dblp.uni-trier.dewww.uni-trier.de

Dingyi Pei

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
14 Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers Springer 2008
13EEChunming Tang, Dingyi Pei, Zheng-an Yao: 5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. ISECS 2008: 407-411
12EEJun-Wu Dong, Dingyi Pei, Xue-Li Wang: A Class of Key Predistribution Schemes Based on Orthogonal Arrays. J. Comput. Sci. Technol. 23(5): 825-831 (2008)
11EEChunming Tang, Dingyi Pei, XiaoFeng Wang, ZhuoJun Liu: Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. Science in China Series F: Information Sciences 51(2): 128-144 (2008)
2007
10EEJunwu Dong, Dingyi Pei, Xueli Wang: A Key Predistribution Scheme Based on 3-Designs. Inscrypt 2007: 81-92
9EEYong Li, Willy Susilo, Yi Mu, Dingyi Pei: Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200
2005
8EEYong Li, Helger Lipmaa, Dingyi Pei: On Delegatability of Four Designated Verifier Signatures. ICICS 2005: 61-71
7EELei Hu, Jun-Wu Dong, Dingyi Pei: Implementation of Cryptosystems Based on Tate Pairing. J. Comput. Sci. Technol. 20(2): 264-269 (2005)
2004
6EELei Hu, Dingyi Pei: Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. Discrete Mathematics 278(1-3): 139-149 (2004)
2000
5EEDingyi Pei, Wenliang Qin: The Correlation of a Boolean Function with Its Variables. INDOCRYPT 2000: 1-8
1999
4EEDingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313
1998
3 Kazuo Ohta, Dingyi Pei: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings Springer 1998
1995
2 Dingyi Pei: Information-Theoretic Bounds for Authentication Codes and Block Designs. J. Cryptology 8(4): 177-188 (1995)
1990
1 Charles C. Wang, Dingyi Pei: A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences. IEEE Trans. Computers 39(2): 258-266 (1990)

Coauthor Index

1Jun-Wu Dong [7] [12]
2Junwu Dong [10]
3Lei Hu [6] [7]
4Yuqiang Li [4]
5Yong Li [8] [9]
6Dongdai Lin [14]
7Helger Lipmaa [8]
8ZhuoJun Liu [11]
9Yi Mu [9]
10Kazuo Ohta [3]
11Wenliang Qin [5]
12Reihaneh Safavi-Naini [4]
13Willy Susilo [9]
14Chunming Tang [11] [13]
15Charles C. Wang [1]
16XiaoFeng Wang [11]
17Xue-Li Wang [12]
18Xueli Wang [10]
19Yejing Wang [4]
20Chuankun Wu [14]
21Zheng-an Yao [13]
22Moti Yung (Mordechai M. Yung) [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)