Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2024

Research activity per year

Filter
Conference Proceeding

Search results

  • 2009

    SSE implementation of multivariate PKCs on modern x86 CPUs

    Chen, A. I. T., Chen, M. S., Chen, T. R., Cheng, C. M., Ding, J., Kuo, E. L. H., Lee, F. Y. S. & Yang, B. Y., 2009, Cryptographic Hardware and Embedded Systems - CHES 2009 - 11th International Workshop, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5747 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    85 Citations (Scopus)
  • 2008

    Algebraic attack on HFE revisited

    Ding, J., Schmidt, D. & Werner, F., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 215-227 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    26 Citations (Scopus)
  • Breaking instance II of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Qin, Z., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 1332-1335 4 p. 4604288. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Breaking instance I of new TTM cryptosystems

    Nie, X., Jiang, X., Hu, L., Ding, J. & Zhang, F., 2008, 2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008. p. 493-497 5 p. 4657821. (2008 International Conference on Communications, Circuits and Systems Proceedings, ICCCAS 2008).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Could SFLASH be repaired?

    Ding, J., Dubois, V., Yang, B. Y., Chen, O. C. H. & Cheng, C. M., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 691-701 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    30 Citations (Scopus)
  • Cryptanalysis of rational multivariate public key cryptosystems

    Ding, J. & Wagner, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 124-136 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Fast multivariate signature generation in hardware: the case of rainbow

    Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J. & Carter, H. W., 2008, Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08. p. 281-282 2 p. 4724917. (Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM'08).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    15 Citations (Scopus)
  • Fast multivariate signature generation in hardware: The case of rainbow

    Balasubramanian, S., Carter, H. W., Bogdanov, A., Rupp, A. & Ding, J., 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 25-30 6 p. 4580149. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    20 Citations (Scopus)
  • Kipnis-Shamir attack on HFE revisited

    Jiang, X., Ding, J. & Hu, L., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 399-411 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    14 Citations (Scopus)
  • Multivariates polynomials for hashing

    Ding, J. & Yang, B. Y., 2008, Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. p. 358-371 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4990 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    14 Citations (Scopus)
  • MXL2: Solving polynomial equations over GF(2) Using an improved mutant strategy

    Mohamed, M. S. E., Mohamed, W. S. A. E., Ding, J. & Buchmann, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 203-215 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    37 Citations (Scopus)
  • New differential-algebraic attacks and reparametrization of rainbow

    Ding, J., Yang, B. Y., Chen, C. H. O., Chen, M. S. & Cheng, C. M., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 242-257 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    87 Citations (Scopus)
  • Square-vinegar signature scheme

    Baena, J., Clough, C. & Ding, J., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 17-30 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    14 Citations (Scopus)
  • 2007

    Analysis of the SMS4 block cipher

    Fen, L., Wen, J., Lei, H., Jintai, D., Shuwang, L., Pyshkin, A. & Weinmann, R. P., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 158-170 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    38 Citations (Scopus)
  • Cryptanalysis of the TRMC-4 public key cryptosystem

    Nie, X., Hu, L., Ding, J., Li, J. & Wagner, J., 2007, Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings. Springer Verlag, p. 104-115 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4521 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • High Order Linearization Equation (HOLE) attack on multivariate public key cryptosystems

    Ding, J., Hu, L., Nie, X., Li, J. & Wagner, J., 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 233-248 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    44 Citations (Scopus)
  • ℓ-Invertible cycles for Multivariate Quadratic (MQ) public key cryptography

    Ding, J., Wolf, C. & Yang, B. Y., 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 266-281 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    51 Citations (Scopus)
  • 2006

    Breaking a new instance of TTM cryptosystems

    Nie, X., Hu, L., Li, J., Updegrove, C. & Ding, J., 2006, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings. Springer Verlag, p. 210-225 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3989 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    14 Citations (Scopus)
  • Dimension of the linearization equations of the Matsumoto-Imai cryptosystems

    Diene, A., Ding, J., Gower, J. E., Hodges, T. J. & Yin, Z., 2006, Coding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers. Springer Verlag, p. 242-251 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3969 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    6 Citations (Scopus)
  • Inoculating multivariate schemes against differential attacks

    Ding, J. & Gower, J. E., 2006, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3958 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    36 Citations (Scopus)
  • 2005

    Complexity estimates for the F4 attack on the perturbed matsumoto-imai cryptosystem

    Ding, J., Gower, J. E., Schmidt, D., Wolf, C. & Yin, Z., 2005, Cryptography and Coding - 10th IMA International Conference, Proceedings. Springer Verlag, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    12 Citations (Scopus)
  • Cryptanalysis of PASS II and miniPass

    Goi, B. M., Ding, J. & Siddiqi, M. U., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 159-168 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access