TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 20.

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Tao, Chengdong and Xiang, Hong and Petzoldt, Albrecht and Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, pp. 352-368, (35), [Article]

Zhang, Jiang and Zhang, Zhenfeng and Ding, Jintai and Snook, Michael and Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015, Sofia, Bulgaria, [Conference or Workshop Item]

Ding, Jintai and Petzoldt, Albrecht and Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: PQCrypto 2014, Springer, Waterloo, Canada, In: LNCS, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno University, Czech Republic, In: Communications in Computer and Information Science, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36, [Article]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav
Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, Springer, Seoul, Korea, Lecture Notes in Computer, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Bulygin, Stanislav and Ding, Jintai and Buchmann, Johannes and Werner, Fabian
Heng, S.-H. and Wright, R. N. and Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), Springer, Kuala Lumpur, Malaysia, In: Lecture Notes in Computer Science, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Kleinjung, Thorsten and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Ding, Jintai and Mohamed, Mohamed Saied Emam
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: AFRICACRYPT, Springer, Stellenbosch, South Africa, In: LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes and Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: Cryptology and Network Security, 8th International Conference, CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: PQCrypto 2008, Springer, Cincinnati, USA, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Buchmann, Johannes (2008):
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, DOI: 10.1007/978-3-540-88403-3_14,
[Conference or Workshop Item]

Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Post-Quantum Cryptography.
Springer, Cincinnati, LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Explicit Hard Instances of the Shortest Vector Problem.
In: PQCrypto 2008, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: PQCrypto 2008, Springer, In: LNCS, [Conference or Workshop Item]

Ding, Jintai and Buchmann, Johannes and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Weinmann, Ralf-Philipp (2008):
MutantXL.
In: SCC 2008, [Conference or Workshop Item]

Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings.
In: PQCrypto, Springer, In: Lecture Notes in Computer Science, 5299, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Ding, Jintai and Lindner, Richard (2007):
Identifying Ideal Lattices.
[Other]

Liu, Fen and Ji, Wen and Hu, Lei and Ding, Jintai and Lv, Shuwang and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2007):
Analysis of the SMS4 Block Cipher.
In: ACISP, [Conference or Workshop Item]

This list was generated on Sat Oct 19 01:25:23 2019 CEST.