Jintai Ding

From MaRDI portal
Person:492016

Available identifiers

zbMath Open ding.jintaiMaRDI QIDQ492016

List of research outcomes

PublicationDate of PublicationType
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs2023-05-26Paper
A physical study of the LLL algorithm2023-01-12Paper
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-32022-12-21Paper
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite2022-12-09Paper
Cryptanalysis of the lifted unbalanced oil vinegar signature scheme2022-12-07Paper
Homomorphic Encryption Standard2022-11-02Paper
Efficient key recovery for all HFE signature variants2022-03-31Paper
The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes2021-12-08Paper
New complexity estimation on the rainbow-band-separation attack2021-11-18Paper
Multivariate Public Key Cryptosystems2021-08-11Paper
A physical study of the LLL algorithm2021-06-03Paper
The singularity attack to the multivariate signature scheme HIMQ-32021-05-12Paper
Giophantus distinguishing attack is a low dimensional learning with errors problem2020-11-07Paper
A framework for universally composable oblivious transfer from one-round key-exchange2020-05-06Paper
One sample ring-LWE with rounding and its application to key exchange2020-01-30Paper
Giophantus distinguishing attack is a low dimensional learning with errors problem2019-11-26Paper
A key exchange based on the short integer solution problem and the learning with errors problem2019-10-14Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction2018-12-07Paper
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack2018-12-04Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)2018-10-24Paper
The Beauty and the Beasts -- the hard cases in LLL reduction2018-10-24Paper
Complete attack on RLWE key exchange with reused keys, without signal leakage2018-09-26Paper
HMFEv -- an efficient multivariate signature scheme2018-09-12Paper
Improved cryptanalysis of HFEv- via projection2018-06-22Paper
Post-quantum secure remote password protocol from RLWE problem2018-04-20Paper
LLL and stochastic sandpile models2018-04-07Paper
Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community2017-10-20Paper
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World2017-04-12Paper
Design Principles for HFEv- Based Multivariate Signature Schemes2016-06-10Paper
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems2016-04-26Paper
A Practical Attack on Patched MIFARE Classic2015-12-02Paper
Authenticated Key Exchange from Ideal Lattices2015-09-30Paper
SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption2015-08-19Paper
Linear algebra to compute syzygies and Gröbner bases2015-06-09Paper
The Cubic Simple Matrix Encryption Scheme2015-01-14Paper
ZHFE, a New Multivariate Public Key Encryption Scheme2015-01-14Paper
https://portal.mardi4nfdi.de/entity/Q29355932014-12-30Paper
Inverting square systems algebraically is exponential2014-02-11Paper
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields2013-12-10Paper
https://portal.mardi4nfdi.de/entity/Q28373262013-07-10Paper
Degree of Regularity for HFEv and HFEv-2013-06-14Paper
Simple Matrix Scheme for Encryption2013-06-14Paper
GROWTH OF THE IDEAL GENERATED BY A QUADRATIC MULTIVARIATE FUNCTION OVER GF(3)2013-06-05Paper
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations2013-05-28Paper
An Algebraic Broadcast Attack against NTRU2012-09-07Paper
High-Speed Hardware Implementation of Rainbow Signature on FPGAs2011-11-25Paper
Inverting HFE Systems Is Quasi-Polynomial for All Fields2011-08-12Paper
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme2011-05-19Paper
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems2010-12-07Paper
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared2010-07-16Paper
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals2010-07-16Paper
Growth of the Ideal Generated by a Quadratic Boolean Function2010-06-17Paper
Mutant Zhuang-Zi Algorithm2010-06-17Paper
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme2010-06-17Paper
Secure Variants of the Square Encryption Scheme2010-06-17Paper
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over $\mathbb{F}_2$2010-05-04Paper
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography2009-12-16Paper
Algebraic Attack on the MQQ Public Key Cryptosystem2009-11-26Paper
SSE Implementation of Multivariate PKCs on Modern x86 CPUs2009-11-10Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Square, a New Multivariate Encryption Scheme2009-04-29Paper
Multivariate Public Key Cryptography2009-03-12Paper
Analysis of the SMS4 Block Cipher2009-03-06Paper
Multivariates Polynomials for Hashing2009-02-10Paper
Kipnis-Shamir Attack on HFE Revisited2009-02-10Paper
Algebraic Attack on HFE Revisited2008-11-20Paper
Square-Vinegar Signature Scheme2008-11-11Paper
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy2008-11-11Paper
Could SFLASH be Repaired?2008-08-19Paper
New Differential-Algebraic Attacks and Reparametrization of Rainbow2008-06-13Paper
Rainbow, a New Multivariable Polynomial Signature Scheme2007-09-24Paper
ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography2007-09-04Paper
https://portal.mardi4nfdi.de/entity/Q34355692007-05-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Coding and Cryptography2007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Cryptography and Coding2006-11-01Paper
Information and Communications Security2006-10-24Paper
Multivariate public key cryptosystems2006-10-18Paper
Cryptanalysis of the new TTS scheme in CHES 20042006-10-13Paper
Public Key Cryptography - PKC 20052005-12-07Paper
CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM2005-03-14Paper
Universal \(\mathcal R\)-matrix for quantum affine algebras \(U_q(A_2^{(2)})\) and \(U_q(\widehat{\text{osp}}(1|2))\) with Drinfeld co\-mul\-ti\-plication.2005-02-22Paper
https://portal.mardi4nfdi.de/entity/Q31548572005-01-14Paper
On the integral construction of the universal R-matrix for quantum current superalgebra \(U_q(\widehat{\text{osp}}(1,2))\).2004-09-07Paper
https://portal.mardi4nfdi.de/entity/Q44510972004-02-23Paper
A remark on the FRTS realization and Drinfeld realization of quantum affine superalgebra \(U_q(\widehat{osp} (1,2))\)2004-02-08Paper
https://portal.mardi4nfdi.de/entity/Q45270722003-08-05Paper
On the FRTS approach to quantized current algebras2001-12-02Paper
Integral presentations for the universal \(R\)-matrix2001-07-02Paper
https://portal.mardi4nfdi.de/entity/Q49457162001-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45232342001-01-08Paper
https://portal.mardi4nfdi.de/entity/Q49516482000-12-11Paper
Spinor representations of \(U_q(\widehat{\mathfrak gl}(n))\) and quantum boson-fermion correspondence2000-09-06Paper
Quantized W-algebra of sl(2, 1) and Quantum Parafermions of Uq(^sl(2))2000-08-15Paper
Hopf algebra extension of a Zamolochikov algebra and its double1999-11-21Paper
Partial Gauss decomposition, and Zamolodchikov algebra1999-11-02Paper
Drinfeld comultiplication and vertex operators1999-04-13Paper
Quantum current operators. I: Zeros and poles of quantum current operators and the condition of quantum integrability1998-06-11Paper
Quantum current operators. II: Difference equations of quantum current operators and quantum parafermion construction1998-06-11Paper
Generalization of Drinfeld quantum affine algebras1997-11-11Paper
Crystal algebra1997-11-09Paper
Spinor representations of \(U_ q(\widehat{\mathfrak o}(N))\)1997-05-11Paper
https://portal.mardi4nfdi.de/entity/Q48692341996-10-15Paper
The center of a quantum affine algebra at the critical level1996-02-21Paper
Isomorphism of two realizations of quantum affine algebra \(U_ q(\widehat{\mathfrak{gl}}(n))\)1994-05-06Paper
A proof of a conjecture of C. L. Siegel1994-04-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Jintai Ding