Jintai Ding

Affiliations: 
University of Cincinnati, Cincinnati, OH 
Area:
Mathematics
Google:
"Jintai Ding"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Ding J, Kudo M, Okumura S, et al. (2018) Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Japan Journal of Industrial and Applied Mathematics. 35: 1123-1152
Ding J, Clough C, Araujo R. (2014) Inverting square systems algebraically is exponential Finite Fields and Their Applications. 26: 32-48
Zhang XD, Zhang YH, Ling YH, et al. (2013) Characterization and differential expression of microRNAs in the ovaries of pregnant and non-pregnant goats (Capra hircus). Bmc Genomics. 14: 157
Ding J, Hodges TJ, Kruglov V, et al. (2013) Growth of the ideal generated by a quadratic multivariate function over GF(3) Journal of Algebra and Its Applications. 12
Liang J, Ge F, Guo C, et al. (2009) Inhibition of PI3K/Akt partially leads to the inhibition of PrP(C)-induced drug resistance in gastric cancer cells. The Febs Journal. 276: 685-94
Han Y, Yan L, Han G, et al. (2008) Controlled trials in hepatitis B virus-related decompensate liver cirrhosis: peripheral blood monocyte transplant versus granulocyte-colony-stimulating factor mobilization therapy. Cytotherapy. 10: 390-6
Han GH, Yin ZX, Meng XJ, et al. (2006) Prospective randomized clinical trial of two drug delivery pathway in the treatment of inoperable advanced pancreatic carcinoma. Chinese Journal of Digestive Diseases. 7: 45-8
Ding J, Schmidt D, Yin Z. (2006) Cryptanalysis of the new TTS scheme in CHES 2004 International Journal of Information Security. 5: 231-240
Ding J, Gower JE, Schmidt D, et al. (2005) Complexity estimates for the F 4 attack on the perturbed Matsumoto-Imai cryptosystem Lecture Notes in Computer Science. 3796: 262-277
Ding J, Hodges T. (2004) Cryptanalysis Of An Implementation Scheme Of The Tamed Transformation Method Cryptosystem Journal of Algebra and Its Applications. 3: 273-282
See more...