Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2024

Research activity per year

Search results

  • 2016

    Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

    Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Yoshioka, K. & Ogawa, K. (eds.). Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9836 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Extension Field Cancellation: A new central trapdoor for multivariate quadratic systems

    Szepieniec, A., Ding, J. & Preneel, B., 2016, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Proceedings. Takagi, T. (ed.). Springer Verlag, p. 182-196 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9606).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • 2015

    Authenticated key exchange from ideal lattices

    Zhang, J., Zhang, Z., Ding, J., Snook, M. & Dagdelen, Ö., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 719-751 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    142 Citations (Scopus)
  • Design principles for HFEV-based multivariate signature schemes

    Petzoldt, A., Chen, M. S., Yang, B. Y., Tao, C. & Ding, J., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 311-334 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    89 Citations (Scopus)
  • New candidates for multivariate trapdoor functions

    Porras, J., Baena, J. B. & Ding, J., 2015, In: Revista Colombiana de Matematicas. 49, 1, p. 57-76 20 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Citations (Scopus)
  • Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption

    Tao, C., Xiang, H., Petzoldt, A. & Ding, J., 30 Jun 2015, In: Finite Fields and their Applications. 35, p. 352-368 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    28 Citations (Scopus)
  • 2014

    A practical attack on patched mifare classic

    Chiu, Y. H., Hong, W. C., Chou, L. P., Ding, J., Yang, B. Y. & Cheng, C. M., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 150-164 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol

    Wang, Q. & Ding, J., Oct 2014, In: Cryptologia. 38, 4, p. 370-376 7 p.

    Research output: Contribution to journalArticlepeer-review

  • Inverting square systems algebraically is exponential

    Ding, J., Clough, C. & Araujo, R., 2014, In: Finite Fields and their Applications. 26, p. 32-48 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Citations (Scopus)
  • Provably secure group key management approach based upon hyper-sphere

    Tang, S., Xu, L., Liu, N., Huang, X., Ding, J. & Yang, Z., 1 Dec 2014, In: IEEE Transactions on Parallel and Distributed Systems. 25, 12, p. 3253-3263 11 p., 6714432.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    23 Citations (Scopus)
  • The cubic simple matrix encryption scheme

    Ding, J., Petzoldt, A. & Wang, L. C., 2014, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8772, p. 76-87 12 p.

    Research output: Contribution to journalArticlepeer-review

    32 Citations (Scopus)
  • 60 Citations (Scopus)
  • 2013

    A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    10 Citations (Scopus)
  • Degree of regularity for HFEv and HFEv-

    Ding, J. & Yang, B. Y., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 52-66 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    29 Citations (Scopus)
  • Embedded surface attack on multivariate public key cryptosystems from diophantine equations

    Ding, J., Ren, A. & Tao, C., 2013, Information Security and Cryptology - 8th International Conference, INSCRYPT 2012, Revised Selected Papers. p. 122-136 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7763 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Growth of the ideal generated by a quadratic multivariate function over GF(3)

    Ding, J., Hodges, T. J., Kruglov, V., Schmidt, D. & Tohneanu, S., Aug 2013, In: Journal of Algebra and its Applications. 12, 5, 1250219.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Simple matrix scheme for encryption

    Tao, C., Diene, A., Tang, S. & Ding, J., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 231-242 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    78 Citations (Scopus)
  • Solving degree and degree of regularity for polynomial systems over a finite fields

    Ding, J. & Schmidt, D., 2013, Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the Ocasion of His 60th Birthday. Fischlin, M. & Katzenbeisser, S. (eds.). p. 34-49 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8260 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    17 Citations (Scopus)
  • 2012

    An algebraic broadcast attack against NTRU

    Ding, J., Pan, Y. & Deng, Y., 2012, Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings. p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7372 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • 2011

    Algebraic solvers for certain lattice-related problems

    Ding, J., 2011, 2011 IEEE Information Theory Workshop, ITW 2011. p. 405-409 5 p. 6089489. (2011 IEEE Information Theory Workshop, ITW 2011).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • High-speed hardware implementation of rainbow signature on FPGAs

    Tang, S., Yi, H., Ding, J., Chen, H. & Chen, G., 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 228-243 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • Inverting HFE systems is quasi-polynomial for all fields

    Ding, J. & Hodges, T. J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 724-742 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    48 Citations (Scopus)
  • Kipnis-shamir attack on unbalanced oil-vinegar scheme

    Cao, W., Hu, L., Ding, J. & Yin, Z., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 168-180 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Linear algebra to compute Syzygies and Gröbner bases

    Cabarcas, D. & Ding, J., 2011, ISSAC 2011 - Proceedings of the 36th International Symposium on Symbolic and Algebraic Computation. p. 67-74 8 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Towards algebraic cryptanalysis of HFE challenge 2

    Mohamed, M. S. E., Ding, J. & Buchmann, J., 2011, In: International Journal of Multimedia and Ubiquitous Engineering. 6, 4, p. 67-76 10 p.

    Research output: Contribution to journalReview articlepeer-review

  • Towards algebraic cryptanalysis of HFE challenge 2

    Mohamed, M. S. E., Ding, J. & Buchmann, J., 2011, Information Security and Assurance - International Conference, ISA 2011, Proceedings. p. 123-131 9 p. (Communications in Computer and Information Science; vol. 200 CCIS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • 2010

    Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared

    Erickson, J., Ding, J. & Christensen, C., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Cryptanalysis of two quartic encryption schemes and one improved MFE scheme

    Cao, W., Nie, X., Hu, L., Tang, X. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 41-60 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Flexible partial enlargement to accelerate Gröbner basis computation over double-struck F2

    Buchmann, J., Cabarcas, D., Ding, J. & Mohamed, M. S. E., 2010, Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Proceedings. p. 69-81 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Growth of the ideal generated by a quadratic Boolean function

    Ding, J., Hodges, T. J. & Kruglov, V., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 13-27 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Mutant Zhuang-Zi algorithm

    Ding, J. & Schmidt, D. S., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 28-40 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals

    Mohamed, M. S. E., Cabarcas, D., Ding, J., Buchmann, J. & Bulygin, S., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    32 Citations (Scopus)
  • Practical algebraic cryptanalysis for dragon-based cryptosystems

    Buchmann, J., Bulygin, S., Ding, J., Mohamed, W. S. A. E. & Werner, F., 2010, Cryptology and Network Security - 9th International Conference, CANS 2010, Proceedings. p. 140-155 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6467 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • Secure variants of the square encryption scheme

    Clough, C. L. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 153-164 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    7 Citations (Scopus)
  • 2009

    Algebraic attack on the MQQ public key cryptosystem

    Mohamed, M. S. E., Ding, J., Buchmann, J. & Werner, F., 2009, Cryptology and Network Security - 8th International Conference, CANS 2009, Proceedings. p. 392-401 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5888 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    22 Citations (Scopus)
  • Constructing linear transformations of MPKC by generalized central symmetric matrices

    Xin, J., Lei, H. & Jintai, D., 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009. 5276944. (2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

    Buchmann, J., Ding, J., Mohamed, M. S. E. & Mohamed, W. S. A. E., 2009, In: Dagstuhl Seminar Proceedings. 9031

    Research output: Contribution to journalConference articlepeer-review

    7 Citations (Scopus)
  • Overview of cryptanalysis techniques in multivariate public key cryptography

    Billet, O. & Ding, J., 2009, Gröbner Bases, Coding, and Cryptography. Springer Berlin Heidelberg, p. 263-283 21 p.

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • Square, a new multivariate encryption scheme

    Clough, C., Baena, J., Ding, J., Yang, B. Y. & Chen, M. S., 2009, Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, Proceedings. p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5473).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    33 Citations (Scopus)
  • SSE implementation of multivariate PKCs on modern x86 CPUs

    Chen, A. I. T., Chen, M. S., Chen, T. R., Cheng, C. M., Ding, J., Kuo, E. L. H., Lee, F. Y. S. & Yang, B. Y., 2009, Cryptographic Hardware and Embedded Systems - CHES 2009 - 11th International Workshop, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5747 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    85 Citations (Scopus)
  • 2008

    Algebraic attack on HFE revisited

    Ding, J., Schmidt, D. & Werner, F., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 215-227 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    26 Citations (Scopus)
  • Breaking instance II of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Qin, Z., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 1332-1335 4 p. 4604288. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Breaking instance I of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Zhang, F., 2008, 2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008. p. 493-497 5 p. 4657821. (2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Could SFLASH be repaired?

    Ding, J., Dubois, V., Yang, B. Y., Chen, O. C. H. & Cheng, C. M., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 691-701 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    30 Citations (Scopus)
  • Cryptanalysis of rational multivariate public key cryptosystems

    Ding, J. & Wagner, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 124-136 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Fast multivariate signature generation in hardware: The case of rainbow

    Balasubramanian, S., Carter, H. W., Bogdanov, A., Rupp, A. & Ding, J., 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 25-30 6 p. 4580149. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    19 Citations (Scopus)
  • Fast multivariate signature generation in hardware: the case of rainbow

    Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J. & Carter, H. W., 2008, Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08. p. 281-282 2 p. 4724917. (Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Kipnis-Shamir attack on HFE revisited

    Jiang, X., Ding, J. & Hu, L., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 399-411 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    15 Citations (Scopus)
  • Multivariates polynomials for hashing

    Ding, J. & Yang, B. Y., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 358-371 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    14 Citations (Scopus)
  • MXL2: Solving polynomial equations over GF(2) Using an improved mutant strategy

    Mohamed, M. S. E., Mohamed, W. S. A. E., Ding, J. & Buchmann, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 203-215 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    37 Citations (Scopus)