- Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, and Bo-Yin Yang, Odd-char multivariate hidden field equations, IACR eprint2008:543 (2008), 18 pages.
- J. Ding, J. E. Gower, D. Schmidt, C. Wolf, and Z. Yin, Complexity estimates for the F4 attack on the perturbed Matsumoto-Imai cryptosystem, Cryptography and coding, Lecture Notes in Comput. Sci., vol. 3796, Springer, Berlin, 2005, pp. 262–277.[MR]
- Jintai Ding, Jason E. Gower, and Dieter Schmidt, Multivariate public key cryptosystems, Springer, Berlin, 2006, pp. xviii+260.
- Jintai Ding, Jason E. Gower, and Dieter S. Schmidt, Zhuang-Zi: a new algorithm for solving multivariate polynomial equations over a finite field, Preprint (2006), 14 pages.[link]
- Jintai Ding and Dieter Schmidt, Cryptanalysis of HFEv and internal perturbation of HFE, Public Key Cryptography—PKC 2005, Lecture Notes in Comput. Sci., vol. 3386, Springer, Berlin, 2005, pp. 288–301.[MR]
- Jintai Ding, Dieter Schmidt, and Fabian Werner, Algebraic attack on HFE revisited, Information Security, Lecture Notes in Comput. Sci., vol. 5222, Springer, Berlin, 2008, pp. 215–227.
- Jintai Ding and John Wagner, Cryptanalysis of rational multivariate public key cryptosystems, IACR (2007).[eprint]
- Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, and Chen-Mou Cheng, New differential-algebraic attacks and reparametrization of Rainbow, Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 5037, Springer, 2008, pp. 242–257.
- Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, and Vivien Dubois, Breaking the symmetry: A way to resist the new differential attack, IACR (2007).[eprint]
- Jeremy Erickson, Jintai Ding, and Chris Christensen, Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared, Information, Security and Cryptology – ICISC 2009, Lecture Notes in Computer Science, vol. 5984, Springer Berlin/Heidelberg, 2010, pp. 73–86.[doi]
- Xin Jiang, Jintai Ding, and Lei Hu, Kipnis-Shamir attack on HFE revisited, Information Security and Cryptology, Lecture Notes in Computer Science, vol. 4990, Springer Berlin/Heidelberg, 2008, pp. 399–411.
- Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, and Jintai Ding, Secure PRNGs from specialized polynomial maps over any Fq, IACR (2007).[eprint]
- Mohamed Saied Emam Mohamed, Jintai Ding, and Johannes Buchmann, Algebraic cryptanalysis of MQQ public key cryptosystem by mutantxl, IACR (2008).[eprint]
- Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, and Johannes Buchmann, MXL2: solving polynomial equations over GF(2) using an improved mutant strategy, Post-Quantum Cryptography, Lecture Notes in Comput. Sci., vol. 5299, Springer, Berlin, 2008, pp. 203–215.