Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2025

Research activity per year

Search results

  • Factorization of the universal R-matrix for Uq(sl2)1

    Ding, J., Pakuliak, S. & Khoroshkin, S., Aug 2000, In: Theoretical and Mathematical Physics. 124, 2, p. 1007-1037 31 p.

    Research output: Contribution to journalArticlepeer-review

    12 Citations (Scopus)
  • Fast discretized Gaussian sampling and post-quantum TLS ciphersuite

    Gao, X., Li, L., Ding, J., Liu, J., Saraswathy, R. V. & Liu, Z., 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 551-565 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • Fast multivariate signature generation in hardware: the case of rainbow

    Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J. & Carter, H. W., 2008, Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08. p. 281-282 2 p. 4724917. (Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Fast multivariate signature generation in hardware: The case of rainbow

    Balasubramanian, S., Carter, H. W., Bogdanov, A., Rupp, A. & Ding, J., 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 25-30 6 p. 4580149. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    19 Citations (Scopus)
  • Flexible partial enlargement to accelerate Gröbner basis computation over double-struck F2

    Buchmann, J., Cabarcas, D., Ding, J. & Mohamed, M. S. E., 2010, Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Proceedings. p. 69-81 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Generalization of Drinfeld Quantum Affine Algebras

    Ding, J. & Iohara, K., 2 Jul 1997, In: Letters in Mathematical Physics. 41, 2, p. 181-193 13 p.

    Research output: Contribution to journalArticlepeer-review

    151 Citations (Scopus)
  • Giophantus distinguishing attack is a low dimensional learning with errors problem

    Ding, J., Deaton, J. & Schmidt, K., Feb 2020, In: Advances in Mathematics of Communications. 14, 1, p. 171-175 5 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Growth of the ideal generated by a quadratic Boolean function

    Ding, J., Hodges, T. J. & Kruglov, V., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 13-27 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Growth of the ideal generated by a quadratic multivariate function over GF(3)

    Ding, J., Hodges, T. J., Kruglov, V., Schmidt, D. & Tohneanu, S., Aug 2013, In: Journal of Algebra and its Applications. 12, 5, 1250219.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Hidden field equations

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 61-88 28 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • High Order Linearization Equation (HOLE) attack on multivariate public key cryptosystems

    Ding, J., Hu, L., Nie, X., Li, J. & Wagner, J., 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 233-248 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    45 Citations (Scopus)
  • High-speed hardware implementation of rainbow signature on FPGAs

    Tang, S., Yi, H., Ding, J., Chen, H. & Chen, G., 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 228-243 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • Hmfev - an efficient multivariate signature scheme

    Petzoldt, A., Chen, M. S., Ding, J. & Yang, B. Y., 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Takagi, T., Lange, T. & Takagi, T. (eds.). Springer Verlag, p. 205-223 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    15 Citations (Scopus)
  • Homomorphic encryption standard

    Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser, S., Gorbunov, S., Halevi, S., Hoffstein, J., Laine, K., Lauter, K., Lokam, S., Micciancio, D., Moody, D., Morrison, T., Sahai, A. & Vaikuntanathan, V., 4 Jan 2022, Protecting Privacy through Homomorphic Encryption. Springer International Publishing, p. 31-62 32 p.

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    85 Citations (Scopus)
  • Hopf algebra extension of a Zamolochikov algebra and its double

    Ding, J., Aug 1999, In: Journal of Mathematical Physics. 40, 8, p. 4157-4164 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

    Chen, J., Ling, J., Ning, J. & Ding, J., 1 Jun 2019, In: Gerontologist. 59, 3, p. 1132-1147 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Improved cryptanalysis of HFEv- via projection

    Ding, J., Perlner, R., Petzoldt, A. & Smith-Tone, D., 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Springer Verlag, p. 375-395 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Inoculating multivariate schemes against differential attacks

    Ding, J. & Gower, J. E., 2006, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3958 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    36 Citations (Scopus)
  • Integral presentations for the Universal R-Matrix

    Ding, J., Khoroshkin, S. & Pakuliak, S., 2 Jul 2000, In: Letters in Mathematical Physics. 53, 2, p. 121-141 21 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
  • Introduction

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, In: Advances in Information Security. 80, p. 1-5 5 p.

    Research output: Contribution to journalEditorial

  • Inverting HFE systems is quasi-polynomial for all fields

    Ding, J. & Hodges, T. J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 724-742 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    48 Citations (Scopus)
  • Inverting square systems algebraically is exponential

    Ding, J., Clough, C. & Araujo, R., 2014, In: Finite Fields and their Applications. 26, p. 32-48 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Citations (Scopus)
  • Isomorphism of two realizations of quantum affine algebra {Mathematical expression}

    Ding, J. & Frenkel, I. B., Sept 1993, In: Communications in Mathematical Physics. 156, 2, p. 277-300 24 p.

    Research output: Contribution to journalArticlepeer-review

    179 Citations (Scopus)
  • Kipnis-Shamir attack on HFE revisited

    Jiang, X., Ding, J. & Hu, L., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 399-411 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    15 Citations (Scopus)
  • Kipnis-shamir attack on unbalanced oil-vinegar scheme

    Cao, W., Hu, L., Ding, J. & Yin, Z., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 168-180 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Leakage of signal function with reused keys in RLWE key exchange

    Ding, J., Alsayigh, S., Saraswathy, R. V., Fluhrer, S. & Lin, X., 28 Jul 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7996806. (IEEE International Conference on Communications).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    51 Citations (Scopus)
  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Abe, M., Aoki, K., Ateniese, G., Avanzi, R., Beerliová, Z., Billet, O., Biryukov, A., Blake, I., Boyd, C., Brier, E., Castiglione, A., Cha, J., Chan, A., Chen, L., Cho, K., Contini, S., D'Arco, P., Ding, J., Doche, C., Dunkelman, O., & 70 othersFitzi, M., Fouque, P. A., Fournier, J. J. A., Fujisaki, K., Fujisaki, E., Furukawa, J., Galindo, D., Halevi, S., Handschuh, H., Heneghan, C., Holenstein, T., Hoshino, F., Hwang, Y. H., Isshiki, T., Jochemsz, E., Joux, A., Juels, A., Jutla, C., Kiayias, A., Kikuchi, H., Kobayashi, T., Kohno, T., Krawczyk, H., Kumar, S., Lange, T., Lee, J. W., Masucci, B., May, A., Mihaljevic, M., Minematsu, K., Monrose, F., Montague, P., Myers, S., Naccache, D., Nicolosi, A., Obana, S., Okazaki, S., Okeya, K., Olivier, F., Oyono, R., Page, D., Park, J. H., Peng, K., Pietrzak, K., Raub, D., Sakai, Y., Sakurai, K., Schindler, W., Seo, J. W., Shin, J. H., Shparlinski, I., Steinfeld, R., Szydlo, M., Kalai, Y. T., Teranishi, I., Tokita, T., Tunstall, M., Vercauteren, F., Villegas, K., Walfish, S., Wang, H., Wang, X., Warinschi, B., De Weger, B., Wolf, C., Yampolskiy, A., Yang, Y. H., Yin, Y. L., Yoon, J. & Pointcheval, D., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960 LNCS, p. V-VI

    Research output: Contribution to journalEditorial

    1 Citation (Scopus)
  • Letters for post-quantum cryptography standard evaluation

    Wang, L. C., Ding, J. & Mesnager, S., Feb 2020, In: Advances in Mathematics of Communications. 14, 1, p. i

    Research output: Contribution to journalLetterpeer-review

    Open Access
  • Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange

    Qin, Y., Ding, R., Cheng, C., Bindel, N., Pan, Y. & Ding, J., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 677-697 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems

    Ding, J., Gheorghiu, V., Gilyén, A., Hallgren, S. & Li, J., 2023, In: Quantum. 7

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Citations (Scopus)
  • Linear algebra to compute Syzygies and Gröbner bases

    Cabarcas, D. & Ding, J., 2011, ISSAC 2011 - Proceedings of the 36th International Symposium on Symbolic and Algebraic Computation. p. 67-74 8 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Mqdss

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 153-168 16 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • Multivariate cryptography

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 7-23 17 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Multivariate public key cryptosys

    Ding, J., Gower, J. E. & Schmidt, D. S., 2006, Multivariate Public Key Cryptosystems. Ding, J., Gower, J. & Schmidt, D. (eds.). p. 1-258 258 p. (Advances in Information Security; vol. 25).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    60 Citations (Scopus)
  • Multivariates polynomials for hashing

    Ding, J. & Yang, B. Y., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 358-371 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

    Buchmann, J., Ding, J., Mohamed, M. S. E. & Mohamed, W. S. A. E., 2009, In: Dagstuhl Seminar Proceedings. 9031

    Research output: Contribution to journalConference articlepeer-review

    7 Citations (Scopus)
  • Mutant Zhuang-Zi algorithm

    Ding, J. & Schmidt, D. S., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 28-40 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • MXL2: Solving polynomial equations over GF(2) Using an improved mutant strategy

    Mohamed, M. S. E., Mohamed, W. S. A. E., Ding, J. & Buchmann, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 203-215 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    37 Citations (Scopus)
  • MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals

    Mohamed, M. S. E., Cabarcas, D., Ding, J., Buchmann, J. & Bulygin, S., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    32 Citations (Scopus)
  • New candidates for multivariate trapdoor functions

    Porras, J., Baena, J. B. & Ding, J., 2015, In: Revista Colombiana de Matematicas. 49, 1, p. 57-76 20 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Citations (Scopus)
  • New complexity estimation on the Rainbow-Band-Separation attack

    Nakamura, S., Ikematsu, Y., Wang, Y., Ding, J. & Takagi, T., 6 Dec 2021, In: Theoretical Computer Science. 896, p. 1-18 18 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Citations (Scopus)
  • New differential-algebraic attacks and reparametrization of rainbow

    Ding, J., Yang, B. Y., Chen, C. H. O., Chen, M. S. & Cheng, C. M., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 242-257 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    90 Citations (Scopus)
  • Oil and vinegar

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 89-151 63 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • On a Combinatorial Identity

    Ding, J. & Jing, N., 2000, In: International Mathematics Research Notices. 2000, 6, p. 324-332 9 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • One sample ring-LWE with rounding and its application to key exchange

    Ding, J., Gao, X., Takagi, T. & Wang, Y., 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Yung, M., Ochoa, M. & Deng, R. H. (eds.). Springer Verlag, p. 323-343 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • On the FRTS Approach to Quantized Current Algebras

    Ding, J. & Khoroshkin, S., Sept 1998, In: Letters in Mathematical Physics. 45, 4, p. 331-352 22 p.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • On the integral construction of the universal R-matrix for quantum current superalgebra Uq(oŝp(1,2))

    Ding, J., Dec 2001, In: Czechoslovak Journal of Physics. 51, 12, p. 1291-1298 8 p.

    Research output: Contribution to journalArticlepeer-review

  • Overview of cryptanalysis techniques in multivariate public key cryptography

    Billet, O. & Ding, J., 2009, Gröbner Bases, Coding, and Cryptography. Springer Berlin Heidelberg, p. 263-283 21 p.

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • Partial Gauss decomposition, Uq(gl(n - 1)) ∈ Uq(gl(n)) and Zamolodchikov algebra

    Ding, J., 29 Jan 1999, In: Journal of Physics A: Mathematical and General. 32, 4, p. 671-676 6 p.

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)
  • Perturbed hidden matrix cryptosystems

    Wu, Z., Ding, J., Gower, J. E. & Ye, D., 2005, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3481, II, p. 595-602 8 p.

    Research output: Contribution to journalConference articlepeer-review

    5 Citations (Scopus)