Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2024

Research activity per year

Filter
Conference Proceeding

Search results

  • 2024

    An Improved Practical Key Mismatch Attack Against NTRU

    Liu, Z., Vishakha, Ding, J., Cheng, C. & Pan, Y., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 322-342 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14771 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Cryptanalysis of the SNOVA Signature Scheme

    Li, P. & Ding, J., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 79-91 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14772 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Practical and Theoretical Cryptanalysis of VOX

    Guo, H., Jin, Y., Pan, Y., He, X., Gong, B. & Ding, J., 2024, Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings. Saarinen, M-J., Smith-Tone, D. & Smith-Tone, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 186-208 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14772 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • 2023

    Algebraic Relation of Three MinRank Algebraic Modelings

    Guo, H. & Ding, J., 2023, Arithmetic of Finite Fields - 9th International Workshop, WAIFI 2022, Revised Selected Papers. Mesnager, S., Mesnager, S. & Zhou, Z. (eds.). Springer Science and Business Media Deutschland GmbH, p. 239-249 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13638 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Practical Improvements on BKZ Algorithm

    Zhao, Z. & Ding, J., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 273-284 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • 2022

    Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange

    Qin, Y., Ding, R., Cheng, C., Bindel, N., Pan, Y. & Ding, J., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 677-697 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • 2021

    A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs

    Qin, Y., Cheng, C., Zhang, X., Pan, Y., Hu, L. & Ding, J., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 92-121 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13093 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    24 Citations (Scopus)
  • Efficient Key Recovery for All HFE Signature Variants

    Tao, C., Petzoldt, A. & Ding, J., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 70-93 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    22 Citations (Scopus)
  • The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes

    Ding, J., Deaton, J., Vishakha & Yang, B. Y., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 329-347 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12696 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • 2020

    A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3

    Ding, J., Zhang, Z., Deaton, J. & Wang, L. C., 2020, Information and Communications Security - 22nd International Conference, ICICS 2020, Proceedings. Meng, W., Gollmann, D., Jensen, C. D. & Zhou, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 422-440 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12282 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • Cryptanalysis of the lifted unbalanced oil vinegar signature scheme

    Ding, J., Deaton, J., Schmidt, K., Vishakha & Zhang, Z., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 279-298 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • 2019

    A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope

    Qin, Y., Cheng, C. & Ding, J., 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 504-520 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11736 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    18 Citations (Scopus)
  • A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange

    Branco, P., Ding, J., Goulão, M. & Mateus, P., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 78-101 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • A key exchange based on the short integer solution problem and the learning with errors problem

    Ding, J., Schmitt, K. & Zhang, Z., 2019, Codes, Cryptology and Information Security - 3rd International Conference, C2SI 2019, Proceeding. Carlet, C., Souidi, E. M., Guilley, S. & Nitaj, A. (eds.). Springer Verlag, p. 105-117 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11445 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    7 Citations (Scopus)
  • A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations

    Ding, J., 2019, Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S and P, AIBlock, and AIoTS 2019. Zhou, J., Deng, R., Li, Z., Majumdar, S., Meng, W., Wang, L. & Zhang, K. (eds.). Springer Verlag, p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11605 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • One sample ring-LWE with rounding and its application to key exchange

    Ding, J., Gao, X., Takagi, T. & Wang, Y., 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Yung, M., Ochoa, M. & Deng, R. H. (eds.). Springer Verlag, p. 323-343 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • 2018

    Complete attack on RLWE key exchange with reused keys, without signal leakage

    Ding, J., Fluhrer, S. & Rv, S., 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 467-486 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    46 Citations (Scopus)
  • Improved cryptanalysis of HFEv- via projection

    Ding, J., Perlner, R., Petzoldt, A. & Smith-Tone, D., 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Springer Verlag, p. 375-395 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Post-Quantum Secure Remote Password Protocol from RLWE Problem

    Gao, X., Ding, J., Liu, J. & Li, L., 2018, Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Revised Selected Papers. Chen, X., Yung, M. & Lin, D. (eds.). Springer Verlag, p. 99-116 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10726 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    11 Citations (Scopus)
  • 2017

    Fast discretized Gaussian sampling and post-quantum TLS ciphersuite

    Gao, X., Li, L., Ding, J., Liu, J., Saraswathy, R. V. & Liu, Z., 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 551-565 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • Hmfev - an efficient multivariate signature scheme

    Petzoldt, A., Chen, M. S., Ding, J. & Yang, B. Y., 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Takagi, T., Lange, T. & Takagi, T. (eds.). Springer Verlag, p. 205-223 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    14 Citations (Scopus)
  • Leakage of signal function with reused keys in RLWE key exchange

    Ding, J., Alsayigh, S., Saraswathy, R. V., Fluhrer, S. & Lin, X., 28 Jul 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7996806. (IEEE International Conference on Communications).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    47 Citations (Scopus)
  • The beauty and the beasts—The hard cases in LLL reduction

    Alsayigh, S., Ding, J., Takagi, T. & Wang, Y., 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 19-35 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • 2016

    Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

    Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Yoshioka, K. & Ogawa, K. (eds.). Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9836 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    1 Citation (Scopus)
  • Extension Field Cancellation: A new central trapdoor for multivariate quadratic systems

    Szepieniec, A., Ding, J. & Preneel, B., 2016, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Proceedings. Takagi, T. (ed.). Springer Verlag, p. 182-196 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9606).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • 2015

    Authenticated key exchange from ideal lattices

    Zhang, J., Zhang, Z., Ding, J., Snook, M. & Dagdelen, Ö., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 719-751 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    135 Citations (Scopus)
  • Design principles for HFEV-based multivariate signature schemes

    Petzoldt, A., Chen, M. S., Yang, B. Y., Tao, C. & Ding, J., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 311-334 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    Open Access
    88 Citations (Scopus)
  • 2014

    A practical attack on patched mifare classic

    Chiu, Y. H., Hong, W. C., Chou, L. P., Ding, J., Yang, B. Y. & Cheng, C. M., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 150-164 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • 2013

    A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    10 Citations (Scopus)
  • Degree of regularity for HFEv and HFEv-

    Ding, J. & Yang, B. Y., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 52-66 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    29 Citations (Scopus)
  • Embedded surface attack on multivariate public key cryptosystems from diophantine equations

    Ding, J., Ren, A. & Tao, C., 2013, Information Security and Cryptology - 8th International Conference, INSCRYPT 2012, Revised Selected Papers. p. 122-136 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7763 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Simple matrix scheme for encryption

    Tao, C., Diene, A., Tang, S. & Ding, J., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 231-242 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    78 Citations (Scopus)
  • 2012

    An algebraic broadcast attack against NTRU

    Ding, J., Pan, Y. & Deng, Y., 2012, Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings. p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7372 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • 2011

    Algebraic solvers for certain lattice-related problems

    Ding, J., 2011, 2011 IEEE Information Theory Workshop, ITW 2011. p. 405-409 5 p. 6089489. (2011 IEEE Information Theory Workshop, ITW 2011).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • High-speed hardware implementation of rainbow signature on FPGAs

    Tang, S., Yi, H., Ding, J., Chen, H. & Chen, G., 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 228-243 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    25 Citations (Scopus)
  • Inverting HFE systems is quasi-polynomial for all fields

    Ding, J. & Hodges, T. J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 724-742 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    48 Citations (Scopus)
  • Kipnis-shamir attack on unbalanced oil-vinegar scheme

    Cao, W., Hu, L., Ding, J. & Yin, Z., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 168-180 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    9 Citations (Scopus)
  • Linear algebra to compute Syzygies and Gröbner bases

    Cabarcas, D. & Ding, J., 2011, ISSAC 2011 - Proceedings of the 36th International Symposium on Symbolic and Algebraic Computation. p. 67-74 8 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Towards algebraic cryptanalysis of HFE challenge 2

    Mohamed, M. S. E., Ding, J. & Buchmann, J., 2011, Information Security and Assurance - International Conference, ISA 2011, Proceedings. p. 123-131 9 p. (Communications in Computer and Information Science; vol. 200 CCIS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    4 Citations (Scopus)
  • 2010

    Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared

    Erickson, J., Ding, J. & Christensen, C., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 73-86 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    16 Citations (Scopus)
  • Cryptanalysis of two quartic encryption schemes and one improved MFE scheme

    Cao, W., Nie, X., Hu, L., Tang, X. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 41-60 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Flexible partial enlargement to accelerate Gröbner basis computation over double-struck F2

    Buchmann, J., Cabarcas, D., Ding, J. & Mohamed, M. S. E., 2010, Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Proceedings. p. 69-81 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    8 Citations (Scopus)
  • Growth of the ideal generated by a quadratic Boolean function

    Ding, J., Hodges, T. J. & Kruglov, V., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 13-27 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    5 Citations (Scopus)
  • Mutant Zhuang-Zi algorithm

    Ding, J. & Schmidt, D. S., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 28-40 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals

    Mohamed, M. S. E., Cabarcas, D., Ding, J., Buchmann, J. & Bulygin, S., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    32 Citations (Scopus)
  • Practical algebraic cryptanalysis for dragon-based cryptosystems

    Buchmann, J., Bulygin, S., Ding, J., Mohamed, W. S. A. E. & Werner, F., 2010, Cryptology and Network Security - 9th International Conference, CANS 2010, Proceedings. p. 140-155 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6467 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    2 Citations (Scopus)
  • Secure variants of the square encryption scheme

    Clough, C. L. & Ding, J., 2010, Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Proceedings. p. 153-164 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6061 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    7 Citations (Scopus)
  • 2009

    Algebraic attack on the MQQ public key cryptosystem

    Mohamed, M. S. E., Ding, J., Buchmann, J. & Werner, F., 2009, Cryptology and Network Security - 8th International Conference, CANS 2009, Proceedings. p. 392-401 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5888 LNCS).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    22 Citations (Scopus)
  • Constructing linear transformations of MPKC by generalized central symmetric matrices

    Xin, J., Lei, H. & Jintai, D., 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009. 5276944. (2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

  • Square, a new multivariate encryption scheme

    Clough, C., Baena, J., Ding, J., Yang, B. Y. & Chen, M. S., 2009, Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, Proceedings. p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5473).

    Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

    33 Citations (Scopus)