Dingyi Pei profile picture

Dingyi Pei

Is this your author profile? Create an account to customize it!

Stand Alone

Information Security And Cryptology Third Sklois Conference Inscrypt 2007 Xining China August 31 September 5 2007 Revised Selected Papers
Chinese Remainder Theorem Applications in Computing, Coding, Cryptography
Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography
Authentication Codes and Combinatorial Designs
Authentication Codes And Combinatorial Designs. Discrete Mathematics And Its Applications
Authentication Codes and Combinatorial Designs (Discrete Mathematics and Its Applications)
Authentication Codes and Combinatorial Designs
Authentication Codes and Combinatorial Designs
Authentication Codes and Combinatorial Designs
Advances in Cryptology — ASIACRYPT’98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18–22, 1998, Proceedings
Advances in Cryptology — ASIACRYPT’98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18–22, 1998, Proceedings
Modular Forms with Integral and Half-integral Weights
Advances in Cryptology ― ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, ... (Lecture Notes in Computer Science, 1514)
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Dingyi Pei — Books & Biography | Menrva Books | MenrvaBooks