2008 |
14 | | Dingyi Pei,
Moti Yung,
Dongdai Lin,
Chuankun Wu:
Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Springer 2008 |
13 | EE | Chunming Tang,
Dingyi Pei,
Zheng-an Yao:
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation.
ISECS 2008: 407-411 |
12 | EE | Jun-Wu Dong,
Dingyi Pei,
Xue-Li Wang:
A Class of Key Predistribution Schemes Based on Orthogonal Arrays.
J. Comput. Sci. Technol. 23(5): 825-831 (2008) |
11 | EE | Chunming Tang,
Dingyi Pei,
XiaoFeng Wang,
ZhuoJun Liu:
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs.
Science in China Series F: Information Sciences 51(2): 128-144 (2008) |
2007 |
10 | EE | Junwu Dong,
Dingyi Pei,
Xueli Wang:
A Key Predistribution Scheme Based on 3-Designs.
Inscrypt 2007: 81-92 |
9 | EE | Yong Li,
Willy Susilo,
Yi Mu,
Dingyi Pei:
Designated Verifier Signature: Definition, Framework and New Constructions.
UIC 2007: 1191-1200 |
2005 |
8 | EE | Yong Li,
Helger Lipmaa,
Dingyi Pei:
On Delegatability of Four Designated Verifier Signatures.
ICICS 2005: 61-71 |
7 | EE | Lei Hu,
Jun-Wu Dong,
Dingyi Pei:
Implementation of Cryptosystems Based on Tate Pairing.
J. Comput. Sci. Technol. 20(2): 264-269 (2005) |
2004 |
6 | EE | Lei Hu,
Dingyi Pei:
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discrete Mathematics 278(1-3): 139-149 (2004) |
2000 |
5 | EE | Dingyi Pei,
Wenliang Qin:
The Correlation of a Boolean Function with Its Variables.
INDOCRYPT 2000: 1-8 |
1999 |
4 | EE | Dingyi Pei,
Yuqiang Li,
Yejing Wang,
Reihaneh Safavi-Naini:
Characterization of Optimal Authentication Codes with Arbitration.
ACISP 1999: 303-313 |
1998 |
3 | | Kazuo Ohta,
Dingyi Pei:
Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings
Springer 1998 |
1995 |
2 | | Dingyi Pei:
Information-Theoretic Bounds for Authentication Codes and Block Designs.
J. Cryptology 8(4): 177-188 (1995) |
1990 |
1 | | Charles C. Wang,
Dingyi Pei:
A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences.
IEEE Trans. Computers 39(2): 258-266 (1990) |