default search action
Dingfeng Ye
Person information
- unicode name: 叶顶锋
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Wenjie Wang, Wei Wang, Jingqiang Lin, Lina Shang, Fan Lang, Dingfeng Ye:
Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON. ICC 2023: 4552-4557 - [c23]Huiqing Wan, Qiongxiao Wang, Cunqing Ma, Yajun Teng, Jingqiang Lin, Dingfeng Ye:
ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs. ISCC 2023: 1340-1343 - [c22]Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin:
Protecting Private Keys of Dilithium Using Hardware Transactional Memory. ISC 2023: 288-306 - [c21]Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye:
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms. TrustCom 2023: 730-739 - [c20]Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye:
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures. TrustCom 2023: 804-813 - 2022
- [c19]Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Quantum Attacks on PRFs Based on Public Random Permutations. INDOCRYPT 2022: 566-591 - [c18]Zijian Song, Jun Xu, Zhiwei Li, Dingfeng Ye:
An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015. INDOCRYPT 2022: 644-657 - [i9]Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu:
Lattice Signature can be as Simple as Lattice Encryption. IACR Cryptol. ePrint Arch. 2022: 97 (2022) - [i8]Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Quantum Attacks on PRFs Based on Public Random Permutations. IACR Cryptol. ePrint Arch. 2022: 442 (2022) - 2021
- [c17]Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting. PQCrypto 2021: 421-441 - [i7]Dingfeng Ye:
Can Lattice Signature be as Efficient as Lattice Encryption? IACR Cryptol. ePrint Arch. 2021: 2 (2021) - 2020
- [c16]Gang Liu, Peng Wang, Rong Wei, Dingfeng Ye:
Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure. Inscrypt 2020: 491-503 - [i6]Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Attack Beyond-Birthday-Bound MACs in Quantum Setting. IACR Cryptol. ePrint Arch. 2020: 1595 (2020)
2010 – 2019
- 2019
- [c15]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng:
Evaluating the Cache Side Channel Attacks Against ECDSA. Inscrypt 2019: 325-345 - 2018
- [c14]Kaiyan Zheng, Peng Wang, Dingfeng Ye:
Ubiquitous Weak-Key Classes of BRW-Polynomial Function. AFRICACRYPT 2018: 33-50 - [i5]Kaiyan Zheng, Peng Wang, Dingfeng Ye:
Ubiquitous Weak-key Classes of BRW-polynomial Function. IACR Cryptol. ePrint Arch. 2018: 14 (2018) - [i4]Dingfeng Ye, Danping Shi, Peng Wang:
Lightweight AE and HASH in a Single Round Function. IACR Cryptol. ePrint Arch. 2018: 1126 (2018) - 2017
- [i3]Dingfeng Ye, Peng Liu, Jun Xu:
Towards Practical Obfuscation of General Circuits. IACR Cryptol. ePrint Arch. 2017: 321 (2017) - 2016
- [i2]Dingfeng Ye, Peng Liu:
Obfuscation without Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 95 (2016) - 2012
- [j5]Wei Zhao, Dingfeng Ye:
Certificateless undeniable signatures from bilinear maps. Inf. Sci. 199: 204-215 (2012) - 2011
- [j4]Zongduo Dai, Guang Gong, Hong-Yeop Song, Dingfeng Ye:
Trace Representation and Linear Complexity of Binary eth Power Residue Sequences of Period p. IEEE Trans. Inf. Theory 57(3): 1530-1547 (2011) - [c13]Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye:
Another Elliptic Curve Model for Faster Pairing Computation. ISPEC 2011: 432-446
2000 – 2009
- 2009
- [c12]Changlu Lin, Lein Harn, Dingfeng Ye:
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. IAS 2009: 118-121 - [c11]Ribao Wei, Dingfeng Ye:
Delegate predicate encryption and its application to anonymous authentication. AsiaCCS 2009: 372-375 - [c10]Wei Zhao, Dingfeng Ye:
Pairing-Based Nominative Signatures with Selective and Universal Convertibility. Inscrypt 2009: 60-74 - [c9]Changlu Lin, Lein Harn, Dingfeng Ye:
Information-theoretically Secure Strong Verifiable Secret Sharing. SECRYPT 2009: 233-238 - 2008
- [j3]Changlu Lin, Yong Li, Qiupu Zhang, Dingfeng Ye:
Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(12): 3828-3832 (2008) - [c8]Wei Zhao, Changlu Lin, Dingfeng Ye:
Provably Secure Convertible Nominative Signature Scheme. Inscrypt 2008: 23-40 - [c7]Wei Zhao, Dingfeng Ye:
Modified Huang-Wang's Convertible Nominative Signature Scheme. ICYCS 2008: 2090-2095 - [i1]Wei Zhao, Dingfeng Ye:
Modified Huang-Wang's Convertible Nominative Signature Scheme. IACR Cryptol. ePrint Arch. 2008: 337 (2008) - 2006
- [j2]Zhiping Wu, Dingfeng Ye, Weiju Ma:
Perturbed Variant of TTM Cryptosystem. J. Comput. Res. Dev. 43(12): 2082-2087 (2006) - 2005
- [c6]Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye:
Perturbed Hidden Matrix Cryptosystems. ICCSA (2) 2005: 595-602 - 2001
- [j1]Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam:
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. J. Cryptol. 14(2): 137-150 (2001) - [c5]Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou:
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. ICICS 2001: 84-89 - 2000
- [c4]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 - [c3]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288
1990 – 1999
- 1999
- [c2]Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai:
Cryptanalysis of "2 R" Schemes. CRYPTO 1999: 315-325 - 1998
- [c1]Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam:
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. ASIACRYPT 1998: 227-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint