default search action
Baodian Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei, Yusong Du:
Self-Bilinear Map from One Way Encoding System and i𝒪. Inf. 15(1): 54 (2024) - [c26]Xiangping Zheng, Qianfan Wang, Baodian Wei, Xiao Ma:
Quasi-OSD of Binary Image of RS Codes with Applications to JSCC. ISIT 2024: 3576-3581 - 2023
- [c25]Qianfan Wang, Yanzhi Chen, Jifan Liang, Baodian Wei, Xiao Ma:
A New Joint Source-Channel Coding in the Short Blocklength Regime. GLOBECOM (Workshops) 2023: 1566-1571 - [c24]Jifan Liang, Tingting Zhu, Baodian Wei, Xiao Ma:
A New JSCC Scheme for Transmission of Gaussian Sources Over AWGN Channels. ICCC 2023: 1-6 - 2022
- [j24]Yusong Du, Baoying Fan, Baodian Wei:
An improved exact sampling algorithm for the standard normal distribution. Comput. Stat. 37(2): 721-737 (2022) - [j23]Yusong Du, Baoying Fan, Baodian Wei:
A constant-time sampling algorithm for binary Gaussian distribution over the integers. Inf. Process. Lett. 176: 106246 (2022) - [c23]Haowei Chen, Xinyuanmeng Yao, Baodian Wei, Xiao Ma:
Transmission of CRC Bits with Rotated Polar Coded Signals. ICCC 2022: 173-178 - 2021
- [j22]Junjie Li, Suihua Cai, Wenchao Lin, Baodian Wei, Xiao Ma:
Improved Block Oriented Unit Memory Convolutional Codes. IEEE Trans. Commun. 69(12): 7934-7944 (2021) - [j21]Suihua Cai, Wenchao Lin, Xinyuanmeng Yao, Baodian Wei, Xiao Ma:
Systematic Convolutional Low Density Generator Matrix Code. IEEE Trans. Inf. Theory 67(6): 3752-3764 (2021) - [c22]Suihua Cai, Haowei Chen, Baodian Wei, Xiao Ma:
Dual Coupled Polar Codes with Successive Cancellation List Decoding. ISIT 2021: 2375-2380 - 2020
- [j20]Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Implementing confidential transactions with lattice techniques. IET Inf. Secur. 14(1): 30-38 (2020) - [c21]Yusong Du, Baoying Fan, Baodian Wei:
Arbitrary-Centered Discrete Gaussian Sampling over the Integers. ACISP 2020: 391-407 - [c20]Yekeng Huang, Meiying Ji, Jiachen Sun, Baodian Wei, Xiao Ma:
An Unequal Coding Scheme for H.265 Video Transmission. WCNC 2020: 1-6 - [i10]Suihua Cai, Wenchao Lin, Xinyuanmeng Yao, Baodian Wei, Xiao Ma:
Systematic Convolutional Low Density Generator Matrix Code. CoRR abs/2001.02854 (2020) - [i9]Yusong Du, Baoying Fan, Baodian Wei:
An Improved Exact Sampling Algorithm for the Standard Normal Distribution. CoRR abs/2008.03855 (2020)
2010 – 2019
- 2019
- [j19]Yusong Du, Baodian Wei, Huang Zhang:
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers. Sci. China Inf. Sci. 62(3): 39103:1-39103:3 (2019) - [j18]Dalong Zhang, Liming Zheng, Qixiao Chen, Baodian Wei, Xiao Ma:
A Power Allocation-Based Overlapping Transmission Scheme in Internet of Vehicles. IEEE Internet Things J. 6(1): 50-59 (2019) - [c19]Xiao Ma, Wenchao Lin, Suihua Cai, Baodian Wei:
Statistical Learning Aided Decoding of BMST Tail-Biting Convolutional Code. ISIT 2019: 1352-1356 - [i8]Xiao Ma, Wenchao Lin, Suihua Cai, Baodian Wei:
Statistical Learning Aided Decoding of BMST of Tail-Biting Convolutional Code. CoRR abs/1902.09808 (2019) - [i7]Wenchao Lin, Xiao Ma, Suihua Cai, Baodian Wei:
Statistical Learning Aided List Decoding of Semi-Random Block Oriented Convolutional Codes. CoRR abs/1905.11392 (2019) - 2018
- [c18]Wenchao Lin, Suihua Cai, Jiachen Sun, Xiao Ma, Baodian Wei:
A Low Latency Coding Scheme: Semi-Random Block Oriented Convolutional Code. ISTC 2018: 1-5 - [c17]Wenchao Lin, Suihua Cai, Baodian Wei, Xiao Ma:
Coding Theorem for Systematic LDGM Codes Under List Decoding. ITW 2018: 1-5 - 2017
- [j17]Haibo Tian, Yu-Feng Ma, Baodian Wei:
Proxy re-designated verifier signature and its applications. Int. J. Embed. Syst. 9(6): 535-547 (2017) - [c16]Xijuan Wu, Baodian Wei, Haibo Tian, Yusong Du, Xiao Ma:
Fair Electronic Voting via Bitcoin Deposits. GSKI (2) 2017: 650-661 - [i6]Yusong Du, Baodian Wei:
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers. IACR Cryptol. ePrint Arch. 2017: 988 (2017) - 2016
- [j16]Yu-Feng Ma, Haibo Tian, Baodian Wei:
Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability. J. Inf. Sci. Eng. 32(5): 1205-1218 (2016) - [j15]Haibo Tian, Fangguo Zhang, Baodian Wei:
A lattice-based partially blind signature. Secur. Commun. Networks 9(12): 1820-1828 (2016) - [c15]Yusong Du, Baodian Wei:
On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks. ICISC 2016: 304-316 - 2015
- [i5]Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the (Fast) Algebraic Immunity of Boolean Power Functions. IACR Cryptol. ePrint Arch. 2015: 435 (2015) - [i4]Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2015: 436 (2015) - [i3]Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2015: 747 (2015) - 2014
- [c14]Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao:
Identity Based Threshold Ring Signature from Lattices. NSS 2014: 233-245 - 2013
- [j14]Haibo Tian, Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Selectively unforgeable but existentially forgeable signature schemes and applications. Sci. China Inf. Sci. 56(1): 1-14 (2013) - [j13]Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei:
A systematic method to design strong designated verifier signature without random oracles. Clust. Comput. 16(4): 817-827 (2013) - [j12]Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu:
Security Analysis of a Suite of Deniable Authentication Protocols. Int. J. Netw. Secur. 15(5): 384-389 (2013) - [j11]Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5-6): 1289-1300 (2013) - 2012
- [c13]Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability. IMIS 2012: 81-88 - [c12]Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei:
A Non-delegatable Strong Designated Verifier Signature without Random Oracles. INCoS 2012: 237-244 - [c11]Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian:
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. INCoS 2012: 377-384 - [c10]Chong-zhi Gao, Dongqing Xie, Baodian Wei:
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. ISPEC 2012: 46-62 - 2011
- [j10]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. Comput. Electr. Eng. 37(4): 614-623 (2011) - [j9]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - 2010
- [j8]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
Efficient Online/Offline Signcryption Scheme. Intell. Autom. Soft Comput. 16(3): 449-459 (2010)
2000 – 2009
- 2009
- [j7]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach. Concurr. Comput. Pract. Exp. 21(10): 1351-1372 (2009) - [j6]Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu:
Identity-based Universal Designated Verifier Signature Proof System. Int. J. Netw. Secur. 8(1): 52-58 (2009) - [c9]Huayin Ou, Baodian Wei:
Multi-Factor Rebalanced RSA-CRT Encryption Schemes. BMEI 2009: 1-5 - [c8]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-Line/Off-Line Signatures. CT-RSA 2009: 148-163 - [i2]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems. IACR Cryptol. ePrint Arch. 2009: 35 (2009) - 2008
- [j5]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
A New Type of Designated Confirmer Signatures for a Group of Individuals. Int. J. Netw. Secur. 7(2): 293-300 (2008) - [j4]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) - [c7]Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Efficient designated confirmer signature from bilinear pairings. AsiaCCS 2008: 363-368 - [i1]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-line/Off-line Signatures. IACR Cryptol. ePrint Arch. 2008: 447 (2008) - 2007
- [c6]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
Society-oriented Designated Confirmer Signatures. ICNC (5) 2007: 707-712 - [c5]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
ID-based Ring Proxy Signatures. ISIT 2007: 1031-1035 - 2005
- [j3]Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:
Cryptanalysis of Rijndael S-box and improvement. Appl. Math. Comput. 170(2): 958-975 (2005) - [j2]Xiaofeng Chen, Fangguo Zhang, Baodian Wei:
Comment on the Public Key Substitution Attacks. Int. J. Netw. Secur. 1(3): 168-172 (2005) - [c4]Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:
An AES S-Box to Increase Complexity and Cryptographic Analysis. AINA 2005: 724-728 - 2004
- [c3]Jingmei Liu, Baodian Wei, Xinmei Wang:
New method to determine algebraic expression of Rijndael S-box. InfoSecu 2004: 181-185 - 2003
- [c2]Baodian Wei, Dongsu Liu, Xinmei Wang:
Activity Attack on Rijndael . AINA 2003: 803-806 - 2002
- [j1]Baodian Wei, Dongsu Liu, Xinmei Wang:
Analysis of AES S-box with Walsh Spectrum. Informatica (Slovenia) 26(3) (2002) - [c1]Baodian Wei, Dongsu Liu, Xinmei Wang:
The General Autocorrelation and Its Application. CW 2002: 267-276
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 18:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint