|
Search the dblp DataBase
Dingfeng Ye:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
Cryptanalysis of the m-Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:97-111 [Conf]
- Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:278-288 [Conf]
- Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:227-241 [Conf]
- Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai
Cryptanalysis of ``2 R'' Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:315-325 [Conf]
- Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye
Perturbed Hidden Matrix Cryptosystems. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:595-602 [Conf]
- Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:84-89 [Conf]
- Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:2, pp:137-150 [Journal]
- Zhiping Wu, Dingfeng Ye, Weiju Ma
Perturbed Variant of TTM Cryptosystem. [Citation Graph (0, 0)][DBLP] Journal of Computer Research and Development, 2006, v:43, n:12, pp:2082-2087 [Journal]
Delegate predicate encryption and its application to anonymous authentication. [Citation Graph (, )][DBLP]
Provably Secure Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]
Information-theoretically Secure Strong Verifiable Secret Sharing. [Citation Graph (, )][DBLP]
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. [Citation Graph (, )][DBLP]
Modified Huang-Wang's Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|