Baodian Wei

According to our database1, Baodian Wei authored at least 41 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Power Allocation-Based Overlapping Transmission Scheme in Internet of Vehicles.
IEEE Internet of Things Journal, 2019

A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers.
SCIENCE CHINA Information Sciences, 2019

2018
Coding Theorem for Systematic LDGM Codes Under List Decoding.
Proceedings of the IEEE Information Theory Workshop, 2018

A Low Latency Coding Scheme: Semi-Random Block Oriented Convolutional Code.
Proceedings of the 10th IEEE International Symposium on Turbo Codes & Iterative Information Processing, 2018

2017
Proxy re-designated verifier signature and its applications.
IJES, 2017

On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers.
IACR Cryptology ePrint Archive, 2017

Fair Electronic Voting via Bitcoin Deposits.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
A lattice-based partially blind signature.
Security and Communication Networks, 2016

Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.
J. Inf. Sci. Eng., 2016

On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation.
IACR Cryptology ePrint Archive, 2015

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks.
IACR Cryptology ePrint Archive, 2015

On the (Fast) Algebraic Immunity of Boolean Power Functions.
IACR Cryptology ePrint Archive, 2015

2014
Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Mathematical and Computer Modelling, 2013

Security Analysis of a Suite of Deniable Authentication Protocols.
I. J. Network Security, 2013

A systematic method to design strong designated verifier signature without random oracles.
Cluster Computing, 2013

Selectively unforgeable but existentially forgeable signature schemes and applications.
SCIENCE CHINA Information Sciences, 2013

2012
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Information Security Practice and Experience, 2012

A Non-delegatable Strong Designated Verifier Signature without Random Oracles.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

Discrete logarithm based chameleon hashing and signatures without key exposure.
Computers & Electrical Engineering, 2011

2010
Efficient Online/Offline Signcryption Scheme.
Intelligent Automation & Soft Computing, 2010

2009
Identity-based Universal Designated Verifier Signature Proof System.
I. J. Network Security, 2009

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptology ePrint Archive, 2009

How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurrency and Computation: Practice and Experience, 2009

Divisible On-Line/Off-Line Signatures.
Proceedings of the Topics in Cryptology, 2009

Multi-Factor Rebalanced RSA-CRT Encryption Schemes.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New Type of Designated Confirmer Signatures for a Group of Individuals.
I. J. Network Security, 2008

Efficient designated confirmer signature from bilinear pairings.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
ID-based Ring Proxy Signatures.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Society-oriented Designated Confirmer Signatures.
Proceedings of the Third International Conference on Natural Computation, 2007

2005
Comment on the Public Key Substitution Attacks.
I. J. Network Security, 2005

Cryptanalysis of Rijndael S-box and improvement.
Applied Mathematics and Computation, 2005

An AES S-Box to Increase Complexity and Cryptographic Analysis.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2003
Activity Attack on Rijndael .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Analysis of AES S-box with Walsh Spectrum.
Informatica (Slovenia), 2002

The General Autocorrelation and Its Application.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002


  Loading...