Mathematics

[76] Algebraic attack on lattice based cryptosystems via solving equations over real numbers

Jintai Ding University of Cincinnati Dieter Schmidt University of Cincinnati

TBD mathscidoc:2207.43114

IACR Cryptol. ePrint Arch., 2012.2
[ Download ] [ 2022-07-21 15:20:54 uploaded by dingjt ] [ 463 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[77] New cryptographic constructions using generalized learning with errors problem

Jintai Ding

TBD mathscidoc:2207.43113

IACR Cryptol. ePrint Arch., 2012.7
[ Download ] [ 2022-07-21 15:19:37 uploaded by dingjt ] [ 436 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[78] A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem

Jintai Ding University of Cincinnati Xiang Xie Chinese Academy of Sciences Xiaodong Lin Rutgers University

TBD mathscidoc:2207.43112

IACR Cryptol. ePrint Arch., 2012.12
[ Download ] [ 2022-07-21 15:18:20 uploaded by dingjt ] [ 608 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[79] A Simple and Efficient New Group Key Management Approach Based on Linear Geometry

Shaohua Tang School of Computer Science & Engineering, South China University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati, OH, USA Jintai Ding Department of Mathematical Sciences, University of Cincinnati, OH, USA; Department of Applied Mathematics, South China University of Technology, China Yujun Liang School of Computer Science & Engineering, South China University of Technology, Guangzhou, China

TBD mathscidoc:2207.43111

IACR Cryptol. ePrint Arch., 2011.5
[ Download ] [ 2022-07-21 15:10:19 uploaded by dingjt ] [ 907 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[80] Inverting the Square systems is exponential

Jintai Ding Southern Chinese University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati , USA

TBD mathscidoc:2207.43110

IACR Cryptol. ePrint Arch., 2011.5
[ Download ] [ 2022-07-21 15:07:26 uploaded by dingjt ] [ 372 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[81] Degree of regularity for HFE-

Jintai Ding Southern Chinese University of Technology, Guangzhou, China; Department of Mathematical Sciences, University of Cincinnati, USA Thorsten Kleinjung EPFL IC LACAL, Lausanne, Switzerland

TBD mathscidoc:2207.43109

IACR Cryptol. ePrint Arch., 2011.10
[ Download ] [ 2022-07-21 15:03:36 uploaded by dingjt ] [ 436 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[82] Solving LWE problem with bounded errors in polynomial time

Jintai Ding Southern China University of technology; University of Cincinnati

TBD mathscidoc:2207.43108

IACR Cryptol. ePrint Arch., 2010.11
[ Download ] [ 2022-07-21 14:58:41 uploaded by dingjt ] [ 475 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[83] Fast Algorithm to solve a family of SIS problem with l_\infty norm

Jintai Ding Southern Chinese University of Technology; University of Cincinnati

TBD mathscidoc:2207.43107

IACR Cryptol. ePrint Arch., 2010.11
[ Download ] [ 2022-07-21 14:56:17 uploaded by dingjt ] [ 354 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[84] MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

Johannes Buchmann TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany Jintai Ding Department of Mathematical Sciences, University of Cincinnati Cincinnati OH 45220, USA Mohamed Saied Emam Mohamed TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany Wael Said Abd Elmageed Mohamed TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany

TBD mathscidoc:2207.43106

Symmetric Cryptography 2009, 2009.3
[ Download ] [ 2022-07-21 14:52:09 uploaded by dingjt ] [ 452 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[85] Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

Mohamed Saied Emam Mohamed TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany Jintai Ding Department of Mathematical Sciences, University of Cincinnati Cincinnati OH 45220, USA Johannes Buchmann TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt, Germany

TBD mathscidoc:2207.43105

IACR Cryptol. ePrint Arch., 2008.10
[ Download ] [ 2022-07-21 14:45:11 uploaded by dingjt ] [ 418 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[86] Small Odd Prime Field Multivariate PKCs

Anna Inn-Tung Chen School of EECS, National Taiwan University, Taipei, Taiwan Ming-Shing Chen Institute of Information Science, Academia Sinica, Taipei, Taiwan Tien-Ren Chen Institute of Information Science, Academia Sinica, Taipei, Taiwan Chen-Mou Cheng School of EECS, National Taiwan University, Taipei, Taiwan Jintai Ding Dept. of Math. Sciences, U. of Cincinnati, Cincinnati, Ohio, USA Eric Li-Hsiang Kuo Institute of Information Science, Academia Sinica, Taipei, Taiwan Frost Yu-Shuang Li School of EECS, National Taiwan University, Taipei, Taiwan Bo-Yin Yang Institute of Information Science, Academia Sinica, Taipei, Taiwan

TBD mathscidoc:2207.43104

IACR Cryptol. ePrint Arch., 2008.12
[ Download ] [ 2022-07-21 14:42:37 uploaded by dingjt ] [ 321 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[87] Odd-Char Multivariate Hidden Field Equations

Chia-Hsin Owen Chen IIS, Academia Sinica, Taipei, Taiwan Ming-Shing Chen IIS, Academia Sinica, Taipei, Taiwan Jintai Ding Dept. of Math. Sci., University of Cincinnati, Cincinnati, Ohio Fabian Werner Dept. of Comp. Sci., Technische Universität Darmstadt, Germany Bo-Yin Yang Dept. of Math. Sci., University of Cincinnati, Cincinnati, Ohio

TBD mathscidoc:2207.43103

IACR Cryptol. ePrint Arch., 2008.12
[ Download ] [ 2022-07-21 14:31:00 uploaded by dingjt ] [ 448 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[88] Identifying Ideal Lattices

Jintai Ding University of Cincinnati, Department of Mathematical Sciences, PO Box 210025, Cincinnati, OH 45221-0025, USA Richard Lindner Technische Universit¨at Darmstadt, Department of Computer Science Hochschulstraße 10, 64289 Darmstadt, Germany

TBD mathscidoc:2207.43102

IACR Cryptol. ePrint Arch., 2007.8
[ Download ] [ 2022-07-21 14:21:47 uploaded by dingjt ] [ 434 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[89] Breaking the Symmetry: a Way to Resist the New Differential Attack

Jintai Ding Dept. of Mathematics and Computer Sciences, University of Cincinnati Bo-Yin Yang Institute of Information Sciences, Academia Sinica; Taiwan Information Security Center Chen-Mou Cheng Dept. of Electrical Engineering, National Taiwan University Owen Chen Taiwan Information Security Center Vivien Dubois Ecole Normale Superieur

TBD mathscidoc:2207.43101

IACR Cryptol. ePrint Arch., 2007.9
[ Download ] [ 2022-07-21 14:19:01 uploaded by dingjt ] [ 408 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[90] Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem

Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA Timonthy Hodges Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA

TBD mathscidoc:2207.43100

IACR Cryptol. ePrint Arch., 2003.5
[ Download ] [ 2022-07-21 14:10:17 uploaded by dingjt ] [ 410 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[91] A defect of the implementation schemes of the TTM cryptosystem

Jintai Ding Dieter Schmidt

TBD mathscidoc:2207.43099

IACR Cryptol. ePrint Arch., 2013.5
[ Download ] [ 2022-07-21 14:06:55 uploaded by dingjt ] [ 415 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[92] Resonances of the Laplace operator on homogeneous vector bundles on symmetric spaces of real rank-one

Roby YMSC

Representation Theory mathscidoc:2207.30001

Advances in Mathematics, 408, 2022.7
[ Download ] [ 2022-07-20 15:34:50 uploaded by SimBy ] [ 1375 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[93] Revisiting group oriented secret sharing schemes

Rui Xu School of Computer Science, China University of Geosciences (Wuhan), China Xu Wang School of Computer Science and Technology, University of Science and Technology of China, China Kirill Morozov Department of Computer Science and Engineering, University of North Texas, USA Chi Cheng School of Computer Science, China University of Geosciences (Wuhan), China Jintai Ding Ding Lab, Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China

TBD mathscidoc:2207.43098

Information Sciences, 589, 751-769, 2022.4
[ Download ] [ 2022-07-15 11:47:50 uploaded by dingjt ] [ 732 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[94] New complexity estimation on the Rainbow-Band-Separation attack

Shuhei Nakamura Department of Liberal Arts and Basic Sciences, Nihon University, Japan Yasuhiko Ikematsu Institute of Mathematics for Industry, Kyushu University, Japan Yacheng Wang Department of Mathematical Informatics, University of Tokyo, Japan Jintai Ding Department of Mathematical Sciences, University of Cincinnati, USA Tsuyoshi Takagi Department of Mathematical Informatics, University of Tokyo, Japan

TBD mathscidoc:2207.43097

Theoretical Computer Science, 396, 1-18, 2021.12
[ Download ] [ 2022-07-15 11:45:02 uploaded by dingjt ] [ 532 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[95] The singularity attack to the multivariate signature scheme HIMQ-3

Jintai Ding Department of Mathematical Science, University of Cincinnati, USA Zheng Zhang Department of Mathematical Science, University of Cincinnati, USA Joshua Deaton Department of Mathematical Science, University of Cincinnati, USA

Differential Geometry mathscidoc:2207.10008

Advances in Mathematics of Communications, 15, (1), 65-72, 2021.2
[ Download ] [ 2022-07-15 11:40:47 uploaded by dingjt ] [ 1426 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[96] A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs

Yue Qin China University of Geosciences, Wuhan 430074, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China; Ding Lab, Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China Chi Cheng China University of Geosciences, Wuhan 430074, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China; Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China Xiaohan Zhang China University of Geosciences, Wuhan 430074, China Yanbin Pan Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China Lei Hu State Key Lab of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China Jintai Ding Ding Lab, Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China; Yau Mathematical Sciences Center, Tsinghua University, Beijing, China

TBD mathscidoc:2207.43096

ASIACRYPT 2021, 92–121, 2021.12
[ Download ] [ 2022-07-15 11:37:55 uploaded by dingjt ] [ 1404 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[97] Efficient Key Recovery for All HFE Signature Variants

Chengdong Tao Ding Lab, Beijing Institute of Mathematical Science and Applications, Beijing, China Albrecht Petzoldt FAU Erlangen-Nuremberg, Nuremberg, Germany Jintai Ding Yau Mathematical Center, Tsinghua University, Beijing, China; Ding Lab, Beijing Institute of Mathematical Science and Applications, Beijing, China

TBD mathscidoc:2207.43095

CRYPTO 2021, 70–93, 2021.8
[ Download ] [ 2022-07-15 11:35:07 uploaded by dingjt ] [ 549 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[98] The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes

Jintai Ding Tsinghua University, Beijing, China Joshua Deaton University of Cincinnati, Cincinnati, OH, USA Vishakha University of Cincinnati, Cincinnati, OH, USA Bo-Yin Yang Academia Sinica, Taipei, Taiwan

TBD mathscidoc:2207.43094

EUROCRYPT 2021, 329–347, 2021.10
[ Download ] [ 2022-07-15 11:32:52 uploaded by dingjt ] [ 346 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[99] Multivariate Public Key Cryptosystems, Second Edition

Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, USA Albrecht Petzoldt Department of Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg, Erlangen, Germany Dieter S. Schmidt Department of Electrical Engineering and Computer Science, University of Cincinnati, Springboro, USA

TBD mathscidoc:2207.43093

Advances in Information Security, 80, 2020.1
[ Download ] [ 2022-07-15 11:28:01 uploaded by dingjt ] [ 966 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[100] Giophantus distinguishing attack is a low dimensional learning with errors problem

Jintai Ding University of Cincinnati, Cincinnati, OH 45219, USA Joshua Deaton University of Cincinnati, Cincinnati, OH 45219, USA Kurt Schmidt University of Cincinnati, Cincinnati, OH 45219, USA

Information Theory mathscidoc:2207.19002

Advances in Mathematics of Communications, 14, (4), 573-577, 2020.11
[ Download ] [ 2022-07-15 11:11:21 uploaded by dingjt ] [ 1421 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved