default search action
Dingyi Pei
- > Home > Persons > Dingyi Pei
Publications
- 2022
- [c20]Dingyi Pei, Koji Nakao, Heung Youl Youm, Chun-I Fan:
Message from the General Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: vii - 2020
- [j24]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - 2018
- [j19]Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:
Fast construction of binary ring FCSRs for hardware stream ciphers. Des. Codes Cryptogr. 86(4): 939-953 (2018) - [c14]Dingyi Pei, Jingang Liu:
A Note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme. Inscrypt 2018: 621-625 - [i6]Zongxiang Yi, Dingyi Pei:
A Construction of Zero-Difference Functions. CoRR abs/1811.08132 (2018) - 2017
- [j18]Zhiqiang Lin, Dongdai Lin, Dingyi Pei:
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications. Cryptogr. Commun. 9(4): 431-443 (2017) - 2016
- [j16]Yanbin Zheng, Pingzhi Yuan, Dingyi Pei:
Large classes of permutation polynomials over Fq2. Des. Codes Cryptogr. 81(3): 505-521 (2016) - [j15]Yanbin Zheng, Yuyin Yu, Yuanping Zhang, Dingyi Pei:
Piecewise constructions of inverses of cyclotomic mapping permutation polynomials. Finite Fields Their Appl. 40: 1-9 (2016) - 2015
- [j14]Yanbin Zheng, Pingzhi Yuan, Dingyi Pei:
Piecewise constructions of inverses of some permutation polynomials. Finite Fields Their Appl. 36: 151-169 (2015) - [j13]Dingyi Pei, Zhiqiang Lin, Xiaolei Zhang:
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers. IEEE Trans. Inf. Theory 61(5): 2942-2951 (2015) - [i5]Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. IACR Cryptol. ePrint Arch. 2015: 1181 (2015) - 2013
- [j12]Qi Chen, Dingyi Pei, Chunming Tang, Gansen Zhao:
Efficient integer span program for hierarchical threshold access structure. Inf. Process. Lett. 113(17): 621-627 (2013) - [j11]Qi Chen, Dingyi Pei, Chunming Tang, Qiang Yue, Tongkai Ji:
A note on ramp secret sharing schemes from error-correcting codes. Math. Comput. Model. 57(11-12): 2695-2702 (2013) - 2012
- [c12]Chunming Tang, Xing Hu, Duncan S. Wong, Dingyi Pei:
An efficient key distribution scheme in cloud computing. CloudCom 2012: 557-561 - 2011
- [j10]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE Trans. Inf. Theory 57(7): 4817-4821 (2011) - [c11]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. ACISP 2011: 34-46 - [i4]Zhiqiang Lin, Dingyi Pei:
Constructing a Diversified FCSR with a Given Connection Integer. IACR Cryptol. ePrint Arch. 2011: 358 (2011) - 2010
- [j9]Dingyi Pei, Jun-Wu Dong, Chunming Rong:
A novel key pre-distribution scheme for wireless distributed sensor networks. Sci. China Inf. Sci. 53(2): 288-298 (2010) - [j8]Yusong Du, Dingyi Pei:
Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree. Sci. China Inf. Sci. 53(4): 780-787 (2010) - [j7]Meicheng Liu, Dingyi Pei, Yusong Du:
Identification and construction of Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 53(7): 1379-1396 (2010) - [c10]Qi Chen, Dingyi Pei, Jun-Wu Dong:
Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks. Inscrypt 2010: 284-299 - [c9]Yusong Du, Dingyi Pei:
Count of annihilators of Boolean functions with given algebraic immunity. WCNIS 2010: 640-643 - 2008
- [j6]Chunming Tang, Dingyi Pei, Xiaofeng Wang, Zhuojun Liu:
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. Sci. China Ser. F Inf. Sci. 51(2): 128-144 (2008) - [j5]Jun-Wu Dong, Dingyi Pei, Xue-Li Wang:
A Class of Key Predistribution Schemes Based on Orthogonal Arrays. J. Comput. Sci. Technol. 23(5): 825-831 (2008) - [c7]Chunming Tang, Dingyi Pei, Zheng-an Yao:
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. ISECS 2008: 407-411 - [e2]Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu:
Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4990, Springer 2008, ISBN 978-3-540-79498-1 [contents] - [i3]Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang:
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation. IACR Cryptol. ePrint Arch. 2008: 34 (2008) - 2007
- [c6]Chunming Tang, Dingyi Pei, Zheng-an Yao:
Efficient Zaps and Signatures of Knowledge. CIS 2007: 637-641 - [c5]Jun-Wu Dong, Dingyi Pei, Xueli Wang:
A Key Predistribution Scheme Based on 3-Designs. Inscrypt 2007: 81-92 - [c4]Yong Li, Willy Susilo, Yi Mu, Dingyi Pei:
Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200 - 2005
- [j4]Lei Hu, Jun-Wu Dong, Dingyi Pei:
Implementation of Cryptosystems Based on Tate Pairing. J. Comput. Sci. Technol. 20(2): 264-269 (2005) - [c3]Yong Li, Helger Lipmaa, Dingyi Pei:
On Delegatability of Four Designated Verifier Signatures. ICICS 2005: 61-71 - 2004
- [j3]Lei Hu, Dingyi Pei:
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. Discret. Math. 278(1-3): 139-149 (2004) - [i2]Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He:
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing. IACR Cryptol. ePrint Arch. 2004: 201 (2004) - [i1]Chunming Tang, Dingyi Pei, Zhuojun Liu:
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs. IACR Cryptol. ePrint Arch. 2004: 373 (2004) - 1999
- [c1]Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini:
Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313 - 1998
- [e1]Kazuo Ohta, Dingyi Pei:
Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings. Lecture Notes in Computer Science 1514, Springer 1998, ISBN 3-540-65109-8 [contents]
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint