| 2009 |
| 11 | EE | Ribao Wei,
Dingfeng Ye:
Delegate predicate encryption and its application to anonymous authentication.
ASIACCS 2009: 372-375 |
| 2008 |
| 10 | EE | Wei Zhao,
Dingfeng Ye:
Modified Huang-Wang's Convertible Nominative Signature Scheme.
ICYCS 2008: 2090-2095 |
| 9 | EE | Wei Zhao,
Changlu Lin,
Dingfeng Ye:
Provably Secure Convertible Nominative Signature Scheme.
Inscrypt 2008: 23-40 |
| 2006 |
| 8 | EE | Zhiping Wu,
Dingfeng Ye,
Weiju Ma:
Perturbed Variant of TTM Cryptosystem.
Journal of Computer Research and Development 43(12): 2082-2087 (2006) |
| 2005 |
| 7 | EE | Zhiping Wu,
Jintai Ding,
Jason E. Gower,
Dingfeng Ye:
Perturbed Hidden Matrix Cryptosystems.
ICCSA (2) 2005: 595-602 |
| 2001 |
| 6 | EE | Dingfeng Ye,
Junhui Yang,
Zongduo Dai,
Haiwen Ou:
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes.
ICICS 2001: 84-89 |
| 5 | EE | Dingfeng Ye,
Zongduo Dai,
Kwok-Yan Lam:
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
J. Cryptology 14(2): 137-150 (2001) |
| 2000 |
| 4 | | Hongjun Wu,
Feng Bao,
Dingfeng Ye,
Robert H. Deng:
Cryptanalysis of Polynominal Authentication and Signature Scheme.
ACISP 2000: 278-288 |
| 3 | | Hongjun Wu,
Feng Bao,
Dingfeng Ye,
Robert H. Deng:
Cryptanalysis of the m-Permutation Protection Schemes.
ACISP 2000: 97-111 |
| 1999 |
| 2 | EE | Dingfeng Ye,
Kwok-Yan Lam,
Zong-Duo Dai:
Cryptanalysis of ``2 R'' Schemes.
CRYPTO 1999: 315-325 |
| 1998 |
| 1 | EE | Zong-Duo Dai,
Dingfeng Ye,
Kwok-Yan Lam:
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
ASIACRYPT 1998: 227-241 |