Search the dblp DataBase
Jintai Ding :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xuyun Nie , Lei Hu , Jianyu Li , Crystal Updegrove , Jintai Ding Breaking a New Instance of TTM Cryptosystems. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:210-225 [Conf ] Jintai Ding , Dieter Schmidt Rainbow, a New Multivariable Polynomial Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:164-175 [Conf ] Zhiping Wu , Jintai Ding , Jason E. Gower , Dingfeng Ye Perturbed Hidden Matrix Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:595-602 [Conf ] Bok-Min Goi , Jintai Ding , Mohammad Umar Siddiqi Cryptanalysis of PASS II and MiniPass. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:159-168 [Conf ] Jintai Ding , Jason E. Gower , Dieter Schmidt , Christopher Wolf , Zhijun Yin Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:262-277 [Conf ] Jintai Ding A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:305-318 [Conf ] Jintai Ding , Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:290-301 [Conf ] Jintai Ding , Dieter Schmidt Cryptanalysis of HFEv and Internal Perturbation of HFE. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:288-301 [Conf ] Adama Diene , Jintai Ding , Jason E. Gower , Timothy J. Hodges , Zhijun Yin Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. [Citation Graph (0, 0)][DBLP ] WCC, 2005, pp:242-251 [Conf ] Jintai Ding , Dieter Schmidt , Zhijun Yin Cryptanalysis of the new TTS scheme in CHES 2004. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:4, pp:231-240 [Journal ] Fen Liu , Wen Ji , Lei Hu , Jintai Ding , Shuwang Lv , Andrei Pyshkin , Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:158-170 [Conf ] Xuyun Nie , Lei Hu , Jintai Ding , Jianyu Li , John Wagner Cryptanalysis of the TRMC-4 Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:104-115 [Conf ] Jintai Ding , Lei Hu , Xuyun Nie , Jianyu Li , John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:233-248 [Conf ] Jintai Ding , Christopher Wolf , Bo-Yin Yang l -Invertible Cycles for M ultivariate Q uadratic (MQ ) Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:266-281 [Conf ] New Differential-Algebraic Attacks and Reparametrization of Rainbow. [Citation Graph (, )][DBLP ] Fast multivariate signature generation in hardware: The case of rainbow. [Citation Graph (, )][DBLP ] Algebraic Attack on the MQQ Public Key Cryptosystem. [Citation Graph (, )][DBLP ] SSE Implementation of Multivariate PKCs on Modern x86 CPUs. [Citation Graph (, )][DBLP ] Multivariates Polynomials for Hashing. [Citation Graph (, )][DBLP ] Kipnis-Shamir Attack on HFE Revisited. [Citation Graph (, )][DBLP ] Square, a New Multivariate Encryption Scheme. [Citation Graph (, )][DBLP ] Fast Multivariate Signature Generation in Hardware: The Case of Rainbow. [Citation Graph (, )][DBLP ] Could SFLASH be Repaired?. [Citation Graph (, )][DBLP ] MXL3 : An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. [Citation Graph (, )][DBLP ] Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. [Citation Graph (, )][DBLP ] Algebraic Attack on HFE Revisited. [Citation Graph (, )][DBLP ] Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F 2 . [Citation Graph (, )][DBLP ] MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. [Citation Graph (, )][DBLP ] Cryptanalysis of Rational Multivariate Public Key Cryptosystems. [Citation Graph (, )][DBLP ] Square-Vinegar Signature Scheme. [Citation Graph (, )][DBLP ] Secure Variants of the Square Encryption Scheme. [Citation Graph (, )][DBLP ] Growth of the Ideal Generated by a Quadratic Boolean Function. [Citation Graph (, )][DBLP ] Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. [Citation Graph (, )][DBLP ] Mutant Zhuang-Zi Algorithm. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs