Current location - Education and Training Encyclopedia - Graduation thesis - Ding Yong's research paper.
Ding Yong's research paper.
1 Ding Yong, Huang Guohe, Wang Yumin, "w-NNAF Method for Effective Calculation of Scalar Multiplication in Elliptic Curve Cryptosystem" Applied Mathematics and Computation Vol. 167,No. 1, pp. 8 1-93. (SCI index).

2 Ding Yong, Gui Feng, High-speed modular division of GF(2m) based on GCD algorithm, Journal of Communication, Vol. 29,No. 10, June 2008,No. 199-204. (EI retrieval).

No.3 Ding Yong, Li Yahui. "Integration of Signature Encryption and Key Exchange", Proceedings of the International Conference on Computing Intelligence and Security, Volume 2, Suzhou, China, 20081February, pp. 299-302. (EI search)

4 Ding Yong, Key Management Scheme for Sensor Networks Based on Elliptic Curve Cryptography, Journal of xidian university, 35 (4), August 2008, pp. 739-742. (EI retrieval)

5 Ding Yong, tamper-proof technology of passive storage data, ISECS'08, Guangzhou, China, August 2008, pp. 439-442. (EI search)

6 Ding Yong, Tian Haibo, Wang Yumin, "An Authenticated Group Key Agreement Protocol Based on DLE Protocol-EAGKA", Journal of xidian university, 3 1, No.6, 2004, 9 15-9 18 (EI retrieval).

7 Ding Yong, Tian Haibo, Wang Yumin, "An Improvement of Digital Signature System Based on Braids", Journal of xidian university, No.33, 2006, 1, 50-52 (EI retrieval).

8 Ding Yong, Li Xingguo, Wang Yumin, "Research on Fast Algorithm of Scalar Multiplication on Koblitz Curve", Journal of Northwest University, 35, No.6, 2005, 699-702.

9 Ding Yong, Hong Yinfang, Combination of joint sparse form and Frobenius mapping in scalar multiplication of elliptic curves on GF(2mn), 2009 First International Symposium on Database Technology and Application, Wuhan, China, April 2009, pp.707-7 10 (EI retrieval source).

10 Ding Yong, Huang Guohe, Wang Yumin, "Joint Sparse Form of Koblitz Curve Window 3", International Journal of Cyber Security, Vol.2, No.2, 2006, pp. 126- 130.

1 1 Ding Yong. General algorithm of integer k decomposition with endomorphism. ICICS'07, Proceedings of the 9th International Conference on Information and Communication Security,1February 12-17, Zhengzhou, China, pp.12-12.

Ding Yong, 13, -NAFw decomposition of scalar multiplication of elliptic curve cryptosystem, computer engineering, vol. 35, No.8, April 2000, 169- 170, 173.

14 Tian Haibo, Wang Yumin, "Research on Computational Reliability of Formal Attacker Capability Description", Journal of xidian university, Vol.23, No.5, 2006, pp.800-803,823 (EI included \ \ \ \).

15 Zhang Weiguo, Ding Yong, Zhang Ning, Xiao Guozhen. A feature of algebraic immune boolean function. Journal of Beijing University of Posts and Telecommunications. 2007,30 (5): 55-57。 (EI search)

Ding Yong Xiao Guo Zhang Weiguo 16. On distributable boolean functions. Journal of China Electronics, 17, No.2, 2008, 199-204. (SCI search)

17 Zhang Weiguo, Ding Yong, Xiao Guozhen. Constructing new high primitive function from old plateau function. High-tech Newsletter, Volume 14, No.2, 2008, Page 180- 182. (EI search)