Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2024

Research activity per year

Search results

  • Review article

    Current State of Multivariate Cryptography

    Ding, J. & Petzoldt, A., 2017, In: IEEE Security and Privacy. 15, 4, p. 28-36 9 p., 8012305.

    Research output: Contribution to journalReview articlepeer-review

    89 Citations (Scopus)
  • Towards algebraic cryptanalysis of HFE challenge 2

    Mohamed, M. S. E., Ding, J. & Buchmann, J., 2011, In: International Journal of Multimedia and Ubiquitous Engineering. 6, 4, p. 67-76 10 p.

    Research output: Contribution to journalReview articlepeer-review

  • 后量子密码迁移趋势下应用于区块链的公钥密码安全

    Translated title of the contribution: Security of Public Key Cryptography in Blockchain under the Trend on Post-quantum Cryptography MigrationHu, X., Xiang, H., Ding, J. T., Liang, B., Xia, L. N. & Xiang, T., 21 Apr 2023, In: Journal of Cryptologic Research. 10, 2, p. 219-245 27 p.

    Research output: Contribution to journalReview articlepeer-review

  • Letter

    Letters for post-quantum cryptography standard evaluation

    Wang, L. C., Ding, J. & Mesnager, S., Feb 2020, In: Advances in Mathematics of Communications. 14, 1, p. i

    Research output: Contribution to journalLetterpeer-review

    Open Access
  • Editorial

    Introduction

    Ding, J., Petzoldt, A. & Schmidt, D. S., 2020, In: Advances in Information Security. 80, p. 1-5 5 p.

    Research output: Contribution to journalEditorial

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Abe, M., Aoki, K., Ateniese, G., Avanzi, R., Beerliová, Z., Billet, O., Biryukov, A., Blake, I., Boyd, C., Brier, E., Castiglione, A., Cha, J., Chan, A., Chen, L., Cho, K., Contini, S., D'Arco, P., Ding, J., Doche, C., Dunkelman, O., & 70 othersFitzi, M., Fouque, P. A., Fournier, J. J. A., Fujisaki, K., Fujisaki, E., Furukawa, J., Galindo, D., Halevi, S., Handschuh, H., Heneghan, C., Holenstein, T., Hoshino, F., Hwang, Y. H., Isshiki, T., Jochemsz, E., Joux, A., Juels, A., Jutla, C., Kiayias, A., Kikuchi, H., Kobayashi, T., Kohno, T., Krawczyk, H., Kumar, S., Lange, T., Lee, J. W., Masucci, B., May, A., Mihaljevic, M., Minematsu, K., Monrose, F., Montague, P., Myers, S., Naccache, D., Nicolosi, A., Obana, S., Okazaki, S., Okeya, K., Olivier, F., Oyono, R., Page, D., Park, J. H., Peng, K., Pietrzak, K., Raub, D., Sakai, Y., Sakurai, K., Schindler, W., Seo, J. W., Shin, J. H., Shparlinski, I., Steinfeld, R., Szydlo, M., Kalai, Y. T., Teranishi, I., Tokita, T., Tunstall, M., Vercauteren, F., Villegas, K., Walfish, S., Wang, H., Wang, X., Warinschi, B., De Weger, B., Wolf, C., Yampolskiy, A., Yang, Y. H., Yin, Y. L., Yoon, J. & Pointcheval, D., 2006, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960 LNCS, p. V-VI

    Research output: Contribution to journalEditorial

    1 Citation (Scopus)
  • Preface

    Ding, J. & Tillich, J. P., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12100 LNCS, p. v

    Research output: Contribution to journalEditorial

  • Preface

    Ding, J. & Steinwandt, R., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11505 LNCS, p. v

    Research output: Contribution to journalEditorial

  • Conference Proceeding

    A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope

    Qin, Y., Cheng, C. & Ding, J., 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 504-520 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11736 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    19 Citations (Scopus)
  • A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3

    Ding, J., Zhang, Z., Deaton, J. & Wang, L. C., 2020, Information and Communications Security - 22nd International Conference, ICICS 2020, Proceedings. Meng, W., Gollmann, D., Jensen, C. D. & Zhou, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 422-440 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12282 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange

    Branco, P., Ding, J., Goulão, M. & Mateus, P., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 78-101 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • A key exchange based on the short integer solution problem and the learning with errors problem

    Ding, J., Schmitt, K. & Zhang, Z., 2019, Codes, Cryptology and Information Security - 3rd International Conference, C2SI 2019, Proceeding. Carlet, C., Souidi, E. M., Guilley, S. & Nitaj, A. (eds.). Springer Verlag, p. 105-117 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11445 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Algebraic attack on HFE revisited

    Ding, J., Schmidt, D. & Werner, F., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 215-227 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    26 Citations (Scopus)
  • Algebraic attack on the MQQ public key cryptosystem

    Mohamed, M. S. E., Ding, J., Buchmann, J. & Werner, F., 2009, Cryptology and Network Security - 8th International Conference, CANS 2009, Proceedings. p. 392-401 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5888 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    22 Citations (Scopus)
  • Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared

    Erickson, J., Ding, J. & Christensen, C., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Algebraic Relation of Three MinRank Algebraic Modelings

    Guo, H. & Ding, J., 2023, Arithmetic of Finite Fields - 9th International Workshop, WAIFI 2022, Revised Selected Papers. Mesnager, S., Mesnager, S. & Zhou, Z. (eds.). Springer Science and Business Media Deutschland GmbH, p. 239-249 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13638 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Algebraic solvers for certain lattice-related problems

    Ding, J., 2011, 2011 IEEE Information Theory Workshop, ITW 2011. p. 405-409 5 p. 6089489. (2011 IEEE Information Theory Workshop, ITW 2011).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • An algebraic broadcast attack against NTRU

    Ding, J., Pan, Y. & Deng, Y., 2012, Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings. p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7372 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Analysis of the SMS4 block cipher

    Fen, L., Wen, J., Lei, H., Jintai, D., Shuwang, L., Pyshkin, A. & Weinmann, R. P., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 158-170 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    38 Citations (Scopus)
  • A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations

    Ding, J., 2019, Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S and P, AIBlock, and AIoTS 2019. Zhou, J., Deng, R., Li, Z., Majumdar, S., Meng, W., Wang, L. & Zhang, K. (eds.). Springer Verlag, p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11605 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • An Improved Practical Key Mismatch Attack Against NTRU

    Liu, Z., Vishakha, Ding, J., Cheng, C. & Pan, Y., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 322-342 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14771 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • A practical attack on patched mifare classic

    Chiu, Y. H., Hong, W. C., Chou, L. P., Ding, J., Yang, B. Y. & Cheng, C. M., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 150-164 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs

    Qin, Y., Cheng, C., Zhang, X., Pan, Y., Hu, L. & Ding, J., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 92-121 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13093 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    28 Citations (Scopus)
  • Authenticated key exchange from ideal lattices

    Zhang, J., Zhang, Z., Ding, J., Snook, M. & Dagdelen, Ö., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 719-751 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    142 Citations (Scopus)
  • A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    10 Citations (Scopus)
  • Breaking a new instance of TTM cryptosystems

    Nie, X., Hu, L., Li, J., Updegrove, C. & Ding, J., 2006, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 210-225 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    14 Citations (Scopus)
  • Breaking instance II of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Qin, Z., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 1332-1335 4 p. 4604288. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Breaking instance I of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Zhang, F., 2008, 2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008. p. 493-497 5 p. 4657821. (2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Complete attack on RLWE key exchange with reused keys, without signal leakage

    Ding, J., Fluhrer, S. & Rv, S., 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 467-486 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    49 Citations (Scopus)
  • Complexity estimates for the F4 attack on the perturbed matsumoto-imai cryptosystem

    Ding, J., Gower, J. E., Schmidt, D., Wolf, C. & Yin, Z., 2005, Cryptography and Coding - 10th IMA International Conference, Proceedings. Springer Verlag, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    12 Citations (Scopus)
  • Constructing linear transformations of MPKC by generalized central symmetric matrices

    Xin, J., Lei, H. & Jintai, D., 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009. 5276944. (2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Could SFLASH be repaired?

    Ding, J., Dubois, V., Yang, B. Y., Chen, O. C. H. & Cheng, C. M., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 691-701 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    30 Citations (Scopus)
  • Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

    Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Yoshioka, K. & Ogawa, K. (eds.). Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9836 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Cryptanalysis of PASS II and miniPass

    Goi, B. M., Ding, J. & Siddiqi, M. U., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 159-168 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Cryptanalysis of rational multivariate public key cryptosystems

    Ding, J. & Wagner, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 124-136 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Cryptanalysis of the lifted unbalanced oil vinegar signature scheme

    Ding, J., Deaton, J., Schmidt, K., Vishakha & Zhang, Z., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 279-298 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Cryptanalysis of the SNOVA Signature Scheme

    Li, P. & Ding, J., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 79-91 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14772 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Cryptanalysis of the TRMC-4 public key cryptosystem

    Nie, X., Hu, L., Ding, J., Li, J. & Wagner, J., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 104-115 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Cryptanalysis of two quartic encryption schemes and one improved MFE scheme

    Cao, W., Nie, X., Hu, L., Tang, X. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 41-60 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Degree of regularity for HFEv and HFEv-

    Ding, J. & Yang, B. Y., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 52-66 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    29 Citations (Scopus)
  • Design principles for HFEV-based multivariate signature schemes

    Petzoldt, A., Chen, M. S., Yang, B. Y., Tao, C. & Ding, J., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 311-334 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    89 Citations (Scopus)
  • Dimension of the linearization equations of the Matsumoto-Imai cryptosystems

    Diene, A., Ding, J., Gower, J. E., Hodges, T. J. & Yin, Z., 2006, Coding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers. Springer Verlag, p. 242-251 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3969 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    6 Citations (Scopus)
  • Efficient Key Recovery for All HFE Signature Variants

    Tao, C., Petzoldt, A. & Ding, J., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 70-93 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    22 Citations (Scopus)
  • Embedded surface attack on multivariate public key cryptosystems from diophantine equations

    Ding, J., Ren, A. & Tao, C., 2013, Information Security and Cryptology - 8th International Conference, INSCRYPT 2012, Revised Selected Papers. p. 122-136 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7763 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Extension Field Cancellation: A new central trapdoor for multivariate quadratic systems

    Szepieniec, A., Ding, J. & Preneel, B., 2016, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Proceedings. Takagi, T. (ed.). Springer Verlag, p. 182-196 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9606).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • Fast discretized Gaussian sampling and post-quantum TLS ciphersuite

    Gao, X., Li, L., Ding, J., Liu, J., Saraswathy, R. V. & Liu, Z., 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 551-565 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • Fast multivariate signature generation in hardware: the case of rainbow

    Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J. & Carter, H. W., 2008, Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08. p. 281-282 2 p. 4724917. (Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Fast multivariate signature generation in hardware: The case of rainbow

    Balasubramanian, S., Carter, H. W., Bogdanov, A., Rupp, A. & Ding, J., 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 25-30 6 p. 4580149. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    19 Citations (Scopus)
  • Flexible partial enlargement to accelerate Gröbner basis computation over double-struck F2

    Buchmann, J., Cabarcas, D., Ding, J. & Mohamed, M. S. E., 2010, Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Proceedings. p. 69-81 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Growth of the ideal generated by a quadratic Boolean function

    Ding, J., Hodges, T. J. & Kruglov, V., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 13-27 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)