Wansu Bao

According to our database1, Wansu Bao authored at least 27 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
Entropy, 2022

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness.
Entropy, 2022

Near-Term Quantum Computing Techniques: Variational Quantum Algorithms, Error Mitigation, Circuit Compilation, Benchmarking and Classical Simulation.
CoRR, 2022

Active Learning on a Programmable Photonic Quantum Processor.
CoRR, 2022

Parameter-Parallel Distributed Variational Quantum Algorithm.
CoRR, 2022

2021
Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations.
Quantum Inf. Process., 2021

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization.
Entropy, 2021

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources.
Entropy, 2021

2017
Universal blind quantum computation for hybrid system.
Quantum Inf. Process., 2017

2016
Continuous-variable quantum identity authentication based on quantum teleportation.
Quantum Inf. Process., 2016

Homomorphic Encryption Experiments on IBM's Cloud Quantum Computing Platform.
CoRR, 2016

t-multiple discrete logarithm problem and solving difficulty.
CoRR, 2016

2015
Algorithm for Solving Massively Underdefined Systems of Multivariate Quadratic Equations over Finite Fields.
CoRR, 2015

Middle-Solving Grobner bases algorithm for cryptanalysis over finite fields.
CoRR, 2015

2014
Parallel Gaussian elimination for XL family over GF(2).
Secur. Commun. Networks, 2014

Key-leakage evaluation of authentication in quantum key distribution with finite resources.
Quantum Inf. Process., 2014

Parameter security characterization of knapsack public-key crypto under quantum computing.
CoRR, 2014

2013
A subexponential-time quantum algorithm for LWE problem
CoRR, 2013

Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2).
CoRR, 2013

2011
Security of quantum key distribution with state-dependent imperfections.
Quantum Inf. Comput., 2011

2010
Security of practical phase-coding quantum key distribution.
Quantum Inf. Comput., 2010

Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations.
Sci. China Inf. Sci., 2010

A Medium Field Multivariate Public Key Signature Scheme with External Perturbation.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Design and Implementation of Quantum Factorization Algorithm.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

2009
Security Analysis and Design of Proxy Signature Schemes over Braid Groups.
IACR Cryptol. ePrint Arch., 2009

A Strong Blind Signature Scheme over Braid Groups.
IACR Cryptol. ePrint Arch., 2009

2008
A Forward Secure Ring Signature Scheme.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...