发表论文
[1] 刘刚, 王鹏, 叶顶锋. 聚合认证加密方案. 密码学报[J]. 2023, 10(2): 415-432, http://lib.cqvip.com/Qikan/Article/Detail?id=7109467095.[2] Tingting Guo, Peng Wang, Dingfeng Ye, 胡磊. Quantum Attacks on PRFs Based on Public Random Permutations. Indocrypt 2022null. 2022, [3] Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye. Attack Beyond-Birthday-Bound MACs in Quantum Setting. PQCrypto 2021null. 2021, [4] 王鹏. Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure. Inscrypt 2020. 2020, [5] 王鹏. Ubiquitous Weak-Key Classes of BRW-Polynomial Function. AFRICACRYPT 2018. 2018, [6] 张秋璞, 徐震, 叶顶锋. 一个可追踪身份的基于属性签名方案. 软件学报[J]. 2012, 23(9): 2449-2464, http://lib.cqvip.com/Qikan/Article/Detail?id=43116862.[7] Zhao, Wei, Ye, Dingfeng. Certificate less undeniable signatures from bilinear maps. INFORMATION SCIENCES[J]. 2012, 199: 204-215, http://dx.doi.org/10.1016/j.ins.2012.02.046.[8] 王竹, 戴一奇, 叶顶锋. 普适安全的基于身份的签名机制. 电子学报[J]. 2011, 39(7): 1613-1617, http://lib.cqvip.com/Qikan/Article/Detail?id=38926242.[9] 张秋璞, 叶顶锋. 对一个基于身份的多重签密方案的分析和改进. 电子学报[J]. 2011, 39(12): 2713-2720, http://lib.cqvip.com/Qikan/Article/Detail?id=40528318.[10] 王子午, 叶顶锋. 单元环上的多方并发签名. 信息网络安全[J]. 2010, 46-49, http://lib.cqvip.com/Qikan/Article/Detail?id=35505650.[11] Zhao Wei, Lin Changlu, Ye Dingfeng, Yung M, Liu P, Lin DD. Provably Secure Convertible Nominative Signature Scheme. INFORMATION SECURITY AND CRYPTOLOGYnull. 2009, 5487: 23-40, [12] Lin Changlu, Harn Lein, Ye Dingfeng, Pan JS, Guo BL, Abraham A. Ideal Perfect Multilevel Threshold Secret Sharing Scheme. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGSnull. 2009, 118-+, http://dx.doi.org/10.1109/IAS.2009.279.[13] Lin, Changlu, Li, Yong, Zhang, Qiupu, Ye, Dingfeng. Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2008, E91A(12): 3828-3832, http://www.corc.org.cn/handle/1471x/2388629.[14] Zhao Wei, Ye Dingfeng, Wang GJ, Chen J, Fellows MR, Ma HD. Modified Huang-Wang's Convertible Nominative Signature Scheme. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5null. 2008, 2090-2095, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000269081801044.[15] 巫治平, 叶顶锋. 正形置换的复合性质. 自然科学进展[J]. 2006, 16(11): 1517-1520, https://d.wanfangdata.com.cn/periodical/zrkxjz200611023.[16] 巫治平, 叶顶锋, 马卫局. TTM密码系统的扰动变形. 计算机研究与发展[J]. 2006, 43(12): 2082-2087, https://crad.ict.ac.cn/cn/article/id/2006.[17] Dai, Zongduo, Wang, Kunpeng, Ye, Dingfeng. Multi-continued fraction algorithm on multi-formal Laurent series. ACTA ARITHMETICA[J]. 2006, 122(1): 1-16, http://www.corc.org.cn/handle/1471x/2379094.[18] 田暄, 叶顶锋. 一种通讯过程中末端设备切换的安全认证方案. 计算机工程与设计[J]. 2005, 26(7): 1915-1917, http://lib.cqvip.com/Qikan/Article/Detail?id=18010484.[19] 欧海文, 叶顶锋, 杨君辉, 戴宗铎. 关于同时基于因子分解与离散对数问题的签名体制. 通信学报[J]. 2004, 25(10): 143-147, http://lib.cqvip.com/Qikan/Article/Detail?id=10757048.[20] 叶顶锋, 孙林红, 吕述望, 冯登固. 序列密码的复合攻击法. 电子与信息学报[J]. 2004, 26(1): 72-76, http://lib.cqvip.com/Qikan/Article/Detail?id=9081369.[21] 孙林红, 叶顶锋, 吕述望, 冯登国. 传输层安全协议的安全性分析及改进. 软件学报[J]. 2003, 14(3): 518-523, http://lib.cqvip.com/Qikan/Article/Detail?id=7473477.[22] 欧海文, 叶顶锋, 郑秀林. 关于两个门限RSA密码体制的注记. 北京电子科技学院学报[J]. 2003, 11(1): 8-12, http://lib.cqvip.com/Qikan/Article/Detail?id=15967760.[23] 孙林红, 叶顶锋, 吕述望. 前馈网络的信息泄漏. 通信学报[J]. 2002, 23(8): 19-23, http://lib.cqvip.com/Qikan/Article/Detail?id=6708050.[24] 孙林红, 叶顶锋, 吕述望. 广义择多逻辑. 中国科学院研究生院学报[J]. 2002, 19(1): 86-90, http://lib.cqvip.com/Qikan/Article/Detail?id=6301753.[25] 冯登国, 孙林红, 叶顶锋. 无线PKI体系的设计. 中国科学院研究生院学报[J]. 2002, 19(3): 223-228, http://lib.cqvip.com/Qikan/Article/Detail?id=6824167.[26] 戴宗铎, 叶顶锋, 王平, 方根溪. Galois环导出p元序列中元素组的分布及其渐近均匀性. 通信学报[J]. 2002, 23(5): 39-44, http://lib.cqvip.com/Qikan/Article/Detail?id=6308290.[27] 孙林红, 叶顶锋, 吕述望. 多重线性密码分析的改进. 通信学报[J]. 2002, 23(5): 83-88, http://lib.cqvip.com/Qikan/Article/Detail?id=6308297.[28] 孙林红, 叶顶锋, 吕述望. 前馈网络的信息泄漏. 中国科学院研究生院学报[J]. 2001, 18(2): 130-, http://lib.cqvip.com/Qikan/Article/Detail?id=5734315.[29] 叶顶锋, 戴宗铎. 两个符号替换下Fq上周期序列线性复杂度的计算. 中国科学院研究生院学报[J]. 2000, 17(2): 9-, http://lib.cqvip.com/Qikan/Article/Detail?id=4822754.[30] 戴宗铎, 叶顶锋. 非线性有限自动机的代数理论——兼谈FAPKC3公钥密码体制. 信息安全与通信保密[J]. 1996, 45-51, http://lib.cqvip.com/Qikan/Article/Detail?id=3001181309.