1. Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, and Bo-Yin Yang, Odd-char multivariate hidden field equations, IACR eprint2008:543 (2008), 18 pages.
  2. J. Ding, J. E. Gower, D. Schmidt, C. Wolf, and Z. Yin, Complexity estimates for the F4 attack on the perturbed Matsumoto-Imai cryptosystem, Cryptography and coding, Lecture Notes in Comput. Sci., vol. 3796, Springer, Berlin, 2005, pp. 262–277.[MR]
  3. Jintai Ding, Jason E. Gower, and Dieter Schmidt, Multivariate public key cryptosystems, Springer, Berlin, 2006, pp. xviii+260.
  4. Jintai Ding, Jason E. Gower, and Dieter S. Schmidt, Zhuang-Zi: a new algorithm for solving multivariate polynomial equations over a finite field, Preprint (2006), 14 pages.[link]
  5. Jintai Ding and Dieter Schmidt, Cryptanalysis of HFEv and internal perturbation of HFE, Public Key Cryptography—PKC 2005, Lecture Notes in Comput. Sci., vol. 3386, Springer, Berlin, 2005, pp. 288–301.[MR]
  6. Jintai Ding, Dieter Schmidt, and Fabian Werner, Algebraic attack on HFE revisited, Information Security, Lecture Notes in Comput. Sci., vol. 5222, Springer, Berlin, 2008, pp. 215–227.
  7. Jintai Ding and John Wagner, Cryptanalysis of rational multivariate public key cryptosystems, IACR (2007).[eprint]
  8. Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, and Chen-Mou Cheng, New differential-algebraic attacks and reparametrization of Rainbow, Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 5037, Springer, 2008, pp. 242–257.
  9. Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, and Vivien Dubois, Breaking the symmetry: A way to resist the new differential attack, IACR (2007).[eprint]
  10. Jeremy Erickson, Jintai Ding, and Chris Christensen, Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared, Information, Security and Cryptology – ICISC 2009, Lecture Notes in Computer Science, vol. 5984, Springer Berlin/Heidelberg, 2010, pp. 73–86.[doi]
  11. Xin Jiang, Jintai Ding, and Lei Hu, Kipnis-Shamir attack on HFE revisited, Information Security and Cryptology, Lecture Notes in Computer Science, vol. 4990, Springer Berlin/Heidelberg, 2008, pp. 399–411.
  12. Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, and Jintai Ding, Secure PRNGs from specialized polynomial maps over any Fq, IACR (2007).[eprint]
  13. Mohamed Saied Emam Mohamed, Jintai Ding, and Johannes Buchmann, Algebraic cryptanalysis of MQQ public key cryptosystem by mutantxl, IACR (2008).[eprint]
  14. Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, and Johannes Buchmann, MXL2: solving polynomial equations over GF(2) using an improved mutant strategy, Post-Quantum Cryptography, Lecture Notes in Comput. Sci., vol. 5299, Springer, Berlin, 2008, pp. 203–215.