Jintai Ding

From MaRDI portal
(Redirected from Person:492016)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Lecture Notes in Computer Science
2023-05-26Paper
A physical study of the LLL algorithm
Journal of Number Theory
2023-01-12Paper
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3
1515.941
2022-12-21Paper
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Information Security Practice and Experience
2022-12-09Paper
Cryptanalysis of the lifted unbalanced oil vinegar signature scheme2022-12-07Paper
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Efficient key recovery for all HFE signature variants2022-03-31Paper
The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes2021-12-08Paper
New complexity estimation on the rainbow-band-separation attack
Theoretical Computer Science
2021-11-18Paper
Multivariate public key cryptosystems
Advances in Information Security
2021-08-11Paper
A physical study of the LLL algorithm
(available as arXiv preprint)
2021-06-03Paper
The singularity attack to the multivariate signature scheme HIMQ-3
Advances in Mathematics of Communications
2021-05-12Paper
Giophantus distinguishing attack is a low dimensional learning with errors problem
Advances in Mathematics of Communications
2020-11-07Paper
A framework for universally composable oblivious transfer from one-round key-exchange2020-05-06Paper
One sample ring-LWE with rounding and its application to key exchange2020-01-30Paper
Giophantus distinguishing attack is a low dimensional learning with errors problem
Advances in Mathematics of Communications
2019-11-26Paper
A key exchange based on the short integer solution problem and the learning with errors problem2019-10-14Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Japan Journal of Industrial and Applied Mathematics
2018-12-07Paper
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
IEEE Transactions on Computers
2018-12-04Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)2018-10-24Paper
The Beauty and the Beasts -- the hard cases in LLL reduction2018-10-24Paper
Complete attack on RLWE key exchange with reused keys, without signal leakage2018-09-26Paper
HMFEv -- an efficient multivariate signature scheme2018-09-12Paper
Improved cryptanalysis of HFEv- via projection2018-06-22Paper
Post-quantum secure remote password protocol from RLWE problem2018-04-20Paper
LLL and stochastic sandpile models2018-04-07Paper
Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community
Notices of the American Mathematical Society
2017-10-20Paper
Provably secure password authenticated key exchange based on RLWE for the post-quantum world
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Design Principles for HFEv- Based Multivariate Signature Schemes
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Extension field cancellation: a new central trapdoor for multivariate quadratic systems
Post-Quantum Cryptography
2016-04-26Paper
A practical attack on patched MIFARE Classic
Information Security and Cryptology
2015-12-02Paper
Authenticated key exchange from ideal lattices
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption
Finite Fields and their Applications
2015-08-19Paper
Linear algebra to compute Syzygies and Gröbner bases
Proceedings of the 36th international symposium on Symbolic and algebraic computation
2015-06-09Paper
ZHFE, a new multivariate public key encryption scheme
Post-Quantum Cryptography
2015-01-14Paper
The cubic simple matrix encryption scheme
Post-Quantum Cryptography
2015-01-14Paper
Degree of regularity for HFE Minus (HFE\(-\))2014-12-30Paper
Inverting square systems algebraically is exponential
Finite Fields and their Applications
2014-02-11Paper
Solving degree and degree of regularity for polynomial systems over a finite field
Lecture Notes in Computer Science
2013-12-10Paper
New variants of the square-vinegar signature scheme
Revista Colombiana de Matemáticas
2013-07-10Paper
Simple matrix scheme for encryption
Post-Quantum Cryptography
2013-06-14Paper
Degree of regularity for HFEV and HFEV--
Post-Quantum Cryptography
2013-06-14Paper
GROWTH OF THE IDEAL GENERATED BY A QUADRATIC MULTIVARIATE FUNCTION OVER GF(3)
Journal of Algebra and its Applications
2013-06-05Paper
Embedded surface attack on multivariate public key cryptosystems from Diophantine equations
Information Security and Cryptology
2013-05-28Paper
An algebraic broadcast attack against NTRU
Information Security and Privacy
2012-09-07Paper
High-speed hardware implementation of Rainbow signature on FPGAs
Post-Quantum Cryptography
2011-11-25Paper
Inverting HFE systems is quasi-polynomial for all fields
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Kipnis-Shamir attack on unbalanced oil-vinegar scheme
Information Security Practice and Experience
2011-05-19Paper
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Cryptology and Network Security
2010-12-07Paper
MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Cryptanalysis of two quartic encryption schemes and one improved MFE scheme
Post-Quantum Cryptography
2010-06-17Paper
Growth of the ideal generated by a quadratic Boolean function
Post-Quantum Cryptography
2010-06-17Paper
Secure Variants of the Square Encryption Scheme
Post-Quantum Cryptography
2010-06-17Paper
Mutant Zhuang-Zi algorithm
Post-Quantum Cryptography
2010-06-17Paper
Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\)
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography
Gröbner Bases, Coding, and Cryptography
2009-12-16Paper
Algebraic Attack on the MQQ Public Key Cryptosystem
Cryptology and Network Security
2009-11-26Paper
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
Lecture Notes in Computer Science
2009-11-10Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Square, a New Multivariate Encryption Scheme
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Multivariate Public Key Cryptography
Post-Quantum Cryptography
2009-03-12Paper
Analysis of the SMS4 Block Cipher
Information Security and Privacy
2009-03-06Paper
Kipnis-Shamir Attack on HFE Revisited
Information Security and Cryptology
2009-02-10Paper
Multivariates Polynomials for Hashing
Information Security and Cryptology
2009-02-10Paper
Algebraic Attack on HFE Revisited
Lecture Notes in Computer Science
2008-11-20Paper
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
Post-Quantum Cryptography
2008-11-11Paper
Square-Vinegar Signature Scheme
Post-Quantum Cryptography
2008-11-11Paper
Could SFLASH be Repaired?
Automata, Languages and Programming
2008-08-19Paper
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Applied Cryptography and Network Security
2008-06-13Paper
Rainbow, a New Multivariable Polynomial Signature Scheme
Applied Cryptography and Network Security
2007-09-24Paper
ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography
Public Key Cryptography – PKC 2007
2007-09-04Paper
scientific article; zbMATH DE number 5149704 (Why is no real title available?)2007-05-07Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Multivariate public key cryptosystems
Advances in Information Security
2006-10-18Paper
Cryptanalysis of the new TTS scheme in CHES 2004
International Journal of Information Security
2006-10-13Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM
Journal of Algebra and its Applications
2005-03-14Paper
Universal \(\mathcal R\)-matrix for quantum affine algebras \(U_q(A_2^{(2)})\) and \(U_q(\widehat{\text{osp}}(1|2))\) with Drinfeld co\-mul\-ti\-plication.
Advances in Mathematics
2005-02-22Paper
scientific article; zbMATH DE number 2127866 (Why is no real title available?)2005-01-14Paper
On the integral construction of the universal R-matrix for quantum current superalgebra \(U_q(\widehat{\text{osp}}(1,2))\).
Czechoslovak Journal of Physics
2004-09-07Paper
scientific article; zbMATH DE number 2046135 (Why is no real title available?)2004-02-23Paper
A remark on the FRTS realization and Drinfeld realization of quantum affine superalgebra \(U_q(\widehat{osp} (1,2))\)
Letters in Mathematical Physics
2004-02-08Paper
scientific article; zbMATH DE number 1560228 (Why is no real title available?)
(available as arXiv preprint)
2003-08-05Paper
On the FRTS approach to quantized current algebras
Letters in Mathematical Physics
2001-12-02Paper
Factorization of the universal \({\mathcal R}\)-matrix for \(U_q (\widehat{sl}_2)\)
Theoretical and Mathematical Physics
2001-08-28Paper
Integral presentations for the universal \(R\)-matrix
Letters in Mathematical Physics
2001-07-02Paper
scientific article; zbMATH DE number 1424470 (Why is no real title available?)
(available as arXiv preprint)
2001-01-14Paper
scientific article; zbMATH DE number 1549587 (Why is no real title available?)2001-01-08Paper
scientific article; zbMATH DE number 1442027 (Why is no real title available?)
IMRN. International Mathematics Research Notices
2000-12-11Paper
Spinor representations of \(U_q(\widehat{\mathfrak gl}(n))\) and quantum boson-fermion correspondence
Communications in Mathematical Physics
2000-09-06Paper
Quantized W-algebra of sl(2, 1) and Quantum Parafermions of Uq(^sl(2))
Journal of Nonlinear Mathematical Physics
2000-08-15Paper
Hopf algebra extension of a Zamolochikov algebra and its double
Journal of Mathematical Physics
1999-11-21Paper
Partial Gauss decomposition, and Zamolodchikov algebra
Journal of Physics A: Mathematical and General
1999-11-02Paper
Drinfeld comultiplication and vertex operators
Journal of Geometry and Physics
1999-04-13Paper
Quantum current operators. I: Zeros and poles of quantum current operators and the condition of quantum integrability
Publications of the Research Institute for Mathematical Sciences, Kyoto University
1998-06-11Paper
Quantum current operators. II: Difference equations of quantum current operators and quantum parafermion construction
Publications of the Research Institute for Mathematical Sciences, Kyoto University
1998-06-11Paper
Generalization of Drinfeld quantum affine algebras
Letters in Mathematical Physics
1997-11-11Paper
Crystal algebra
Letters in Mathematical Physics
1997-11-09Paper
Spinor representations of \(U_ q(\widehat{\mathfrak o}(N))\)
Letters in Mathematical Physics
1997-05-11Paper
scientific article; zbMATH DE number 854141 (Why is no real title available?)1996-10-15Paper
The center of a quantum affine algebra at the critical level
Mathematical Research Letters
1996-02-21Paper
Isomorphism of two realizations of quantum affine algebra \(U_ q(\widehat{\mathfrak{gl}}(n))\)
Communications in Mathematical Physics
1994-05-06Paper
A proof of a conjecture of C. L. Siegel
Journal of Number Theory
1994-04-24Paper
Zeros and poles of quantum current operators and the condition of quantum integrability
(available as arXiv preprint)
N/APaper
Generalization and Deformation of Drinfeld quantum affine algebras
(available as arXiv preprint)
N/APaper
Difference equations of quantum current operators and quantum parafermion construction
(available as arXiv preprint)
N/APaper
Quantum current operators (III): Commutative quantum current operators, semi-infinite construction and functional models
(available as arXiv preprint)
N/APaper


Research outcomes over time


This page was built for person: Jintai Ding