Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2025

Research activity per year

Search results

  • A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope

    Qin, Y., Cheng, C. & Ding, J., 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 504-520 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11736 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    21 Citations (Scopus)
  • A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3

    Ding, J., Zhang, Z., Deaton, J. & Wang, L. C., 2020, Information and Communications Security - 22nd International Conference, ICICS 2020, Proceedings. Meng, W., Gollmann, D., Jensen, C. D. & Zhou, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 422-440 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12282 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange

    Branco, P., Ding, J., Goulão, M. & Mateus, P., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 78-101 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • A key exchange based on the short integer solution problem and the learning with errors problem

    Ding, J., Schmitt, K. & Zhang, Z., 2019, Codes, Cryptology and Information Security - 3rd International Conference, C2SI 2019, Proceeding. Carlet, C., Souidi, E. M., Guilley, S. & Nitaj, A. (eds.). Springer Verlag, p. 105-117 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11445 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Algebraic attack on HFE revisited

    Ding, J., Schmidt, D. & Werner, F., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 215-227 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    26 Citations (Scopus)
  • Algebraic attack on the MQQ public key cryptosystem

    Mohamed, M. S. E., Ding, J., Buchmann, J. & Werner, F., 2009, Cryptology and Network Security - 8th International Conference, CANS 2009, Proceedings. p. 392-401 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5888 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    22 Citations (Scopus)
  • Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared

    Erickson, J., Ding, J. & Christensen, C., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Algebraic Relation of Three MinRank Algebraic Modelings

    Guo, H. & Ding, J., 2023, Arithmetic of Finite Fields - 9th International Workshop, WAIFI 2022, Revised Selected Papers. Mesnager, S., Mesnager, S. & Zhou, Z. (eds.). Springer Science and Business Media Deutschland GmbH, p. 239-249 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13638 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Algebraic solvers for certain lattice-related problems

    Ding, J., 2011, 2011 IEEE Information Theory Workshop, ITW 2011. p. 405-409 5 p. 6089489. (2011 IEEE Information Theory Workshop, ITW 2011).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • An algebraic broadcast attack against NTRU

    Ding, J., Pan, Y. & Deng, Y., 2012, Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings. p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7372 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification

    Wang, Q., Cheng, C., Xu, R., Ding, J. & Liu, Z., 2022, In: IEEE Transactions on Services Computing. 15, 4, p. 2226-2231 6 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    8 Citations (Scopus)
  • Analysis of the SMS4 block cipher

    Fen, L., Wen, J., Lei, H., Jintai, D., Shuwang, L., Pyshkin, A. & Weinmann, R. P., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 158-170 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    38 Citations (Scopus)
  • A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations

    Ding, J., 2019, Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S and P, AIBlock, and AIoTS 2019. Zhou, J., Deng, R., Li, Z., Majumdar, S., Meng, W., Wang, L. & Zhang, K. (eds.). Springer Verlag, p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11605 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • A new variant of the matsumoto-imai cryptosystem through perturbation

    Ding, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 305-318 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    Open Access
    85 Citations (Scopus)
  • An Improved Practical Key Mismatch Attack Against NTRU

    Liu, Z., Vishakha, Ding, J., Cheng, C. & Pan, Y., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 322-342 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14771 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • A physical study of the LLL algorithm

    Ding, J., Kim, S., Takagi, T., Wang, Y. & Yang, B. Y., Mar 2023, In: Journal of Number Theory. 244, p. 339-368 30 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • A practical attack on patched mifare classic

    Chiu, Y. H., Hong, W. C., Chou, L. P., Ding, J., Yang, B. Y. & Cheng, C. M., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 150-164 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • A proof of a conjecture of C.L. Siegel

    Ding, J., Jan 1994, In: Journal of Number Theory. 46, 1, p. 1-11 11 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Citations (Scopus)
  • A remark on the FRTS realization and Drinfeld realization of quantum affine superalgebra Uq(oŝp(1, 2))

    Ding, J., 2 Jul 1999, In: Letters in Mathematical Physics. 49, 2, p. 161-171 11 p.

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)
  • A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs

    Qin, Y., Cheng, C., Zhang, X., Pan, Y., Hu, L. & Ding, J., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 92-121 30 p. (Lecture Notes in Computer Science; vol. 13093 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    34 Citations (Scopus)
  • Authenticated key exchange from ideal lattices

    Zhang, J., Zhang, Z., Ding, J., Snook, M. & Dagdelen, Ö., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 719-751 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    145 Citations (Scopus)
  • A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    10 Citations (Scopus)
  • Breaking a new instance of TTM cryptosystems

    Nie, X., Hu, L., Li, J., Updegrove, C. & Ding, J., 2006, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 210-225 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    14 Citations (Scopus)
  • Breaking instance II of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Qin, Z., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 1332-1335 4 p. 4604288. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Breaking instance I of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Zhang, F., 2008, 2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008. p. 493-497 5 p. 4657821. (2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Commutative quantum current operators, semi-infinite construction and functional models

    Ding, J. & Feigin, B., 1 Aug 2000, In: Representation Theory. 4, 13, p. 330-341 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    6 Citations (Scopus)
  • Complete attack on RLWE key exchange with reused keys, without signal leakage

    Ding, J., Fluhrer, S. & Rv, S., 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 467-486 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    51 Citations (Scopus)
  • Complexity estimates for the F4 attack on the perturbed matsumoto-imai cryptosystem

    Ding, J., Gower, J. E., Schmidt, D., Wolf, C. & Yin, Z., 2005, Cryptography and Coding - 10th IMA International Conference, Proceedings. Springer Verlag, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    12 Citations (Scopus)
  • Constructing linear transformations of MPKC by generalized central symmetric matrices

    Xin, J., Lei, H. & Jintai, D., 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009. 5276944. (2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Could SFLASH be repaired?

    Ding, J., Dubois, V., Yang, B. Y., Chen, O. C. H. & Cheng, C. M., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 691-701 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    31 Citations (Scopus)
  • Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol

    Wang, Q. & Ding, J., Oct 2014, In: Cryptologia. 38, 4, p. 370-376 7 p.

    Research output: Contribution to journalArticlepeer-review

  • Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

    Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Yoshioka, K. & Ogawa, K. (eds.). Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9836 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction

    Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 1 Nov 2018, In: Japan Journal of Industrial and Applied Mathematics. 35, 3, p. 1123-1152 30 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Open Access
    56 Citations (Scopus)
  • Cryptanalysis of PASS II and miniPass

    Goi, B. M., Ding, J. & Siddiqi, M. U., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 159-168 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Cryptanalysis of rational multivariate public key cryptosystems

    Ding, J. & Wagner, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 124-136 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Cryptanalysis of the lifted unbalanced oil vinegar signature scheme

    Ding, J., Deaton, J., Schmidt, K., Vishakha & Zhang, Z., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 279-298 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Cryptanalysis of the new TTS scheme in CHES 2004

    Ding, J., Schmidt, D. & Yin, Z., Oct 2006, In: International Journal of Information Security. 5, 4, p. 231-240 10 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
  • Cryptanalysis of the SNOVA Signature Scheme

    Li, P. & Ding, J., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 79-91 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14772 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Cryptanalysis of the TRMC-4 public key cryptosystem

    Nie, X., Hu, L., Ding, J., Li, J. & Wagner, J., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 104-115 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Cryptanalysis of two quartic encryption schemes and one improved MFE scheme

    Cao, W., Nie, X., Hu, L., Tang, X. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 41-60 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Crystal Algebra

    Ding, J., 1996, In: Letters in Mathematical Physics. 38, 2, p. 177-183 7 p.

    Research output: Contribution to journalArticlepeer-review

  • Current State of Multivariate Cryptography

    Ding, J. & Petzoldt, A., 2017, In: IEEE Security and Privacy. 15, 4, p. 28-36 9 p., 8012305.

    Research output: Contribution to journalReview articlepeer-review

    94 Citations (Scopus)
  • Degree of regularity for HFEv and HFEv-

    Ding, J. & Yang, B. Y., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 52-66 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    29 Citations (Scopus)
  • Design principles for HFEV-based multivariate signature schemes

    Petzoldt, A., Chen, M. S., Yang, B. Y., Tao, C. & Ding, J., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 311-334 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    91 Citations (Scopus)
  • Dimension of the linearization equations of the Matsumoto-Imai cryptosystems

    Diene, A., Ding, J., Gower, J. E., Hodges, T. J. & Yin, Z., 2006, Coding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers. Springer Verlag, p. 242-251 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3969 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    6 Citations (Scopus)
  • Drinfeld comultiplication and vertex operators

    Ding, J. & Iohara, K., Aug 1997, In: Journal of Geometry and Physics. 23, 1, p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    9 Citations (Scopus)
  • Efficient Key Recovery for All HFE Signature Variants

    Tao, C., Petzoldt, A. & Ding, J., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 70-93 24 p. (Lecture Notes in Computer Science; vol. 12825 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    24 Citations (Scopus)
  • Embedded surface attack on multivariate public key cryptosystems from diophantine equations

    Ding, J., Ren, A. & Tao, C., 2013, Information Security and Cryptology - 8th International Conference, INSCRYPT 2012, Revised Selected Papers. p. 122-136 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7763 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Extension Field Cancellation: A new central trapdoor for multivariate quadratic systems

    Szepieniec, A., Ding, J. & Preneel, B., 2016, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Proceedings. Takagi, T. (ed.). Springer Verlag, p. 182-196 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9606).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    26 Citations (Scopus)