Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2025

Research activity per year

Search results

  • New candidates for multivariate trapdoor functions

    Porras, J., Baena, J. B. & Ding, J., 2015, In: Revista Colombiana de Matematicas. 49, 1, p. 57-76 20 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Citations (Scopus)
  • MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals

    Mohamed, M. S. E., Cabarcas, D., Ding, J., Buchmann, J. & Bulygin, S., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    32 Citations (Scopus)
  • MXL2: Solving polynomial equations over GF(2) Using an improved mutant strategy

    Mohamed, M. S. E., Mohamed, W. S. A. E., Ding, J. & Buchmann, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 203-215 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    37 Citations (Scopus)
  • Mutant Zhuang-Zi algorithm

    Ding, J. & Schmidt, D. S., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 28-40 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

    Buchmann, J., Ding, J., Mohamed, M. S. E. & Mohamed, W. S. A. E., 2009, In: Dagstuhl Seminar Proceedings. 9031

    Research output: Contribution to journalConference articlepeer-review

    7 Citations (Scopus)
  • Multivariates polynomials for hashing

    Ding, J. & Yang, B. Y., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 358-371 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Multivariate public key cryptosys

    Ding, J., Gower, J. E. & Schmidt, D. S., 2006, Multivariate Public Key Cryptosystems. Ding, J., Gower, J. & Schmidt, D. (eds.). p. 1-258 258 p. (Advances in Information Security; vol. 25).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    60 Citations (Scopus)
  • Multivariate cryptography

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 7-23 17 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Mqdss

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 153-168 16 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • Linear algebra to compute Syzygies and Gröbner bases

    Cabarcas, D. & Ding, J., 2011, ISSAC 2011 - Proceedings of the 36th International Symposium on Symbolic and Algebraic Computation. p. 67-74 8 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems

    Ding, J., Gheorghiu, V., Gilyén, A., Hallgren, S. & Li, J., 2023, In: Quantum. 7

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Citations (Scopus)
  • Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange

    Qin, Y., Ding, R., Cheng, C., Bindel, N., Pan, Y. & Ding, J., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 677-697 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • Letters for post-quantum cryptography standard evaluation

    Wang, L. C., Ding, J. & Mesnager, S., Feb 2020, In: Advances in Mathematics of Communications. 14, 1, p. i

    Research output: Contribution to journalLetterpeer-review

    Open Access
  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Abe, M., Aoki, K., Ateniese, G., Avanzi, R., Beerliová, Z., Billet, O., Biryukov, A., Blake, I., Boyd, C., Brier, E., Castiglione, A., Cha, J., Chan, A., Chen, L., Cho, K., Contini, S., D'Arco, P., Ding, J., Doche, C., Dunkelman, O., & 70 othersFitzi, M., Fouque, P. A., Fournier, J. J. A., Fujisaki, K., Fujisaki, E., Furukawa, J., Galindo, D., Halevi, S., Handschuh, H., Heneghan, C., Holenstein, T., Hoshino, F., Hwang, Y. H., Isshiki, T., Jochemsz, E., Joux, A., Juels, A., Jutla, C., Kiayias, A., Kikuchi, H., Kobayashi, T., Kohno, T., Krawczyk, H., Kumar, S., Lange, T., Lee, J. W., Masucci, B., May, A., Mihaljevic, M., Minematsu, K., Monrose, F., Montague, P., Myers, S., Naccache, D., Nicolosi, A., Obana, S., Okazaki, S., Okeya, K., Olivier, F., Oyono, R., Page, D., Park, J. H., Peng, K., Pietrzak, K., Raub, D., Sakai, Y., Sakurai, K., Schindler, W., Seo, J. W., Shin, J. H., Shparlinski, I., Steinfeld, R., Szydlo, M., Kalai, Y. T., Teranishi, I., Tokita, T., Tunstall, M., Vercauteren, F., Villegas, K., Walfish, S., Wang, H., Wang, X., Warinschi, B., De Weger, B., Wolf, C., Yampolskiy, A., Yang, Y. H., Yin, Y. L., Yoon, J. & Pointcheval, D., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960 LNCS, p. V-VI

    Research output: Contribution to journalEditorial

    1 Citation (Scopus)
  • Leakage of signal function with reused keys in RLWE key exchange

    Ding, J., Alsayigh, S., Saraswathy, R. V., Fluhrer, S. & Lin, X., 28 Jul 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7996806. (IEEE International Conference on Communications).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    51 Citations (Scopus)
  • Kipnis-shamir attack on unbalanced oil-vinegar scheme

    Cao, W., Hu, L., Ding, J. & Yin, Z., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 168-180 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Kipnis-Shamir attack on HFE revisited

    Jiang, X., Ding, J. & Hu, L., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 399-411 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    15 Citations (Scopus)
  • Isomorphism of two realizations of quantum affine algebra {Mathematical expression}

    Ding, J. & Frenkel, I. B., Sept 1993, In: Communications in Mathematical Physics. 156, 2, p. 277-300 24 p.

    Research output: Contribution to journalArticlepeer-review

    179 Citations (Scopus)
  • Inverting square systems algebraically is exponential

    Ding, J., Clough, C. & Araujo, R., 2014, In: Finite Fields and their Applications. 26, p. 32-48 17 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Citations (Scopus)
  • Inverting HFE systems is quasi-polynomial for all fields

    Ding, J. & Hodges, T. J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 724-742 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    48 Citations (Scopus)
  • Introduction

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, In: Advances in Information Security. 80, p. 1-5 5 p.

    Research output: Contribution to journalEditorial

  • Integral presentations for the Universal R-Matrix

    Ding, J., Khoroshkin, S. & Pakuliak, S., 2 Jul 2000, In: Letters in Mathematical Physics. 53, 2, p. 121-141 21 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
  • Inoculating multivariate schemes against differential attacks

    Ding, J. & Gower, J. E., 2006, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3958 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    36 Citations (Scopus)
  • Improved cryptanalysis of HFEv- via projection

    Ding, J., Perlner, R., Petzoldt, A. & Smith-Tone, D., 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Springer Verlag, p. 375-395 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

    Chen, J., Ling, J., Ning, J. & Ding, J., 1 Jun 2019, In: Gerontologist. 59, 3, p. 1132-1147 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Hopf algebra extension of a Zamolochikov algebra and its double

    Ding, J., Aug 1999, In: Journal of Mathematical Physics. 40, 8, p. 4157-4164 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Homomorphic encryption standard

    Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser, S., Gorbunov, S., Halevi, S., Hoffstein, J., Laine, K., Lauter, K., Lokam, S., Micciancio, D., Moody, D., Morrison, T., Sahai, A. & Vaikuntanathan, V., 4 Jan 2022, Protecting Privacy through Homomorphic Encryption. Springer International Publishing, p. 31-62 32 p.

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    85 Citations (Scopus)
  • Hmfev - an efficient multivariate signature scheme

    Petzoldt, A., Chen, M. S., Ding, J. & Yang, B. Y., 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Takagi, T., Lange, T. & Takagi, T. (eds.). Springer Verlag, p. 205-223 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    15 Citations (Scopus)
  • High-speed hardware implementation of rainbow signature on FPGAs

    Tang, S., Yi, H., Ding, J., Chen, H. & Chen, G., 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 228-243 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • High Order Linearization Equation (HOLE) attack on multivariate public key cryptosystems

    Ding, J., Hu, L., Nie, X., Li, J. & Wagner, J., 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 233-248 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    46 Citations (Scopus)
  • Hidden field equations

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, Advances in Information Security. Springer, p. 61-88 28 p. (Advances in Information Security; vol. 80).

    Research output: Chapter in Book or Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • Growth of the ideal generated by a quadratic multivariate function over GF(3)

    Ding, J., Hodges, T. J., Kruglov, V., Schmidt, D. & Tohneanu, S., Aug 2013, In: Journal of Algebra and its Applications. 12, 5, 1250219.

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)
  • Growth of the ideal generated by a quadratic Boolean function

    Ding, J., Hodges, T. J. & Kruglov, V., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 13-27 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Giophantus distinguishing attack is a low dimensional learning with errors problem

    Ding, J., Deaton, J. & Schmidt, K., Feb 2020, In: Advances in Mathematics of Communications. 14, 1, p. 171-175 5 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Generalization of Drinfeld Quantum Affine Algebras

    Ding, J. & Iohara, K., 2 Jul 1997, In: Letters in Mathematical Physics. 41, 2, p. 181-193 13 p.

    Research output: Contribution to journalArticlepeer-review

    152 Citations (Scopus)
  • Flexible partial enlargement to accelerate Gröbner basis computation over double-struck F2

    Buchmann, J., Cabarcas, D., Ding, J. & Mohamed, M. S. E., 2010, Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Proceedings. p. 69-81 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Fast multivariate signature generation in hardware: the case of rainbow

    Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J. & Carter, H. W., 2008, Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08. p. 281-282 2 p. 4724917. (Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Fast multivariate signature generation in hardware: The case of rainbow

    Balasubramanian, S., Carter, H. W., Bogdanov, A., Rupp, A. & Ding, J., 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 25-30 6 p. 4580149. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    19 Citations (Scopus)
  • Fast discretized Gaussian sampling and post-quantum TLS ciphersuite

    Gao, X., Li, L., Ding, J., Liu, J., Saraswathy, R. V. & Liu, Z., 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 551-565 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • Factorization of the universal R-matrix for Uq(sl2)1

    Ding, J., Pakuliak, S. & Khoroshkin, S., Aug 2000, In: Theoretical and Mathematical Physics. 124, 2, p. 1007-1037 31 p.

    Research output: Contribution to journalArticlepeer-review

    12 Citations (Scopus)
  • Extension Field Cancellation: A new central trapdoor for multivariate quadratic systems

    Szepieniec, A., Ding, J. & Preneel, B., 2016, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Proceedings. Takagi, T. (ed.). Springer Verlag, p. 182-196 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9606).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    26 Citations (Scopus)
  • Embedded surface attack on multivariate public key cryptosystems from diophantine equations

    Ding, J., Ren, A. & Tao, C., 2013, Information Security and Cryptology - 8th International Conference, INSCRYPT 2012, Revised Selected Papers. p. 122-136 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7763 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Efficient Key Recovery for All HFE Signature Variants

    Tao, C., Petzoldt, A. & Ding, J., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 70-93 24 p. (Lecture Notes in Computer Science; vol. 12825 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    24 Citations (Scopus)
  • Drinfeld comultiplication and vertex operators

    Ding, J. & Iohara, K., Aug 1997, In: Journal of Geometry and Physics. 23, 1, p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    9 Citations (Scopus)
  • Dimension of the linearization equations of the Matsumoto-Imai cryptosystems

    Diene, A., Ding, J., Gower, J. E., Hodges, T. J. & Yin, Z., 2006, Coding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers. Springer Verlag, p. 242-251 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3969 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    6 Citations (Scopus)
  • Design principles for HFEV-based multivariate signature schemes

    Petzoldt, A., Chen, M. S., Yang, B. Y., Tao, C. & Ding, J., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 311-334 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    92 Citations (Scopus)
  • Degree of regularity for HFEv and HFEv-

    Ding, J. & Yang, B. Y., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 52-66 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    29 Citations (Scopus)
  • Current State of Multivariate Cryptography

    Ding, J. & Petzoldt, A., 2017, In: IEEE Security and Privacy. 15, 4, p. 28-36 9 p., 8012305.

    Research output: Contribution to journalReview articlepeer-review

    95 Citations (Scopus)
  • Crystal Algebra

    Ding, J., 1996, In: Letters in Mathematical Physics. 38, 2, p. 177-183 7 p.

    Research output: Contribution to journalArticlepeer-review

  • Cryptanalysis of two quartic encryption schemes and one improved MFE scheme

    Cao, W., Nie, X., Hu, L., Tang, X. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 41-60 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)