Jintai Ding


Ontology type: schema:Person     


Person Info

NAME

Jintai

SURNAME

Ding

Publications in SciGraph latest 50 shown

  • 2018-11 Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction in JAPAN JOURNAL OF INDUSTRIAL AND APPLIED MATHEMATICS
  • 2018-06-13 Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage in INFORMATION SECURITY AND PRIVACY
  • 2018-04-01 Improved Cryptanalysis of HFEv- via Projection in POST-QUANTUM CRYPTOGRAPHY
  • 2018-02-04 Post-Quantum Secure Remote Password Protocol from RLWE Problem in INFORMATION SECURITY AND CRYPTOLOGY
  • 2017-07-27 The Beauty and the Beasts—The Hard Cases in LLL Reduction in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2017 HMFEv - An Efficient Multivariate Signature Scheme in POST-QUANTUM CRYPTOGRAPHY
  • 2017 Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2017 Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World in TOPICS IN CRYPTOLOGY – CT-RSA 2017
  • 2016 Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2016 Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems in POST-QUANTUM CRYPTOGRAPHY
  • 2015-04-14 Authenticated Key Exchange from Ideal Lattices in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015
  • 2015 Design Principles for HFEv- Based Multivariate Signature Schemes in ADVANCES IN CRYPTOLOGY -- ASIACRYPT 2015
  • 2014 ZHFE, a New Multivariate Public Key Encryption Scheme in POST-QUANTUM CRYPTOGRAPHY
  • 2014 A Practical Attack on Patched MIFARE Classic in INFORMATION SECURITY AND CRYPTOLOGY
  • 2014 The Cubic Simple Matrix Encryption Scheme in POST-QUANTUM CRYPTOGRAPHY
  • 2013 Simple Matrix Scheme for Encryption in POST-QUANTUM CRYPTOGRAPHY
  • 2013 Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations in INFORMATION SECURITY AND CRYPTOLOGY
  • 2013 Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields in
  • 2013 Degree of Regularity for HFEv and HFEv- in POST-QUANTUM CRYPTOGRAPHY
  • 2012 An Algebraic Broadcast Attack against NTRU in INFORMATION SECURITY AND PRIVACY
  • 2011 Inverting HFE Systems Is Quasi-Polynomial for All Fields in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2011 High-Speed Hardware Implementation of Rainbow Signature on FPGAs in POST-QUANTUM CRYPTOGRAPHY
  • 2011 Towards Algebraic Cryptanalysis of HFE Challenge 2 in INFORMATION SECURITY AND ASSURANCE
  • 2011 Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2010 Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems in CRYPTOLOGY AND NETWORK SECURITY
  • 2010 Secure Variants of the Square Encryption Scheme in POST-QUANTUM CRYPTOGRAPHY
  • 2010 Growth of the Ideal Generated by a Quadratic Boolean Function in POST-QUANTUM CRYPTOGRAPHY
  • 2010 Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared in INFORMATION, SECURITY AND CRYPTOLOGY – ICISC 2009
  • 2010 MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals in INFORMATION, SECURITY AND CRYPTOLOGY – ICISC 2009
  • 2010 Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2010
  • 2010 Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme in POST-QUANTUM CRYPTOGRAPHY
  • 2010 Mutant Zhuang-Zi Algorithm in POST-QUANTUM CRYPTOGRAPHY
  • 2009 Algebraic Attack on the MQQ Public Key Cryptosystem in CRYPTOLOGY AND NETWORK SECURITY
  • 2009 Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography in GRÖBNER BASES, CODING, AND CRYPTOGRAPHY
  • 2009 SSE Implementation of Multivariate PKCs on Modern x86 CPUs in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009
  • 2009 Square, a New Multivariate Encryption Scheme in TOPICS IN CRYPTOLOGY – CT-RSA 2009
  • 2009 Multivariate Public Key Cryptography in POST-QUANTUM CRYPTOGRAPHY
  • 2008 Cryptanalysis of Rational Multivariate Public Key Cryptosystems in POST-QUANTUM CRYPTOGRAPHY
  • 2008 New Differential-Algebraic Attacks and Reparametrization of Rainbow in ROBOCUP 2001: ROBOT SOCCER WORLD CUP V
  • 2008 Algebraic Attack on HFE Revisited in INFORMATION SECURITY
  • 2008 Could SFLASH be Repaired? in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2008 MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy in POST-QUANTUM CRYPTOGRAPHY
  • 2008 Multivariates Polynomials for Hashing in INFORMATION SECURITY AND CRYPTOLOGY
  • 2008 Square-Vinegar Signature Scheme in POST-QUANTUM CRYPTOGRAPHY
  • 2007 High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems in PUBLIC KEY CRYPTOGRAPHY – PKC 2007
  • 2007 Cryptanalysis of the TRMC-4 Public Key Cryptosystem in ROBOCUP-97: ROBOT SOCCER WORLD CUP I
  • 2007 Analysis of the SMS4 Block Cipher in INFORMATION SECURITY AND PRIVACY
  • 2007 ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography in PUBLIC KEY CRYPTOGRAPHY – PKC 2007
  • 2006-10 Cryptanalysis of the new TTS scheme in CHES 2004 in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2006 Inoculating Multivariate Schemes Against Differential Attacks in PUBLIC KEY CRYPTOGRAPHY - PKC 2006
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.24827.3b", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Ding", 
        "givenName": "Jintai", 
        "id": "sg:person.010723403013.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T14:07", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1883.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.010723403013.04'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.010723403013.04'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.010723403013.04'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.010723403013.04'


     




    Preview window. Press ESC to close (or click here)


    ...