132 paper(s) uploaded by dingjt.

Index Title Upload Time Modified Time
111

A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem

Jintai Ding University of Cincinnati; ChongQing University; Academia Sinica Chengdong Tao South China University of Technology

TBD mathscidoc:2207.43116

IACR Cryptol. ePrint Arch., 2014.1
[ Download ] [ 2022-07-22 16:21:11 uploaded by dingjt ] [ 276 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:21:11 -
112

A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups

Jintai Ding Department of Mathematics, University of Cincinnati, OH, USA Alexei Miasnikov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA Alexander Ushakov Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ, USA

Information Theory mathscidoc:2207.19003

IACR Cryptol. ePrint Arch., 2015.1
[ Download ] [ 2022-07-22 16:32:41 uploaded by dingjt ] [ 1090 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:32:41 -
113

Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld

Jintai Ding University of Cincinnati Saed Alsayigh University of Cincinnati Jean Lancrenon University of Luxembourg Saraswathy RV University of Cincinnati Michael Snook University of Cincinnati

TBD mathscidoc:2207.43117

IACR Cryptol. ePrint Arch., 2016.6
[ Download ] [ 2022-07-22 16:36:05 uploaded by dingjt ] [ 1292 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:36:05 -
114

Eliminating Decryption Failures from the Simple Matrix Encryption Scheme

Albrecht Petzoldt Kyushu University, Fukuoka, Japan Jintai Ding University of Cincinnati, Ohio, USA Lih-Chung Wang National Dong Hwa University, Taiwan

TBD mathscidoc:2207.43118

IACR Cryptol. ePrint Arch., 2016.1
[ Download ] [ 2022-07-22 16:38:07 uploaded by dingjt ] [ 295 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:38:07 -
115

Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA R.V. Saraswathy Department of Mathematical Sciences, University of Cincinnati, French Hall, West, 2815 Commons Way, Cincinnati, Ohio, 45219, USA Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, No. 3 ShangYuanCun, HaiDian District, Beijing, 100044, China

TBD mathscidoc:2207.43119

International Journal of High Performance Computing and Networking, 13, (2), 2019.1
[ Download ] [ 2022-07-22 16:53:27 uploaded by dingjt ] [ 393 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:53:27 -
116

Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree

Jacob Alperin-Sheriff National Institute for Standards and Technology, Gaithersburg, Maryland, USA Jintai Ding University of Cincinnati, Ohio, USA Albrecht Petzoldt National Institute for Standards and Technology, Gaithersburg, Maryland, USA Daniel Smith Tone National Institute for Standards and Technology, Gaithersburg, Maryland, USA; University of Louisville, Kentucky, USA

TBD mathscidoc:2207.43120

IACR Cryptol. ePrint Arch., 2017.5
[ Download ] [ 2022-07-22 16:56:32 uploaded by dingjt ] [ 218 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:56:32 -
117

Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption

Pedro Branco SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Jintai Ding Department of Mathematical Sciences, University of Cincinnati Manuel Goulão SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa Paulo Mateus SQIG-IT; Department of Mathematics, IST-Universidade de Lisboa

TBD mathscidoc:2207.43121

IACR Cryptol. ePrint Arch., 2018.12
[ Download ] [ 2022-07-22 16:59:22 uploaded by dingjt ] [ 344 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 16:59:22 -
118

How to validate the secret of a Ring Learning with Errors (RLWE) key

Jintai Ding University of Cincinnati Saraswathy RV University of Cincinnati Saed Alsayigh University of Cincinnati Crystal Clough University of Cincinnati

TBD mathscidoc:2207.43122

IACR Cryptol. ePrint Arch., 2018.1
[ Download ] [ 2022-07-22 17:01:54 uploaded by dingjt ] [ 401 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 17:01:54 -
119

LLL and stochastic sandpile models

Jintai Ding Seungki Kim Tsuyoshi Takagi Yuntao Wang

Number Theory arXiv subject: Statistical Mechanics (cond-mat.stat-mech) mathscidoc:2207.24001

arXiv, 2020.3
[ Download ] [ 2022-07-22 17:11:34 uploaded by dingjt ] [ 1291 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 17:11:34 -
120

An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber

Yue Qin Chi Cheng Jintai Ding

TBD mathscidoc:2207.43123

IACR Cryptol. ePrint Arch., 2019.11
[ Download ] [ 2022-07-22 17:16:41 uploaded by dingjt ] [ 285 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 
2022-07-22 17:16:41 -
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved