Search results for: Jintai Ding
Japan Journal of Industrial and Applied Mathematics > 2018 > 35 > 3 > 1123-1152
IEEE Security & Privacy > 2017 > 15 > 4 > 28 - 36
Progress in Computer Science and Applied Logic > Coding, Cryptography and Combinatorics > Contributed Papers > 113-127
Lecture Notes in Computer Science > Information Security Practice and Experience > Post-quantum Cryptography and Side-Channel Attack > 168-180
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Cryptosystems Design and Analysis > 290-301
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptanalysis > 104-115
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Alternative Encryption > 252-264
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2005 > Multivariate Asymmetric Cryptography > 288-301
Lecture Notes in Computer Science > Post-Quantum Cryptography > Cryptanalysis of Multivariate Systems > 28-40
Lecture Notes in Computer Science > Post-Quantum Cryptography > Cryptanalysis of Multivariate Systems > 13-27
Lecture Notes in Computer Science > Post-Quantum Cryptography > Design of Encryption Schemes > 153-164
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 595-602
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Algebraic Cryptanalysis and Stream Cipher > 87-100
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 159-168