The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dingyi Pei: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini
    Characterization of Optimal Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:303-313 [Conf]
  2. Yong Li 0002, Helger Lipmaa, Dingyi Pei
    On Delegatability of Four Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:61-71 [Conf]
  3. Dingyi Pei, Wenliang Qin
    The Correlation of a Boolean Function with Its Variables. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:1-8 [Conf]
  4. Lei Hu, Dingyi Pei
    Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2004, v:278, n:1-3, pp:139-149 [Journal]
  5. Lei Hu, Jun-Wu Dong, Dingyi Pei
    Implementation of Cryptosystems Based on Tate Pairing. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:2, pp:264-269 [Journal]
  6. Dingyi Pei
    Information-Theoretic Bounds for Authentication Codes and Block Designs. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1995, v:8, n:4, pp:177-188 [Journal]
  7. Charles C. Wang, Dingyi Pei
    A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1990, v:39, n:2, pp:258-266 [Journal]
  8. Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei
    Designated Verifier Signature: Definition, Framework and New Constructions. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1191-1200 [Conf]

  9. Efficient Zaps and Signatures of Knowledge. [Citation Graph (, )][DBLP]


  10. A Key Predistribution Scheme Based on 3-Designs. [Citation Graph (, )][DBLP]


  11. 5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. [Citation Graph (, )][DBLP]


  12. New Family of Non-Cartesian Perfect Authentication Codes. [Citation Graph (, )][DBLP]


Search in 0.077secs, Finished in 0.078secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002