Jintai Ding

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Lecture Notes in Computer Science
2023-05-26Paper
A physical study of the LLL algorithm
Journal of Number Theory
2023-01-12Paper
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3
1515.941
2022-12-21Paper
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Information Security Practice and Experience
2022-12-09Paper
Cryptanalysis of the lifted unbalanced oil vinegar signature scheme
 
2022-12-07Paper
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Efficient key recovery for all HFE signature variants
 
2022-03-31Paper
The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes
 
2021-12-08Paper
New complexity estimation on the rainbow-band-separation attack
Theoretical Computer Science
2021-11-18Paper
Multivariate public key cryptosystems
Advances in Information Security
2021-08-11Paper
A physical study of the LLL algorithm
 
2021-06-03Paper
The singularity attack to the multivariate signature scheme HIMQ-3
Advances in Mathematics of Communications
2021-05-12Paper
Giophantus distinguishing attack is a low dimensional learning with errors problem
Advances in Mathematics of Communications
2020-11-07Paper
A framework for universally composable oblivious transfer from one-round key-exchange
 
2020-05-06Paper
One sample ring-LWE with rounding and its application to key exchange
 
2020-01-30Paper
Giophantus distinguishing attack is a low dimensional learning with errors problem
Advances in Mathematics of Communications
2019-11-26Paper
A key exchange based on the short integer solution problem and the learning with errors problem
 
2019-10-14Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Japan Journal of Industrial and Applied Mathematics
2018-12-07Paper
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
IEEE Transactions on Computers
2018-12-04Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)
 
2018-10-24Paper
The Beauty and the Beasts -- the hard cases in LLL reduction
 
2018-10-24Paper
Complete attack on RLWE key exchange with reused keys, without signal leakage
 
2018-09-26Paper
HMFEv -- an efficient multivariate signature scheme
 
2018-09-12Paper
Improved cryptanalysis of HFEv- via projection
 
2018-06-22Paper
Post-quantum secure remote password protocol from RLWE problem
 
2018-04-20Paper
LLL and stochastic sandpile models
 
2018-04-07Paper
Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community
Notices of the American Mathematical Society
2017-10-20Paper
Provably secure password authenticated key exchange based on RLWE for the post-quantum world
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Design Principles for HFEv- Based Multivariate Signature Schemes
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Extension field cancellation: a new central trapdoor for multivariate quadratic systems
Post-Quantum Cryptography
2016-04-26Paper
A practical attack on patched MIFARE Classic
Information Security and Cryptology
2015-12-02Paper
Authenticated key exchange from ideal lattices
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption
Finite Fields and their Applications
2015-08-19Paper
Linear algebra to compute Syzygies and Gröbner bases
Proceedings of the 36th international symposium on Symbolic and algebraic computation
2015-06-09Paper
ZHFE, a new multivariate public key encryption scheme
Post-Quantum Cryptography
2015-01-14Paper
The cubic simple matrix encryption scheme
Post-Quantum Cryptography
2015-01-14Paper
Degree of regularity for HFE Minus (HFE\(-\))
 
2014-12-30Paper
Inverting square systems algebraically is exponential
Finite Fields and their Applications
2014-02-11Paper
Solving degree and degree of regularity for polynomial systems over a finite field
Lecture Notes in Computer Science
2013-12-10Paper
New variants of the square-vinegar signature scheme
Revista Colombiana de Matemáticas
2013-07-10Paper
Simple matrix scheme for encryption
Post-Quantum Cryptography
2013-06-14Paper
Degree of regularity for HFEV and HFEV--
Post-Quantum Cryptography
2013-06-14Paper
GROWTH OF THE IDEAL GENERATED BY A QUADRATIC MULTIVARIATE FUNCTION OVER GF(3)
Journal of Algebra and its Applications
2013-06-05Paper
Embedded surface attack on multivariate public key cryptosystems from Diophantine equations
Information Security and Cryptology
2013-05-28Paper
An algebraic broadcast attack against NTRU
Information Security and Privacy
2012-09-07Paper
High-speed hardware implementation of Rainbow signature on FPGAs
Post-Quantum Cryptography
2011-11-25Paper
Inverting HFE systems is quasi-polynomial for all fields
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Kipnis-Shamir attack on unbalanced oil-vinegar scheme
Information Security Practice and Experience
2011-05-19Paper
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Cryptology and Network Security
2010-12-07Paper
MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Cryptanalysis of two quartic encryption schemes and one improved MFE scheme
Post-Quantum Cryptography
2010-06-17Paper
Growth of the ideal generated by a quadratic Boolean function
Post-Quantum Cryptography
2010-06-17Paper
Secure Variants of the Square Encryption Scheme
Post-Quantum Cryptography
2010-06-17Paper
Mutant Zhuang-Zi algorithm
Post-Quantum Cryptography
2010-06-17Paper
Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\)
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography
Gröbner Bases, Coding, and Cryptography
2009-12-16Paper
Algebraic Attack on the MQQ Public Key Cryptosystem
Cryptology and Network Security
2009-11-26Paper
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
Lecture Notes in Computer Science
2009-11-10Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Square, a New Multivariate Encryption Scheme
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Multivariate Public Key Cryptography
Post-Quantum Cryptography
2009-03-12Paper
Analysis of the SMS4 Block Cipher
Information Security and Privacy
2009-03-06Paper
Kipnis-Shamir Attack on HFE Revisited
Information Security and Cryptology
2009-02-10Paper
Multivariates Polynomials for Hashing
Information Security and Cryptology
2009-02-10Paper
Algebraic Attack on HFE Revisited
Lecture Notes in Computer Science
2008-11-20Paper
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
Post-Quantum Cryptography
2008-11-11Paper
Square-Vinegar Signature Scheme
Post-Quantum Cryptography
2008-11-11Paper
Could SFLASH be Repaired?
Automata, Languages and Programming
2008-08-19Paper
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Applied Cryptography and Network Security
2008-06-13Paper
Rainbow, a New Multivariable Polynomial Signature Scheme
Applied Cryptography and Network Security
2007-09-24Paper
ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography
Public Key Cryptography – PKC 2007
2007-09-04Paper
scientific article; zbMATH DE number 5149704 (Why is no real title available?)
 
2007-05-07Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Multivariate public key cryptosystems
Advances in Information Security
2006-10-18Paper
Cryptanalysis of the new TTS scheme in CHES 2004
International Journal of Information Security
2006-10-13Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM
Journal of Algebra and its Applications
2005-03-14Paper
Universal \(\mathcal R\)-matrix for quantum affine algebras \(U_q(A_2^{(2)})\) and \(U_q(\widehat{\text{osp}}(1|2))\) with Drinfeld co\-mul\-ti\-plication.
Advances in Mathematics
2005-02-22Paper
scientific article; zbMATH DE number 2127866 (Why is no real title available?)
 
2005-01-14Paper
On the integral construction of the universal R-matrix for quantum current superalgebra \(U_q(\widehat{\text{osp}}(1,2))\).
Czechoslovak Journal of Physics
2004-09-07Paper
scientific article; zbMATH DE number 2046135 (Why is no real title available?)
 
2004-02-23Paper
A remark on the FRTS realization and Drinfeld realization of quantum affine superalgebra \(U_q(\widehat{osp} (1,2))\)
Letters in Mathematical Physics
2004-02-08Paper
scientific article; zbMATH DE number 1560228 (Why is no real title available?)
 
2003-08-05Paper
On the FRTS approach to quantized current algebras
Letters in Mathematical Physics
2001-12-02Paper
Factorization of the universal \({\mathcal R}\)-matrix for \(U_q (\widehat{sl}_2)\)
Theoretical and Mathematical Physics
2001-08-28Paper
Integral presentations for the universal \(R\)-matrix
Letters in Mathematical Physics
2001-07-02Paper
scientific article; zbMATH DE number 1424470 (Why is no real title available?)
 
2001-01-14Paper
scientific article; zbMATH DE number 1549587 (Why is no real title available?)
 
2001-01-08Paper
scientific article; zbMATH DE number 1442027 (Why is no real title available?)
IMRN. International Mathematics Research Notices
2000-12-11Paper
Spinor representations of \(U_q(\widehat{\mathfrak gl}(n))\) and quantum boson-fermion correspondence
Communications in Mathematical Physics
2000-09-06Paper
Quantized W-algebra of sl(2, 1) and Quantum Parafermions of Uq(^sl(2))
Journal of Nonlinear Mathematical Physics
2000-08-15Paper
Hopf algebra extension of a Zamolochikov algebra and its double
Journal of Mathematical Physics
1999-11-21Paper
Partial Gauss decomposition, and Zamolodchikov algebra
Journal of Physics A: Mathematical and General
1999-11-02Paper
Drinfeld comultiplication and vertex operators
Journal of Geometry and Physics
1999-04-13Paper
Quantum current operators. I: Zeros and poles of quantum current operators and the condition of quantum integrability
Publications of the Research Institute for Mathematical Sciences, Kyoto University
1998-06-11Paper
Quantum current operators. II: Difference equations of quantum current operators and quantum parafermion construction
Publications of the Research Institute for Mathematical Sciences, Kyoto University
1998-06-11Paper
Generalization of Drinfeld quantum affine algebras
Letters in Mathematical Physics
1997-11-11Paper
Crystal algebra
Letters in Mathematical Physics
1997-11-09Paper
Spinor representations of \(U_ q(\widehat{\mathfrak o}(N))\)
Letters in Mathematical Physics
1997-05-11Paper
scientific article; zbMATH DE number 854141 (Why is no real title available?)
 
1996-10-15Paper
The center of a quantum affine algebra at the critical level
Mathematical Research Letters
1996-02-21Paper
Isomorphism of two realizations of quantum affine algebra \(U_ q(\widehat{\mathfrak{gl}}(n))\)
Communications in Mathematical Physics
1994-05-06Paper
A proof of a conjecture of C. L. Siegel
Journal of Number Theory
1994-04-24Paper
Zeros and poles of quantum current operators and the condition of quantum integrability
 
N/APaper
Generalization and Deformation of Drinfeld quantum affine algebras
 
N/APaper
Difference equations of quantum current operators and quantum parafermion construction
 
N/APaper
Quantum current operators (III): Commutative quantum current operators, semi-infinite construction and functional models
 
N/APaper


Research outcomes over time


This page was built for person: Jintai Ding