Jintai Ding
Orcid: 0000-0003-1257-7598
According to our database1,
Jintai Ding
authored at least 152 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
2023
Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems.
Quantum, July, 2023
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification.
IEEE Trans. Serv. Comput., 2022
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Theor. Comput. Sci., 2021
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021
Adv. Math. Commun., 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Advances in Information Security 80, Springer, ISBN: 978-1-0716-0985-9, 2020
IACR Cryptol. ePrint Arch., 2020
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.
IACR Cryptol. ePrint Arch., 2020
Adv. Math. Commun., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol.
Int. J. High Perform. Comput. Netw., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs).
IACR Cryptol. ePrint Arch., 2019
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption.
IACR Cryptol. ePrint Arch., 2019
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.
IACR Cryptol. ePrint Arch., 2019
Comput. J., 2019
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem.
Proceedings of the Codes, Cryptology and Information Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
IEEE Trans. Computers, 2018
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS.
Int. J. Netw. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld.
IACR Cryptol. ePrint Arch., 2016
2015
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction.
IACR Cryptol. ePrint Arch., 2015
Finite Fields Their Appl., 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD.
IACR Cryptol. ePrint Arch., 2014
Finite Fields Their Appl., 2014
Cryptologia, 2014
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the Number Theory and Cryptography, 2013
Multivariate cryptographic systems.
Proceedings of the Handbook of Finite Fields., 2013
2012
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
IACR Cryptol. ePrint Arch., 2012
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over <i>F</i><sub>2</sub>.
Proceedings of the Progress in Cryptology, 2010
2009
MXL<sub>3</sub>: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals.
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
<i>l</i>-Invertible Cycles for <i>M</i>ultivariate <i>Q</i>uadratic (<i>MQ</i>) Public Key Cryptography.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
Advances in Information Security 25, Springer, ISBN: 978-0-387-32229-2, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Coding and Cryptography, International Workshop, 2005
Proceedings of the Public Key Cryptography, 2005
Complexity Estimates for the F<sub>4</sub> Attack on the Perturbed Matsumoto-Imai Cryptosystem.
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the Public Key Cryptography, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem.
IACR Cryptol. ePrint Arch., 2003