng Dept. of Electrical Engineering, National Taiwan University Owen Chen Taiwan Information Security Center Vivien Dubois Ecole Normale Superieur

TBD mathscidoc:2207.43101

IACR Cryptol. ePrint Arch., 2007.9
[ Download ] [ 2022-07-21 14:19:01 uploaded by dingjt ] [ 13 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[36] Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem

Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA Timonthy Hodges Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA

TBD mathscidoc:2207.43100

IACR Cryptol. ePrint Arch., 2003.5
[ Download ] [ 2022-07-21 14:10:17 uploaded by dingjt ] [ 11 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[37] A defect of the implementation schemes of the TTM cryptosystem

Jintai Ding Dieter Schmidt

TBD mathscidoc:2207.43099

IACR Cryptol. ePrint Arch., 2013.5
[ Download ] [ 2022-07-21 14:06:55 uploaded by dingjt ] [ 12 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[38] Revisiting group oriented secret sharing schemes

Rui Xu School of Computer Science, China University of Geosciences (Wuhan), China Xu Wang School of Computer Science and Technology, University of Science and Technology of China, China Kirill Morozov Department of Computer Science and Engineering, University of North Texas, USA Chi Cheng School of Computer Science, China University of Geosciences (Wuhan), China Jintai Ding Ding Lab, Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China

TBD mathscidoc:2207.43098

Information Sciences, 589, 751-769, 2022.4
[ Download ] [ 2022-07-15 11:47:50 uploaded by dingjt ] [ 52 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[39] New complexity estimation on the Rainbow-Band-Separation attack

Shuhei Nakamura Department of Liberal Arts and Basic Sciences, Nihon University, Japan Yasuhiko Ikematsu Institute of Mathematics for Industry, Kyushu University, Japan Yacheng Wang Department of Mathematical Informatics, University of Tokyo, Japan Jintai Ding Department of Mathematical Sciences, University of Cincinnati, USA Tsuyoshi Takagi Department of Mathematical Informatics, University of Tokyo, Japan

TBD mathscidoc:2207.43097

Theoretical Computer Science, 396, 1-18, 2021.12
[ Download ] [ 2022-07-15 11:45:02 uploaded by dingjt ] [ 48 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[40] A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs

Yue Qin China University of Geosciences, Wuhan 430074, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China; Ding Lab, Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China Chi Cheng China University of Geosciences, Wuhan 430074, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China; Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China Xiaohan Zhang China University of Geosciences, Wuhan 430074, China Yanbin Pan Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China Lei Hu State Key Lab of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China Jintai Ding Ding Lab, Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China; Yau Mathematical Sciences Center, Tsinghua University, Beijing, China

TBD mathscidoc:2207.43096

ASIACRYPT 2021, 92–121, 2021.12
[ Download ] [ 2022-07-15 11:37:55 uploaded by dingjt ] [ 82 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[41] Efficient Key Recovery for All HFE Signature Variants

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Science and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Science and Applications, Beijing, China

TBD mathscidoc:2207.43095

CRYPTO 2021, 70–93, 2021.8
[ Download ] [ 2022-07-15 11:35:07 uploaded by dingjt ] [ 31 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[42] The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes

Jintai Ding Tsinghua University, Beijing, China Joshua Deaton University of Cincinnati, Cincinnati, OH, USA Vishakha University of Cincinnati, Cincinnati, OH, USA Bo-Yin Yang Academia Sinica, Taipei, Taiwan

TBD mathscidoc:2207.43094

EUROCRYPT 2021, 329–347, 2021.10
[ Download ] [ 2022-07-15 11:32:52 uploaded by dingjt ] [ 29 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[43] Multivariate Public Key Cryptosystems, Second Edition

Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, USA Albrecht Petzoldt Department of Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg, Erlangen, Germany Dieter S. Schmidt Department of Electrical Engineering and Computer Science, University of Cincinnati, Springboro, USA

TBD mathscidoc:2207.43093

Advances in Information Security, 80, 2020.1
[ Download ] [ 2022-07-15 11:28:01 uploaded by dingjt ] [ 35 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[44] Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme

Jintai Ding University of Cincinnati, Cincinnati, OH, USA Joshua Deaton University of Cincinnati, Cincinnati, OH, USA Kurt Schmidt University of Cincinnati, Cincinnati, OH, USA Vishakha University of Cincinnati, Cincinnati, OH, USA Zheng Zhang University of Cincinnati, Cincinnati, OH, USA

TBD mathscidoc:2207.43092

CRYPTO 2020, 279–298, 2020.8
[ Download ] [ 2022-07-15 11:06:36 uploaded by dingjt ] [ 17 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[45] A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3

Jintai Ding Department of Mathematical Science, University of Cincinnati, Cincinnati, USA Zheng Zhang Department of Mathematical Science, University of Cincinnati, Cincinnati, USA Joshua Deaton Department of Mathematical Science, University of Cincinnati, Cincinnati, USA Lih-Chung Wang Department of Applied Mathematics, National Dong Hwa University, Shoufeng, Taiwan

TBD mathscidoc:2207.43091

ICICS 2020, 422-440, 2020.8
[ Download ] [ 2022-07-15 11:04:09 uploaded by dingjt ] [ 23 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[46] Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

Jiahui Chen Faculty of Computer, Guangdong University of Technology, Guangzhou, China Jie Ling Faculty of Computer, Guangdong University of Technology, Guangzhou, China Jianting Ning School of Computing, National University of Singapore, Singapore, Singapore Jintai Ding University of Cincinnati, Cincinnati, OH, USA

TBD mathscidoc:2207.43090

The Computer Journal, 62, (8), 1132–1147, 2019.3
[ Download ] [ 2022-07-15 11:01:46 uploaded by dingjt ] [ 15 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[47] A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations

Jintai Ding University of Cincinnati, Cincinnati, USA

TBD mathscidoc:2207.43089

ACNS 2019, 97–107, 2019.6
[ Download ] [ 2022-07-15 10:56:16 uploaded by dingjt ] [ 15 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[48] One Sample Ring-LWE with Rounding and Its Application to Key Exchange

Jintai Ding University of Cincinnati, Cincinnati, USA Xinwei Gao Beijing Jiaotong University, Beijing, China Tsuyoshi Takagi The University of Tokyo, Tokyo, Japan; CREST, Japan Science and Technology Agency, Kawaguchi, Japan Yuntao Wang The University of Tokyo, Tokyo, Japan

TBD mathscidoc:2207.43088

ACNS 2019, 323–343, 2019.6
[ Download ] [ 2022-07-15 10:55:09 uploaded by dingjt ] [ 19 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[49] A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem

Jintai Ding Department of Mathematical Science, University of Cincinnati, Cincinnati, USA Kevin Schmitt Department of Mathematical Science, University of Cincinnati, Cincinnati, USA Zheng Zhang Department of Mathematical Science, University of Cincinnati, Cincinnati, USA

TBD mathscidoc:2207.43087

C2SI 2019, 105–117, 2019.4
[ Download ] [ 2022-07-15 10:52:59 uploaded by dingjt ] [ 12 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[50] A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope

Yue Qin China University of Geosciences, Wuhan 430074, China Chi Cheng China University of Geosciences, Wuhan 430074, China Jintai Ding University of Cincinnati, Cincinnati 45219, USA

TBD mathscidoc:2207.43086

ESORICS 2019, 504–520, 2019.9
[ Download ] [ 2022-07-15 10:51:35 uploaded by dingjt ] [ 14 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved