Name
Papers
Collaborators
JINTAI DING
125
186
Citations 
PageRank 
Referers 
956
72.85
745
Referees 
References 
685
1020
Search Limit
100745
Title
Citations
PageRank
Year
Algebraic Relation of Three MinRank Algebraic Modelings.00.342022
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange00.342022
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification00.342022
Several Improvements on BKZ Algorithm.00.342022
New complexity estimation on the Rainbow-Band-Separation attack00.342021
The Singularity Attack To The Multivariate Signature Scheme Himq-300.342021
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.00.342021
Giophantus Distinguishing Attack Is A Low Dimensional Learning With Errors Problem00.342020
Letters for post-quantum cryptography standard evaluation00.342020
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber.00.342019
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol.00.342019
A Simple Key Reuse Attack on Ntru Cryptosystem.00.342019
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.00.342019
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs).00.342019
Homomorphic Encryption Standard.00.342019
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems30.452019
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.00.342019
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption.00.342019
One Sample Ring-LWE with Rounding and Its Application to Key Exchange.00.342019
Complete Attack On Rlwe Key Exchange With Reused Keys, Without Signal Leakage10.362018
Improved Cryptanalysis of HFEv- via Projection.00.342018
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack.00.342018
How to validate the secret of a Ring Learning with Errors (RLWE) key.00.342018
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption.00.342018
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models.00.342018
The Beauty and the Beasts - The Hard Cases in LLL Reduction.00.342017
Post-Quantum Secure Remote Password Protocol from RLWE Problem.00.342017
HMFEv - An Efficient Multivariate Signature Scheme.00.342017
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World.50.402017
Current State of Multivariate Cryptography.90.482017
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.00.342017
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction.00.342016
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld.00.342016
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme.10.412016
Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption70.612015
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups.00.342015
Zhfe, A New Multivariate Public Key Encryption Scheme210.742014
Provably Secure Group Key Management Approach Based upon Hyper-Sphere.00.342014
New candidates for multivariate trapdoor functions.50.482014
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol00.342014
The Cubic Simple Matrix Encryption Scheme80.552014
Inverting square systems algebraically is exponential30.412014
A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD.00.342014
Simple Matrix Scheme For Encryption281.112013
A Practical Attack On Patched Mifare Classic00.342013
Degree Of Regularity For Hfev And Hfev-150.722013
A variant of rainbow with shorter secret key and faster signature generation50.452013
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields.00.342013
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.00.342012
New cryptographic constructions using generalized learning with errors problem.00.342012
  • 1
  • 2