Jiangsu, China

Jingqi Yao

USPTO Granted Patents = 1 

Average Co-Inventor Count = 8.0

ph-index = 1


Company Filing History:


Years Active: 2022

Loading Chart...
1 patent (USPTO):Explore Patents

Title: **Jingqi Yao: Innovating in Cryptography**

Introduction

Jingqi Yao is a distinguished inventor based in Jiangsu, China, known for his significant contributions to the field of cryptography. With a focus on enhancing security measures, his innovative approaches have led to the development of techniques that strengthen encryption against potential threats.

Latest Patents

Jingqi Yao holds a patent titled "Method for Preventing Differential Cryptanalysis Attack." This groundbreaking method involves the use of an adaptive scan chain, a control module, and a plaintext analysis module. By controlling the adaptive scan chain, the plaintext analysis module enables the input of two plaintexts that differ in the last bit of only one byte through distinct scan chain structures. This method effectively counters differential cryptanalysis attacks, rendering traditional attacks ineffective by ensuring that the outputs generated by these plaintexts do not facilitate the key's retrieval.

Career Highlights

Throughout his career, Yao has actively contributed to research and development efforts while working at notable institutions. He has been associated with the Nanjing University of Posts and Telecommunications and the Nantong Institute of Nanjing University of Posts and Telecommunications Co., Ltd. His role in these organizations has been pivotal in advancing research within the field of secure communication.

Collaborations

Jingqi Yao has collaborated with esteemed colleagues, including Zhikuang Cai and Xun Xu. Working alongside these professionals, he has been part of a team that strives to push the boundaries of cryptography and innovative security solutions.

Conclusion

Jingqi Yao's inventive methods and collaborative efforts exemplify a commitment to enhancing cryptographic security. As the digital landscape evolves, his approaches will undoubtedly continue to play a crucial role in safeguarding sensitive information and fortifying encryption practices.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…