Mathematics

[51] Post-Quantum Anonymous Veto Networks

Jintai Ding University of Cincinnati, Ohio, USA Doug Emery University of Cincinnati, Ohio, USA Johannes Mueller SnT, University of Luxembourg, Luxembourg Peter Y. A. Ryan SnT, University of Luxembourg, Luxembourg Vonn Kee Wong University of Cincinnati, Ohio, USA

TBD mathscidoc:2207.43129

IACR Cryptol. ePrint Arch., 2020.8
[ Download ] [ 2022-07-22 17:37:52 uploaded by dingjt ] [ 309 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[52] Improved Key Recovery of the HFEv- Signature Scheme

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China; Ding Lab, Beijing Institute of Mathematical Sci. and Applications, Beijing, China

TBD mathscidoc:2207.43128

IACR Cryptol. ePrint Arch., 2020.11
[ Download ] [ 2022-07-22 17:35:24 uploaded by dingjt ] [ 222 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[53] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 276 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[54] Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption

Jintai Ding University of Cincinnati Pedro Branco SQIG-IT; IST-Universidade de Lisboa Kevin Schmitt University of Cincinnati

TBD mathscidoc:2207.43126

IACR Cryptol. ePrint Arch., 2019.6
[ Download ] [ 2022-07-22 17:30:42 uploaded by dingjt ] [ 304 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[55] Homomorphic Encryption Standard

Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai Vinod Vaikuntanathan

TBD mathscidoc:2207.43125

IACR Cryptol. ePrint Arch., 2019.8
[ Download ] [ 2022-07-22 17:25:49 uploaded by dingjt ] [ 315 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[56] A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem

Jintai Ding Joshua Deaton Kurt Schmidt Vishakha Zheng Zhang

TBD mathscidoc:2207.43124

IACR Cryptol. ePrint Arch., 2020.6
[ Download ] [ 2022-07-22 17:19:06 uploaded by dingjt ] [ 182 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[57] An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber

Yue Qin Chi Cheng Jintai Ding

TBD mathscidoc:2207.43123

IACR Cryptol. ePrint Arch., 2019.11
[ Download ] [ 2022-07-22 17:16:41 uploaded by dingjt ] [ 200 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[58] LLL and stochastic sandpile models

Jintai Ding Seungki Kim Tsuyoshi Takagi Yuntao Wang

Number Theory arXiv subject: Statistical Mechanics (cond-mat.stat-mech) mathscidoc:2207.24001

arXiv, 2020.3
[ Download ] [ 2022-07-22 17:11:34 uploaded by dingjt ] [ 1019 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[59] How to validate the secret of a Ring Learning with Errors (RLWE) key

Jintai Ding University of Cincinnati Saraswathy RV University of Cincinnati Saed Alsayigh University of Cincinnati Crystal Clough University of Cincinnati

TBD mathscidoc:2207.43122

IACR Cryptol. ePrint Arch., 2018.1
[ Download ] [ 2022-07-22 17:01:54 uploaded by dingjt ] [ 247 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[60] Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption

Pedro Branco SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Jintai Ding Department of Mathematical Sciences, University of Cincinnati Manuel Goulão SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Paulo Mateus SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa

TBD mathscidoc:2207.43121

IACR Cryptol. ePrint Arch., 2018.12
[ Download ] [ 2022-07-22 16:59:22 uploaded by dingjt ] [ 246 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[61] Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree

Jacob Alperin-Sheriff National Institute for Standards and Technology, Gaithersburg, Maryland, USA Jintai Ding University of Cincinnati, Ohio, USA Albrecht Petzoldt National Institute for Standards and Technology, Gaithersburg, Maryland, USA Daniel Smith Tone National Institute for Standards and Technology, Gaithersburg, Maryland, USA; University of Louisville, Kentucky, USA

TBD mathscidoc:2207.43120

IACR Cryptol. ePrint Arch., 2017.5
[ Download ] [ 2022-07-22 16:56:32 uploaded by dingjt ] [ 155 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[62] Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA R.V. Saraswathy Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China

TBD mathscidoc:2207.43119

International Journal of High Performance Computing and Networking, 13, (2), 2019.1
[ Download ] [ 2022-07-22 16:53:27 uploaded by dingjt ] [ 298 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[63] Eliminating Decryption Failures from the Simple Matrix Encryption Scheme

Albrecht Petzoldt Kyushu University, Fukuoka, Japan Jintai Ding University of Cincinnati, Ohio, USA Lih-Chung Wang National Dong Hwa University, Taiwan

TBD mathscidoc:2207.43118

IACR Cryptol. ePrint Arch., 2016.1
[ Download ] [ 2022-07-22 16:38:07 uploaded by dingjt ] [ 218 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[64] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld

Jintai Ding University of Cincinnati Saed Alsayigh University of Cincinnati Jean Lancrenon University of Luxembourg Saraswathy RV University of Cincinnati Michael Snook University of Cincinnati

TBD mathscidoc:2207.43117

IACR Cryptol. ePrint Arch., 2016.6
[ Download ] [ 2022-07-22 16:36:05 uploaded by dingjt ] [ 976 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[65] A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups

Jintai Ding Department of Mathematics, University of Cincinnati, OH, USA Alexei Miasnikov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA Alexander Ushakov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA

Information Theory mathscidoc:2207.19003

IACR Cryptol. ePrint Arch., 2015.1
[ Download ] [ 2022-07-22 16:32:41 uploaded by dingjt ] [ 776 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[66] A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem

Jintai Ding University of Cincinnati; ChongQing University; Academia Sinica Chengdong Tao South China University of Technology

TBD mathscidoc:2207.43116

IACR Cryptol. ePrint Arch., 2014.1
[ Download ] [ 2022-07-22 16:21:11 uploaded by dingjt ] [ 208 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[67] New candidates for multivariate trapdoor functions

Jaiberth Porras Universidad Nacional de Colombia, Medell´ın, Colombia John B. Baena Universidad Nacional de Colombia, Medell´ın, Colombia Jintai Ding University of Cincinnati, Cincinnati, OH, USA

TBD mathscidoc:2207.43115

IACR Cryptol. ePrint Arch., 2014.5
[ Download ] [ 2022-07-22 16:15:07 uploaded by dingjt ] [ 197 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[68] Algebraic attack on lattice based cryptosystems via solving equations over real numbers

Jintai Ding University of Cincinnati Dieter Schmidt University of Cincinnati

TBD mathscidoc:2207.43114

IACR Cryptol. ePrint Arch., 2012.2
[ Download ] [ 2022-07-21 15:20:54 uploaded by dingjt ] [ 194 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[69] New cryptographic constructions using generalized learning with errors problem

Jintai Ding

TBD mathscidoc:2207.43113

IACR Cryptol. ePrint Arch., 2012.7
[ Download ] [ 2022-07-21 15:19:37 uploaded by dingjt ] [ 207 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[70] A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem

Jintai Ding University of Cincinnati Xiang Xie Chinese Academy of Sciences Xiaodong Lin Rutgers University

TBD mathscidoc:2207.43112

IACR Cryptol. ePrint Arch., 2012.12
[ Download ] [ 2022-07-21 15:18:20 uploaded by dingjt ] [ 247 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[71] A Simple and Efficient New Group Key Management Approach Based on Linear Geometry

Shaohua Tang School of Computer Science & Engineering, South China University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati, OH, USA Jintai Ding Department of Mathematical Sciences, University of Cincinnati, OH, USA; Department of Applied Mathematics, South China University of Technology, China Yujun Liang School of Computer Science & Engineering, South China University of Technology, Guangzhou, China

TBD mathscidoc:2207.43111

IACR Cryptol. ePrint Arch., 2011.5
[ Download ] [ 2022-07-21 15:10:19 uploaded by dingjt ] [ 396 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[72] Inverting the Square systems is exponential

Jintai Ding Southern Chinese University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati , USA

TBD mathscidoc:2207.43110

IACR Cryptol. ePrint Arch., 2011.5
[ Download ] [ 2022-07-21 15:07:26 uploaded by dingjt ] [ 160 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[73] Degree of regularity for HFE-

Jintai Ding Southern Chinese University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati, USA Thorsten Kleinjung EPFL IC LACAL, Lausanne, Switzerland

TBD mathscidoc:2207.43109

IACR Cryptol. ePrint Arch., 2011.10
[ Download ] [ 2022-07-21 15:03:36 uploaded by dingjt ] [ 169 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[74] Solving LWE problem with bounded errors in polynomial time

Jintai Ding Southern China University of technology; University of Cincinnati

TBD mathscidoc:2207.43108

IACR Cryptol. ePrint Arch., 2010.11
[ Download ] [ 2022-07-21 14:58:41 uploaded by dingjt ] [ 153 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[75] Fast Algorithm to solve a family of SIS problem with l_\infty norm

Jintai Ding Southern Chinese University of Technology; University of Cincinnati

TBD mathscidoc:2207.43107

IACR Cryptol. ePrint Arch., 2010.11
[ Download ] [ 2022-07-21 14:56:17 uploaded by dingjt ] [ 154 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved