Dingfeng Ye

According to our database1, Dingfeng Ye authored at least 35 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Protecting Private Keys of Dilithium Using Hardware Transactional Memory.
Proceedings of the Information Security - 26th International Conference, 2023

ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Lattice Signature can be as Simple as Lattice Encryption.
IACR Cryptol. ePrint Arch., 2022

Quantum Attacks on PRFs Based on Public Random Permutations.
IACR Cryptol. ePrint Arch., 2022

An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Can Lattice Signature be as Efficient as Lattice Encryption?
IACR Cryptol. ePrint Arch., 2021

Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Attack Beyond-Birthday-Bound MACs in Quantum Setting.
IACR Cryptol. ePrint Arch., 2020

Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Evaluating the Cache Side Channel Attacks Against ECDSA.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Ubiquitous Weak-key Classes of BRW-polynomial Function.
IACR Cryptol. ePrint Arch., 2018

Lightweight AE and HASH in a Single Round Function.
IACR Cryptol. ePrint Arch., 2018

2017
Towards Practical Obfuscation of General Circuits.
IACR Cryptol. ePrint Arch., 2017

2016
Obfuscation without Multilinear Maps.
IACR Cryptol. ePrint Arch., 2016

2012
Certificateless undeniable signatures from bilinear maps.
Inf. Sci., 2012

2011
Trace Representation and Linear Complexity of Binary eth Power Residue Sequences of Period p.
IEEE Trans. Inf. Theory, 2011

Another Elliptic Curve Model for Faster Pairing Computation.
Proceedings of the Information Security Practice and Experience, 2011

2009
Information-theoretically Secure Strong Verifiable Secret Sharing.
Proceedings of the SECRYPT 2009, 2009

Pairing-Based Nominative Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Delegate predicate encryption and its application to anonymous authentication.
Proceedings of the 2009 ACM Symposium on Information, 2009

Ideal Perfect Multilevel Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Modified Huang-Wang's Convertible Nominative Signature Scheme.
IACR Cryptol. ePrint Arch., 2008

Provably Secure Convertible Nominative Signature Scheme.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2006
Perturbed Variant of TTM Cryptosystem.
J. Comput. Res. Dev., 2006

2005
Perturbed Hidden Matrix Cryptosystems.
Proceedings of the Computational Science and Its Applications, 2005

2001
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
J. Cryptol., 2001

Attacks on Two Digital Signature Schemes Based on Error Correcting Codes.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Cryptanalysis of Polynominal Authentication and Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Cryptanalysis of the <i>m</i>-Permutation Protection Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Cryptanalysis of "2 R" Schemes.
Proceedings of the Advances in Cryptology, 1999

1998
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
Proceedings of the Advances in Cryptology, 1998


  Loading...