The SCEAS System
Navigation Menu

Search the dblp DataBase


Jintai Ding: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
    Breaking a New Instance of TTM Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:210-225 [Conf]
  2. Jintai Ding, Dieter Schmidt
    Rainbow, a New Multivariable Polynomial Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:164-175 [Conf]
  3. Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye
    Perturbed Hidden Matrix Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:595-602 [Conf]
  4. Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi
    Cryptanalysis of PASS II and MiniPass. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:159-168 [Conf]
  5. Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin
    Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:262-277 [Conf]
  6. Jintai Ding
    A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:305-318 [Conf]
  7. Jintai Ding, Jason E. Gower
    Inoculating Multivariate Schemes Against Differential Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:290-301 [Conf]
  8. Jintai Ding, Dieter Schmidt
    Cryptanalysis of HFEv and Internal Perturbation of HFE. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:288-301 [Conf]
  9. Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin
    Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:242-251 [Conf]
  10. Jintai Ding, Dieter Schmidt, Zhijun Yin
    Cryptanalysis of the new TTS scheme in CHES 2004. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:4, pp:231-240 [Journal]
  11. Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann
    Analysis of the SMS4 Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:158-170 [Conf]
  12. Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
    Cryptanalysis of the TRMC-4 Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:104-115 [Conf]
  13. Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
    High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:233-248 [Conf]
  14. Jintai Ding, Christopher Wolf, Bo-Yin Yang
    l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:266-281 [Conf]

  15. New Differential-Algebraic Attacks and Reparametrization of Rainbow. [Citation Graph (, )][DBLP]

  16. Fast multivariate signature generation in hardware: The case of rainbow. [Citation Graph (, )][DBLP]

  17. Algebraic Attack on the MQQ Public Key Cryptosystem. [Citation Graph (, )][DBLP]

  18. SSE Implementation of Multivariate PKCs on Modern x86 CPUs. [Citation Graph (, )][DBLP]

  19. Multivariates Polynomials for Hashing. [Citation Graph (, )][DBLP]

  20. Kipnis-Shamir Attack on HFE Revisited. [Citation Graph (, )][DBLP]

  21. Square, a New Multivariate Encryption Scheme. [Citation Graph (, )][DBLP]

  22. Fast Multivariate Signature Generation in Hardware: The Case of Rainbow. [Citation Graph (, )][DBLP]

  23. Could SFLASH be Repaired?. [Citation Graph (, )][DBLP]

  24. MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. [Citation Graph (, )][DBLP]

  25. Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. [Citation Graph (, )][DBLP]

  26. Algebraic Attack on HFE Revisited. [Citation Graph (, )][DBLP]

  27. Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. [Citation Graph (, )][DBLP]

  28. MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. [Citation Graph (, )][DBLP]

  29. Cryptanalysis of Rational Multivariate Public Key Cryptosystems. [Citation Graph (, )][DBLP]

  30. Square-Vinegar Signature Scheme. [Citation Graph (, )][DBLP]

  31. Secure Variants of the Square Encryption Scheme. [Citation Graph (, )][DBLP]

  32. Growth of the Ideal Generated by a Quadratic Boolean Function. [Citation Graph (, )][DBLP]

  33. Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. [Citation Graph (, )][DBLP]

  34. Mutant Zhuang-Zi Algorithm. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002