TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 20.

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: LNCS, In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, pp. 1-24,
Springer, Auckland, New Zealand, [Conference or Workshop Item]

Tao, Chengdong and Xiang, Hong and Petzoldt, Albrecht and Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35), pp. 352-368. [Article]

Zhang, Jiang and Zhang, Zhenfeng and Ding, Jintai and Snook, Michael and Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015,
Sofia, Bulgaria, [Conference or Workshop Item]

Ding, Jintai and Petzoldt, Albrecht and Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, pp. 76-87,
Springer, Waterloo, Canada, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Communications in Computer and Information Science, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, pp. 123-131,
Springer, Brno University, Czech Republic, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36. [Article]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Lecture Notes in Computer, In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, pp. 87-100,
Springer, Seoul, Korea, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Bulygin, Stanislav and Ding, Jintai and Buchmann, Johannes and Werner, Fabian Heng, S.-H. and Wright, R. N. and Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Lecture Notes in Computer Science, In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), pp. 140–-155,
Springer, Kuala Lumpur, Malaysia, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Kleinjung, Thorsten and Bulygin, Stanislav and Buchmann, Johannes Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), pp. 89-100,
[Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Ding, Jintai and Mohamed, Mohamed Saied Emam Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS, In: AFRICACRYPT, pp. 69-81,
Springer, Stellenbosch, South Africa, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes and Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: LNCS, In: Cryptology and Network Security, 8th International Conference, CANS 2009, pp. 392-401,
Springer, Kanazawa, Japan, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS, In: PQCrypto 2008, pp. 109-123,
Springer, Cincinnati, USA, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Buchmann, Johannes (2008):
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, pp. 203-215,
DOI: 10.1007/978-3-540-88403-3_14,
[Conference or Workshop Item]

Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Post-Quantum Cryptography.
LNCS, Springer, Cincinnati, [Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Explicit Hard Instances of the Shortest Vector Problem.
In: LNCS, In: PQCrypto 2008, pp. 79-94,
ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: LNCS, In: PQCrypto 2008, pp. 63-78,
Springer, [Conference or Workshop Item]

Ding, Jintai and Buchmann, Johannes and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Weinmann, Ralf-Philipp (2008):
MutantXL.
In: SCC 2008,
[Conference or Workshop Item]

Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings.
In: Lecture Notes in Computer Science, 5299, In: PQCrypto,
Springer, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Ding, Jintai and Lindner, Richard (2007):
Identifying Ideal Lattices.
In: Cryptology ePrint Archive, 2007 (322), pp. 1-12. International Association for Cryptologic Research (IACR), [Article]

Liu, Fen and Ji, Wen and Hu, Lei and Ding, Jintai and Lv, Shuwang and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2007):
Analysis of the SMS4 Block Cipher.
In: ACISP, pp. 158-170,
[Conference or Workshop Item]

This list was generated on Tue Jun 15 00:52:15 2021 CEST.