Jintai Ding

Jintai Ding , Ph.D.

Professor

Charles Phelps Taft Professor, Mathematical Sciences

Professional Summary

2019 Visiting Professor, University of Luxembourg

2018 Visiting Professor. KAIST, South Korea

2014 Visiting Professor, Academia Sinica, Tapei

2011-  Adjunct Professor, Chongqing University, China

2010- Adjunct Research Fellow, Center for Advanced Security Research Darmstadt, Germany

2009-2012 Distinguished Adjunct Professor, South China University of Technology, China

2006-, University of Cincinnati, Professor

2006-2007, Technical University of Darmstadt, Visiting professor and Alexander Von Humboldt Fellow

2001-2006, University of Cincinnati, Associate Professor (tenured)

1999-2001, University of Cincinnati, Assistant Professor

1998-1999, University of Cincinnati, Visiting assistant Professor

1995-1998, Research Institute for Mathematical Sciences, Kyoto University, Japan, Lecturer
 

Education

Ph.D.: Yale University 1995

M.S.: University of Science and Technology of China 1990

B.S.: Xian Jiaotong University 1988

Research and Practice Interests

Quantum Computing, Quantum Algorithms, Post-quantum Cryptography, Information security, Quantum-proof Blockchain, Computational Algebra,  Secure and Efficient implementation of Cryptographic Algorithms, Number Theory, Representation Theory, and Mathematical Physics

Research Support

Grant: #H98230-05-1-0045/P1 Investigators:Ding, Jintai 11-26-2004 -11-30-2005 National Security Agency Analytical Structure of Drinfeld Realization of Quantum Affine Super-Algebras and Twisted Quantum Affine Algebras Role:PI $34,567.00 Closed Level:Federal

Grant: #MDA904-02-1-0011/01 Investigators:Ding, Jintai 01-24-2002 -01-24-2004 National Security Agency Analytical Structure of Drinfeld Realization of Quantum Affine Algebras Role:PI $26,000.00

Grant: #2008-026-4000396 / DMS-0752881 Investigators:Ding, Jintai 03-01-2008 -02-28-2011 National Science Foundation Research Experience for Undergraduates Site in Mathematical Cryptology Role:PI $43,951.00 Closed Level:Federal

Grant: #CNS-2034176 Investigators:Ding, Jintai; Kim, Seung Ki 10-01-2020 -09-30-2023 National Science Foundation SaTC: CORE: Small: Mathematical and physical approaches to a theory of lattice reduction Role:Collaborator $483,432.00 Awarded Level:Federal

Grant: #60NANB15D029 Investigators:Ding, Jintai 06-15-2015 -04-24-2018 National Institute of Standards and Technology Benchmark the Security and Performance Parameters for Post-Quantum Cryptography - Multivariate Public Key Cryptosystems Role:PI $253,961.00 Awarded Level:Federal

Grant: #DMS-1565748 Investigators:Ding, Jintai 12-15-2015 -11-30-2017 National Science Foundation Implementing Practical Provably Secure Authenticated Key Exchange for the Post-quantum World Role:PI $142,026.00 Awarded Level:Federal

Grant: #FA2386-17-1-4067 (IP17101386) Investigators:Ding, Jintai 09-11-2017 -09-10-2020 Air Force Research Laboratory Towards Provable-secure Multi-party Authenticated Key Exchange Protocol based on Lattices in a Quantum World Role:PI $300,000.00 Active

Grant: #CNS-1814221 Investigators:Ding, Jintai 08-01-2018 -07-31-2021 National Science Foundation SATC:CORE:SMALL:Multivariate Public Key Cryptosystems - Candidates for the Next Generation Post-Quantum Standards Role:PI $300,000.00 Active Level:Federal

Abbreviated Publications

Book

Jintai Ding, Dieter Schmidt, Jason Gower. Multivariate Public Key Cryptography, Advances in Information Security series, Springer, 2006.

Johannes Buchmann, Jintai Ding. Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings Springer 2008

Book Chapter

Multivariate public key cryptography (with Bo-yin Yang), a Chapter in Post-Quantum Cryptography by Daniel J. Bernstein (Editor), Johannes Buchmann (Editor), Erik Dahmen (Editor), Springer, 2009

Multivariate cryptographic systems,Jintai Ding (Page 764-783) In Handbook of Finite Fields, Series: Discrete Mathematics and Its ApplicationsPublished: June 17, 2013 by Chapman and Hall/CRC, Content: 1068 Pages  Editor(s): Gary L. Mullen, Daniel Panario

Peer Reviewed Publications

Jintai Ding, Christopher Wolf, Bo-Yin Yang: l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Public Key Cryptography 2007: 266-281

Jintai Ding, Jason E. Gower, Dieter Schmidt: Multivariate Public Key Cryptosystems Springer 2006: 1-260

Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding: Breaking a New Instance of TTM Cryptosystems. ACNS 2006: 210-225

Jintai Ding, Jason E. Gower: Inoculating Multivariate Schemes Against Differential Attacks. Public Key Cryptography 2006: 290-301

Jintai Ding, Dieter Schmidt, Zhijun Yin: Cryptanalysis of the new TTS scheme in CHES 2004. Int. J. Inf. Sec. 5(4): 231-240 (2006)

Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann: Analysis of the SMS4 Block Cipher. ACISP 2007: 158-170

Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner: Cryptanalysis of the TRMC-4 Public Key Cryptosystem. ACNS 2007: 104-115

Jintai Ding, Bo-Yin Yang: Multivariates Polynomials for Hashing. Inscrypt 2007: 358-371

Xin Jiang, Jintai Ding, Lei Hu: Kipnis-Shamir Attack on HFE Revisited. Inscrypt 2007: 399-411

Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner: High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Public Key Cryptography 2007: 233-248

Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng: New Differential-Algebraic Attacks and Reparametrization of Rainbow. ACNS 2008: 242-257

Sundar Balasubramanian, Harold W. Carter, Andrey Bogdanov, Andy Rupp, Jintai Ding: Fast multivariate signature generation in hardware: The case of rainbow. ASAP 2008: 25-30

Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng: Could SFLASH be Repaired?. ICALP (2) 2008: 691-701

Jintai Ding, Dieter Schmidt, Fabian Werner: Algebraic Attack on HFE Revisited. ISC 2008: 215-227

Jintai Ding, John Wagner: Cryptanalysis of Rational Multivariate Public Key Cryptosystems. PQCrypto 2008: 124-136

John Baena, Crystal Clough, Jintai Ding: Square-Vinegar Signature Scheme. PQCrypto 2008: 17-30

Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann: MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. PQCrypto 2008: 203-215

Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner: Algebraic Attack on the MQQ Public Key Cryptosystem. CANS 2009: 392-401

Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang: SSE Implementation of Multivariate PKCs on Modern x86 CPUs. CHES 2009: 33-48

Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen: Square, a New Multivariate Encryption Scheme. CT-RSA 2009: 252-264

Jeremy Erickson, Jintai Ding, Chris Christensen: Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. ICISC 2009: 73-86

Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin: MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. ICISC 2009: 87-100

Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed: Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. AFRICACRYPT 2010: 69-81

Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner: Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. CANS 2010: 140-155

Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun: On the Kipnis-Shamir Method Solving the MinRank Problem. IWSEC (Short Papers) 2010: 1-13

Jintai Ding, Timothy J. Hodges, Victoria Kruglov: Growth of the Ideal Generated by a Quadratic Boolean Function. PQCrypto 2010: 13-27

Crystal Lee Clough, Jintai Ding: Secure Variants of the Square Encryption Scheme. PQCrypto 2010: 153-164

Jintai Ding, Dieter Schmidt: Mutant Zhuang-Zi Algorithm. PQCrypto 2010: 28-40

Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding: Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. PQCrypto 2010: 41-60

Daniel Cabarcas, Jintai Ding: Linear algebra to compute syzygies and Gröbner bases. ISSAC 2011: 67-74

Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen: High-Speed Hardware Implementation of Rainbow Signature on FPGAs. PQCrypto 2011: 228-243

Jintai Ding, Timothy J. Hodges: Inverting HFE Systems Is Quasi-Polynomial for All Fields. CRYPTO 2011: 724-742

Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann: Towards Algebraic Cryptanalysis of HFE Challenge 2. ISA 2011: 123-131

Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin: Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. ISPEC 2011: 168-180

John B. Baena, Crystal Lee Clough, Jintai Ding. New Variants of the Square-Vinegar
Signature Scheme
Revista Colombiana de Matemáticas (Colombian Journal of Mathematics), vol 45 No 2 (2011)

An Algebraic Broadcast Attack against NTRU, (Anonymously refereed) with Yanbin Pan and Yingpu Deng Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012, Springer, Lecture Notes in Computer Science, V.7372, 2012, P.124-137.

Growth of the ideal generated by a quadratic multivariate function over GF(3), with D. Schmidt, S. Stohanea, T. Hodges, V. Kruglov, Accepted for Journal of Applied Algebra

Degree of Regularity of HFE-, with T. Kleinjung, Journal of Math-for-Industry, Vol. 4 (2012B-3), pp. 97–104. Springer, 2012

Embedded surface attack on multivariate public key cryptosystems from Diophantine equations (ANONYMOUSLY REFEREED) , with C. Tao, A. Ren, Accepted and presented at  The 8th China International Conference on Information Security and Cryptology, Nov. 28 - Nov. 30, 2012, Beijing, China,  to be published in LNCS by Springer.

Jintai Ding, Crystal CloughRoberto Araujo: Inverting square systems algebraically is exponential. Finite Fields and Their Applications 26: 32-48 (2014)

Algebraic solvers for certain lattice-related problems, (refereed) Information Theory Workshop (ITW), 2011 IEEE, IEEE conference publications, Page 405-409, 2011

Jintai Ding, Bo-Yin YangDegree of Regularity for HFEv and HFEv-. PQCrypto 2013, Post-Quantum Cryptography,   Lecture Notes in Computer Science Volume 7932, 2013, pp 52-66, Springer

Qinglong Wang, Jintai Ding: Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. Cryptologia 38(4): 370-376 (2014)

  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation", 2013 ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2013, pp.57-62, 2013.

 
Shaohua TangLingling XuNiu LiuXinyi Huang, Jintai Ding, Zhiming Yang: Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distrib. Syst. 25(12): 3253-3263 (2014)

Jintai Ding, Albrecht PetzoldtLih-chung Wang: The Cubic Simple Matrix Encryption Scheme. PQCrypto 2014: 76-87

Jaiberth PorrasJohn Baena, Jintai Ding: ZHFE, a New Multivariate Public Key Encryption Scheme. PQCrypto 2014: 229-245


Chengdong TaoHong XiangAlbrecht Petzoldt, Jintai Ding:
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption. Finite Fields and Their Applications 35: 352-368 (2015)


Albrecht PetzoldtMing-Shing ChenBo-Yin YangChengdong Tao, Jintai Ding:
Design Principles for HFEv- Based Multivariate Signature Schemes. ASIACRYPT (1) 2015: 311-334


Jiang ZhangZhenfeng Zhang, Jintai Ding, Michael SnookÖzgür Dagdelen:
Authenticated Key Exchange from Ideal Lattices. EUROCRYPT (2) 2015: 719-751


Jintai Ding, Momonari KudoShinya OkumuraTsuyoshi TakagiChengdong Tao:
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. IWSEC 2016: 305-315

Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems.PQCrypto 2016: 182-196

  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction",Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 3, pp.1123–1152, 2018.

Jintai Ding, Scott R. FluhrerSaraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. ACISP2018: 467-486



Xinwei Gao, Jintai Ding, Lin LiJiqiang Liu:
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018)


Xinwei Gao, Jintai Ding, Lin LiSaraswathy RVJiqiang Liu:
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. I. J. Network Security 20(5): 923-930 (2018)

Invited Publication

Jintai Ding, Dieter Schmidt, Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields, Number Theory and Cryptography, Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, Series: Lecture Notes in Computer Science, Vol. 8260

Presentations

Invited Presentations

Jintai Ding (02-2011. ) Multivariate Public Key Cryptosystems . Symbolic Computations and Post-Quantum Cryptography Online Seminar, Online. Level:International

Jintai Ding (10-2011. ) Algebraic attack on lattice systems .the 2011 IEEE Information Theory Workshop (ITW 2011), Brazil. Level:International

Jintai Ding (10-2011. ) Rethinking of HFE .The São Paulo Advanced School of Cryptography , Sao Paulo, Brazil. Level:International

Jintai Ding and Richard Harknett (12-05-2011. ) Cloud Computing, Security and Customizable Convenience — An American Perspective .2011 Chongqing international workshop on cloud security policy, Chongqing University. Workshop. . Level:International

Jintai Ding (02-2012. ) Algebraic methods to solve lattice problems .Symbolic Computations and Post-Quantum Cryptography Online Seminar, Level:International

Jintai Ding (03-2012. ) Multivariate public key cryptosystems .plenary speaker, the fourth international conference on Mathematical Sciences, the United Arab Emirates University. Level:International

Jintai Ding (05-2012. ) New Lattice constructions .Retreat seminar, TU Darmstadt, Germany. Level:Department

Jintai Ding (07-2012. ) Algebraic methods for lattice problems .Information security seminar, Chongqing University. Level:Department

Jintai Ding (08-2012. ) Degree of regularity for HFE systems .seminar at the Institute of Advanced Study, Tsinghua University. Level:Department

Jintai Ding (08-2012. ) Broadcasting attack on lattice systems .seminar at at the State Key Lab of Information Security, Academy of Sciences of China, Beijing. Level:Department

Jintai Ding (11-2012. ) Provable secure Key exchange based on LWE .Taiwan-Germany workshop in Information Security and Crypto, Taichung, Taiwan. Level:International

Jintai Ding (11-2012. ) Tutorial on multivariate public key cryptosystems .International workshop on Post-Quantum Cryptography and Quantum Algorithms, Lorentz International Center for workshops in the Sciences, Leiden, Holland. Level:International

Jintai Ding (12-2013. ) A new Algrothm to solve the GACD problem .Institute of Software, Chinese Academy of Scieneces, Beijing, China. Level:National

Jintai Ding (12-2013. ) Keynote lecture: Degeneration degree of HFE and its variants .Workshop: Post-Quantum Cryptography and Its Related Topics, Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan. Level:International

Jintai Ding (12-2013. ) Multivariate piblic key cryptography .Seminar of college of software engineering, Chongqing UNiversity. Level:University

Jintai Ding (11-2013. ) A new Algrothm to solve the GACD problem .Festkolloquium Professor Johannes Buchmann, TU Darmstadt. Level:International

Jintai Ding (07-2103. ) Degree of regularity of HFE and its variants .seminar at Laboratory for Cryptologic Algorithms,, EPFL, Lausanne, Switzerland. Level:University

Jintai Ding (09-2013. ) Multivariate piblic key cryptography .Quantum-Safe-Crypto Workshop, the European Telecommunications Standards Institute, Nice, France. Level:International

Jintai Ding (10-2013. ) Multivariate piblic key cryptography .the II Advanced School on Cryptology and Information Security in Latin America, Florianópolis, Brasil. Level:International

Jintai Ding (10-2013. ) The simple matrix encrytion scheme .Fall Southeastern Sectional Meeting University of Louisville, Louisville, KY . Level:National

Jintai Ding (06-20-2014. ) A New GACD algorithm .International Workshop on Lattice-based cryptography, Chinese Academy of Scienecs. Other Institution. . Level:International

Jintai Ding (06-20-2014. ) A new AKE .International Workshop on Lattice-based cryptography,, Chinese Academy of Scienecs. Other Institution. . Level:International

Jintai Ding (08-20-2014. ) A New GACD algorithm .Obwolfach workshop on Cryptography, Obwolfach, Gremany. Other Institution. . Level:International

Jintai Ding (11-2014. ) A post-quantum AKE based n LWE .The Workshop Post-Quantum Cryptography: Recent Results and Trends, Kyushu University. Other Institution. . Level:International

Jintai Ding (10-2014. ) A new key exchange based on LWE .Taiwan-Germany Workshop on Cryptography and Algorithms , Taichung, Taiwan. Other Institution. . Level:International

Jintai Ding (10-2014. ) ZHFE, a new multivariate encryption scheme .Post-quantum Workshop 2014, Waterloo, Canada. Level:International

Jintai Ding (10-2014. ) A new AKE based on RLWE .ETSI quantum-safe workshop, 2014, Ottawa, Canada.

Jintai Ding (10-08-2015. ) Multivaariate Public Key Cryptography .Seoul National University, Seoul, Korea.

Jintai Ding (04-01-2015. ) Authenticated Key Exchange .NSA , NSA, DC.

Jintai Ding (10-06-2015. ) New HFEv- signature .3rd ETSI/IQC Workshop on Quantum-Safe Cryptography, KTT, Soeul, Korea.

Jintai Ding (09-08-2015. ) Authenticated Key Exchange .Dagstuhl Seminar, Quantum Cryptanalysis, Dagstuhl, Germany.

Jintai Ding (04-27-2015. ) Authenticated Key Exchange .Eurocrypt 2015, Sophia, Bulgaria.

Jintai Ding (04-02-2015. ) Authenticated Key Exchange .NIST Workshop on Cybersecurity in a Post-Quantum World, NIST, DC.

Jintai Ding (12-2016. ) Post-quantum key exchange based on LWE .Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing. Other Institution. . Level:International

Jintai Ding (10-2016. ) Post-quantum key exchange based on LWE .the second Asia PQC Forum, Seoul. Workshop. . Level:International

Jintai Ding (10-2016. ) Multivariate Public key Cryptography .the 19th Annual International Conference on Information Security and Cryptology, Seoul. Conference. . Level:International

Jintai Ding (09-2016. ) Post-quantum key exchange .the 4th ETSI/IQC Workshop on Quantum-Safe Cryptography, Toronto. Workshop. . Level:International

Jintai Ding (06-2016. ) Post-quantum key exchange based on LWE .Workshop HEAT • Homomorphic Encryption Applications and Technology, Université Pierre et Marie Curie in Pari, Paris. Workshop. . Level:International

Jintai Ding (04-2016. ) Post-quantum key exchange .Colloquium, University of Columbia, Medlin. Other Institution. . Level:International

Jintai Ding (02-2016. ) Post-quantum key exchange based on LWE .Tutorial lecture, Post-quantum Cryptography Winter School, Kyushu. Workshop. . Level:International

Jintai Ding (01-2016. ) Post-quantum key exchange .Google, San Francisco. Other Institution. . Level:National

Lecture

Jintai Ding (03-2011. ) Post-quantum cryptography .Chongqing University, China. Other Institution. Level:College

Jintai Ding (06-2011. ) New Algebraic Attack on Lattice-based cryptosystems .Intel-National Taiwan University Research Center, Taipei. Other Institution. Level:University

Jintai Ding (03-2011. ) Security of Yang-Cheng-tong card .State Key lab of information security, Academia Sinica, Beijing. Other Institution.

Jintai Ding (06-2011. ) Inverting the HFE System is Quasi-polynomial for All Fields .Technical University od Darmstadt, Germany. Other Institution. Level:College

Jintai Ding (10-2011. ) Introduction to public key cryptograpohy .Federal University of Para at Belem, Brazil. Other Institution. Level:University

Event Organized

2011 Chongqing international workshop on cloud security policy

2011 Chongqing international workshop on cloud security policy Workshop 12-05-2011 12-06-2011 Chongqing Level:International

Honors and Awards

1990 Zhong-jia-qing Prize Annual best thesis in mathematics awarded by the Chinese Mathematical Society

2006 -2007 Humboldt Fellow

2009 Sigma Xi Young Investigator Award the University of Cincinnati Chapter of Sigma Xi in conjunction with the Office of the Vice President for Research

1994 Alfred P. Sloan Foundation Doctoral Dissertation Fellowship

2005 McMicken Dean’s Award for Distinguished Scholarship College of Arts and Sciences, University of Cincinnati

Service

ADVANCES IN MATHEMATICS OF COMMUNICATIONS Editorial Board Member Type:Editorial Service Level:International 2007

Fourth international conference on Post-quantum cryptography (Program committee ) Member Type:Service to Professional Associations Level:International 07-2011 -12-2011

Symbolic Computations and Post-Quantum Cryptography Online Seminar (Program committee ) Member Type:Service to Professional Associations Level:International 01-2011

7th international Conference on Information Security Practice and Experience (Program committee ) Member Type:Service to Professional Associations Level:International 02-2011 -06-2011

The 7th China International Conference on Information Security and Cryptology (Inscrypt'2011) (Program committee ) Committee Member Type:Service to Professional Associations Level:International 07-2011 -12-2011

Deaprtment of Mathematical Scienecs (Graduate affair committee ) Member Type:Departmental Service Level:Department 09-2010

Technical University of Darmstadt (Ph.D. defense committee ) Committee Member Type:University/College Service Level:International 06-2011 -06-2011

(Rieveschl Award for Distinguished Scientific Research Committee ) Committee Member Type:University/College Service Level:University 09-2011 -06-2012

UC (5 year enrollment committee ) Committee Member Type:University/College Service Level:University 08-2012 -06-2013

UC A&S (Taft Chair search committee ) Committee Member Type:University/College Service Level:College 12-2012 -05-2103

UC (Conflict of Interests ) Committee Member Type:University/College Service Level:University 08-2012

Math. Sci. Dept. (Graduate Affair ) Committee Member Type:Departmental Service Level:Department 01-2012 -06-2012

Math. Sci. Dept. (Algebra prelim ) Committee Chair Type:Departmental Service Level:Department 01-2012 -09-2012

Math. Sci. Dept. (RPT ) Committee Member Type:Departmental Service Level:Department 09-2012

Math. Sci. Dept. (Prelim for algebra and topology ) Committee Member Type:Departmental Service Level:Department 09-2012

UC (University Faculty Senate Cimmittee ) Committee Member Type:University/College Service Level:University 09-2012

18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 (Program Committee ) Committee Member Type:Service to Professional Associations Level:International 04-2012 -12-2012

International workshop on post-quantum cryptography 2013, (Porgram Committee ) Member Type:Editorial Service Level:International 10-2012 -06-2103

The 9th China International Conference on Information Security and Cryptology 2013 (Porgram Committee ) Member Type:Editorial Service Level:International 05-2013 -11-2013

(Visiting Assistant Professor search committee, Chair ) Committee Chair Type:Departmental Service Level:Department 01-2016 -06-2016

(COMMITTEE FOR PRELIM EXAMINATIONS: Algebra/Topology ) Committee Chair Type:Departmental Service Level:Department 01-2016 -12-2016

(TT Search Committee ) Committee Chair Type:Departmental Service Level:Department 10-2016

(GRADUATE ADVISOR COMMITTEE ) Member Type:Departmental Service Level:Department 08-2016 -06-2017

Keywords

Post-quantum cryptography, Information Security, Quantum-proof Blockchain, Quantum groups and number theory

Courses Taught

15-MATH-357 INTRO:ABSTR MATH Introduction to Abstract Mathematics Level:Undergraduate

Number Theory Level:Both

Seminar in cryptography Level:Graduate

Seminar in cryptography

15-MATH-511 ABSTRACT ALGEBRA Level:Both

15-MATH-351 LINEAR ALGEBRA I Level:Undergraduate

15-MATH-352 LINEAR ALGEBRA II

15-MATH-513 ABSTRACT ALGEBRA

CRYPTOGRAPHY

15-MATH-352 LINEAR ALGEBRA II

ABST LIN ALGEBRA Level:Graduate

INTRO ABST ALGEBRA Level:Undergraduate

Group Theory Level:Both

Linear Algebra Level:Undergraduate

Linear Algebra Level:Undergraduate

INTRO ABST MATH (001)

ABST LIN ALGEBRA (001)

NUMBER THEORY (001)

RINGS FIELDS GALOIS (001)

16SS_MATH3096001: (16SS) MODERN CRYPTOGRAPHY (001) Level:Undergraduate

16SS_MATH8048001: (16SS) LATTICE CRYPTOGRPHY (001) Level:Graduate

2168-1_15MATH8006001: (2168) CRYPTOGRAPHY (001) Level:Graduate

Patents and Inventions

7,961,876 Method to produce new multivariate public key cryptosystems Jintai Ding, Awarded 06-2011 Inventor

7,158,636 Multivariable cryptosystem Jintai Ding, Awarded 01-2007

New Lattice constructions -- Provisional patent application Jintai Ding, Filed Inventor

BF130204P New Lattice Concstructions -- PCT application Jintai Ding, Filed Inventor

A new fast HFEv- signature scheme- Provisional application Jinati Ding, Inventor

Provisional application-New Improvements on Key Exchange Using LWE & RLWE Jintai Ding, Inventor

Other Information

In 2011,

Submitted one research proposal to URC.

Submitted two full proposals to NSF.


In 2011, refereeed for:

NSF China
PQC 2011
RSA 2011
Inscrypt 2011
Academia Sinica
IEEE Communications Letters
IEICE Transactions on Information and Systems
Journal of Finite field and its applications
Computers and Mathematics with Applications
ISPEC 2011
Journal of Computer Science and Technology
Journal of Systems and Software


 ,

October 6, 2001

Presentation at the A&S College Close-Up session in 310 University Pavilion,

In 2013: 

I have done reviews for many journals and organizations including:

Beiträge zur Algebra und Geometrie

Applied Mathematics & Information Sciences

ACNS 2013

Plus One

FFA 

Saudi Ministry of Economy and Planning

J  of Cryptology

J of foundation of Computer sciences

PQC 2013

Advances Math. In Comm.

J. Math Crypto

PKC 2013

NSF China

NSA

 Journal on Satisfiability, Boolean Modeling, and Computation

 

 

Reviewer for Ph.D. Thesis of A. Petzolt, TU Darmstadt

With Ning Zhong, invited Prof J. Buchmann  from TU Darmsatdt  and Prof. Michele Mosca  from University of Waterloo for Taft competitive lectures.

Submitted 2 proposal to NSF and one to Simon foundation. 

 

,

In 2014: 

I have give lectures extensively around the world at various institutions including:
 
Nanjing University
Beijing Jiaotong University
Changan University
Chongqing University
NIST -- Natinal Institute of Technology
Donghua Uinversity
Nanyang Technological U
Software Institute, CAS


 
 
I have filed three NSF grant applications and 1 NIST grant application.


I had an interview with the Discovery magazine.

I have been working n the second edition of my book and hope to finish in 2015

I have reviewed many papers and proposal for:
NSA
Security and Communication Networks
International Journal of Computer Mathematics
Cryptologia
Computers and Mathematics with Applications
IEEE Transactions on Computers
Math Review
Post-quantum Cryptography  2014
Inscrypt 2014
Designs, Codes and Cryptography 
J. of Applied Mathematics
China communication
J. of Mathematical Cryptography
1st International Conference on Information Systems Security and Privacy
KSII Transactions on Internet and Information Systems

I have served on program committe of 
PQC 214
Inscrypt 2014 
1st International Conference on Information Systems Security and Privacy,

In 2015,

I refereed for many organizations, journals and conferences including
 
EEE/ACM Transactions on Computational Biology and Bioinformatics
 
KSII Transactions on Internet and Information Systems
 
IEEE Transactions on Emerging Topics in Computing
 
IEEE Transactions on Information Forensics & Security
 
SECRYPT
 
Security and Communication Networks 
 
IET  Information Security
 
Asiacrypt
 
Design, code and cryptography
 
Information Sciences
 
Danish Science Foundation

I served on Program committees for Inscrypt 2015, ICCCS2015, ICCC 2015

I served on the Editoril Board of:

  • Advances in Mathematics of Communications,
  • J. Algebra Comb. Discrete Appl.
  •  KSII Transactions on Internet and Information Systems
,

In 2016,

I reviewed Proposals for the Research Grants Council (RGC) of Hong Kong and 
NSF China, also many journals and conferences

 I served on the Program committee member In charge of review and selecting papers:

  • The 7th Int. Workshop on Post-quantum cryptography, Japan, 2016
  • The 12th International Conference on Information Security and Cryptology. 2016, Beijing, China

 ,

Complete Publication List,