Baodian Wei

According to our database1, Baodian Wei authored at least 56 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Self-Bilinear Map from One Way Encoding System and i𝒪.
Inf., 2024

2023
A New JSCC Scheme for Transmission of Gaussian Sources Over AWGN Channels.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

A New Joint Source-Channel Coding in the Short Blocklength Regime.
Proceedings of the IEEE Globecom Workshops 2023, 2023

2022
A constant-time sampling algorithm for binary Gaussian distribution over the integers.
Inf. Process. Lett., 2022

An improved exact sampling algorithm for the standard normal distribution.
Comput. Stat., 2022

Transmission of CRC Bits with Rotated Polar Coded Signals.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

2021
Systematic Convolutional Low Density Generator Matrix Code.
IEEE Trans. Inf. Theory, 2021

Improved Block Oriented Unit Memory Convolutional Codes.
IEEE Trans. Commun., 2021

Dual Coupled Polar Codes with Successive Cancellation List Decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Implementing confidential transactions with lattice techniques.
IET Inf. Secur., 2020

An Unequal Coding Scheme for H.265 Video Transmission.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Arbitrary-Centered Discrete Gaussian Sampling over the Integers.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
A Power Allocation-Based Overlapping Transmission Scheme in Internet of Vehicles.
IEEE Internet Things J., 2019

Statistical Learning Aided List Decoding of Semi-Random Block Oriented Convolutional Codes.
CoRR, 2019

A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers.
Sci. China Inf. Sci., 2019

Statistical Learning Aided Decoding of BMST Tail-Biting Convolutional Code.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Coding Theorem for Systematic LDGM Codes Under List Decoding.
Proceedings of the IEEE Information Theory Workshop, 2018

A Low Latency Coding Scheme: Semi-Random Block Oriented Convolutional Code.
Proceedings of the 10th IEEE International Symposium on Turbo Codes & Iterative Information Processing, 2018

2017
Proxy re-designated verifier signature and its applications.
Int. J. Embed. Syst., 2017

On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers.
IACR Cryptol. ePrint Arch., 2017

Fair Electronic Voting via Bitcoin Deposits.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
A lattice-based partially blind signature.
Secur. Commun. Networks, 2016

Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.
J. Inf. Sci. Eng., 2016

On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2015

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2015

On the (Fast) Algebraic Immunity of Boolean Power Functions.
IACR Cryptol. ePrint Arch., 2015

2014
Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013

Security Analysis of a Suite of Deniable Authentication Protocols.
Int. J. Netw. Secur., 2013

A systematic method to design strong designated verifier signature without random oracles.
Clust. Comput., 2013

Selectively unforgeable but existentially forgeable signature schemes and applications.
Sci. China Inf. Sci., 2013

2012
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Information Security Practice and Experience, 2012

A Non-delegatable Strong Designated Verifier Signature without Random Oracles.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

Discrete logarithm based chameleon hashing and signatures without key exposure.
Comput. Electr. Eng., 2011

2010
Efficient Online/Offline Signcryption Scheme.
Intell. Autom. Soft Comput., 2010

2009
Identity-based Universal Designated Verifier Signature Proof System.
Int. J. Netw. Secur., 2009

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptol. ePrint Arch., 2009

How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurr. Comput. Pract. Exp., 2009

Multi-Factor Rebalanced RSA-CRT Encryption Schemes.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New Type of Designated Confirmer Signatures for a Group of Individuals.
Int. J. Netw. Secur., 2008

Divisible On-line/Off-line Signatures.
IACR Cryptol. ePrint Arch., 2008

Efficient designated confirmer signature from bilinear pairings.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
ID-based Ring Proxy Signatures.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Society-oriented Designated Confirmer Signatures.
Proceedings of the Third International Conference on Natural Computation, 2007

2005
Comment on the Public Key Substitution Attacks.
Int. J. Netw. Secur., 2005

Cryptanalysis of Rijndael S-box and improvement.
Appl. Math. Comput., 2005

An AES S-Box to Increase Complexity and Cryptographic Analysis.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
New method to determine algebraic expression of Rijndael S-box.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Activity Attack on Rijndael .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Analysis of AES S-box with Walsh Spectrum.
Informatica (Slovenia), 2002

The General Autocorrelation and Its Application.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002


  Loading...