The SCEAS System
| |||||||

## Search the dblp DataBase
Jintai Ding:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
**Breaking a New Instance of TTM Cryptosystems.**[Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:210-225 [Conf] - Jintai Ding, Dieter Schmidt
**Rainbow, a New Multivariable Polynomial Signature Scheme.**[Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:164-175 [Conf] - Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye
**Perturbed Hidden Matrix Cryptosystems.**[Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:595-602 [Conf] - Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi
**Cryptanalysis of PASS II and MiniPass.**[Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:159-168 [Conf] - Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin
**Complexity Estimates for the F**[Citation Graph (0, 0)][DBLP]_{4}Attack on the Perturbed Matsumoto-Imai Cryptosystem. IMA Int. Conf., 2005, pp:262-277 [Conf] - Jintai Ding
**A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:305-318 [Conf] - Jintai Ding, Jason E. Gower
**Inoculating Multivariate Schemes Against Differential Attacks.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:290-301 [Conf] - Jintai Ding, Dieter Schmidt
**Cryptanalysis of HFEv and Internal Perturbation of HFE.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:288-301 [Conf] - Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin
**Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems.**[Citation Graph (0, 0)][DBLP] WCC, 2005, pp:242-251 [Conf] - Jintai Ding, Dieter Schmidt, Zhijun Yin
**Cryptanalysis of the new TTS scheme in CHES 2004.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:4, pp:231-240 [Journal] - Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann
**Analysis of the SMS4 Block Cipher.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:158-170 [Conf] - Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
**Cryptanalysis of the TRMC-4 Public Key Cryptosystem.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:104-115 [Conf] - Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
**High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:233-248 [Conf] - Jintai Ding, Christopher Wolf, Bo-Yin Yang
[Citation Graph (0, 0)][DBLP]*l*-Invertible Cycles for*M*ultivariate*Q*uadratic (*MQ*) Public Key Cryptography. Public Key Cryptography, 2007, pp:266-281 [Conf] **New Differential-Algebraic Attacks and Reparametrization of Rainbow.**[Citation Graph (, )][DBLP]**Fast multivariate signature generation in hardware: The case of rainbow.**[Citation Graph (, )][DBLP]**Algebraic Attack on the MQQ Public Key Cryptosystem.**[Citation Graph (, )][DBLP]**SSE Implementation of Multivariate PKCs on Modern x86 CPUs.**[Citation Graph (, )][DBLP]**Multivariates Polynomials for Hashing.**[Citation Graph (, )][DBLP]**Kipnis-Shamir Attack on HFE Revisited.**[Citation Graph (, )][DBLP]**Square, a New Multivariate Encryption Scheme.**[Citation Graph (, )][DBLP]**Fast Multivariate Signature Generation in Hardware: The Case of Rainbow.**[Citation Graph (, )][DBLP]**Could SFLASH be Repaired?.**[Citation Graph (, )][DBLP]**MXL**[Citation Graph (, )][DBLP]_{3}: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals.**Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared.**[Citation Graph (, )][DBLP]**Algebraic Attack on HFE Revisited.**[Citation Graph (, )][DBLP]**Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over**[Citation Graph (, )][DBLP]*F*_{2}.**MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.**[Citation Graph (, )][DBLP]**Cryptanalysis of Rational Multivariate Public Key Cryptosystems.**[Citation Graph (, )][DBLP]**Square-Vinegar Signature Scheme.**[Citation Graph (, )][DBLP]**Secure Variants of the Square Encryption Scheme.**[Citation Graph (, )][DBLP]**Growth of the Ideal Generated by a Quadratic Boolean Function.**[Citation Graph (, )][DBLP]**Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.**[Citation Graph (, )][DBLP]**Mutant Zhuang-Zi Algorithm.**[Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |