default search action
Wansu Bao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Chen-Peng Hao, Yang Liu, Yang Wang, Chun Zhou, Yan-Yang Zhou, Wansu Bao, Hong-Wei Li:
Improving the security of quantum key distribution with multi-step advantage distillation. Quantum Inf. Process. 23(4): 148 (2024) - 2022
- [j12]Yang Wang, Ge-Hai Du, Yang-Bin Xu, Chun Zhou, Mu-Sheng Jiang, Hong-Wei Li, Wansu Bao:
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction. Entropy 24(4): 460 (2022) - [j11]Xiao-Lei Jiang, Yang Wang, Yi-Fei Lu, Jia-Ji Li, Chun Zhou, Wansu Bao:
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness. Entropy 24(10): 1339 (2022) - [i12]Yun-Fei Niu, Shuo Zhang, Chen Ding, Wansu Bao, He-Liang Huang:
Parameter-Parallel Distributed Variational Quantum Algorithm. CoRR abs/2208.00450 (2022) - [i11]Chen Ding, Xiao-Yue Xu, Yun-Fei Niu, Shuo Zhang, Wansu Bao, He-Liang Huang:
Active Learning on a Programmable Photonic Quantum Processor. CoRR abs/2208.02104 (2022) - [i10]He-Liang Huang, Xiao-Yue Xu, Chu Guo, Guojing Tian, Shi-Jie Wei, Xiaoming Sun, Wansu Bao, Gui-Lu Long:
Near-Term Quantum Computing Techniques: Variational Quantum Algorithms, Error Mitigation, Circuit Compilation, Benchmarking and Classical Simulation. CoRR abs/2211.08737 (2022) - 2021
- [j10]Xiaoxu Zhang, Yang Wang, Mu-Sheng Jiang, Yi-Fei Lu, Hongwei Li, Chun Zhou, Wansu Bao:
Phase-Matching Quantum Key Distribution with Discrete Phase Randomization. Entropy 23(5): 508 (2021) - [j9]Yi-Fei Lu, Yang Wang, Mu-Sheng Jiang, Xiao-Xu Zhang, Fan Liu, Hong-Wei Li, Chun Zhou, Shi-Biao Tang, Jia-Yong Wang, Wansu Bao:
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources. Entropy 23(9): 1103 (2021) - [j8]Yi-Fei Lu, Yang Wang, Mu-Sheng Jiang, Fan Liu, Xiao-Xu Zhang, Wansu Bao:
Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations. Quantum Inf. Process. 20(4): 135 (2021)
2010 – 2019
- 2017
- [j7]Heliang Huang, Wansu Bao, Tan Li, Feng-Guang Li, Xiangqun Fu, Shuo Zhang, Hailong Zhang, Xiang Wang:
Universal blind quantum computation for hybrid system. Quantum Inf. Process. 16(8): 199 (2017) - 2016
- [j6]Hongxin Ma, Peng Huang, Wansu Bao, Guihua Zeng:
Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf. Process. 15(6): 2605-2620 (2016) - [i9]Xiangqun Fu, Wansu Bao, Jianhong Shi, Xiang Wang:
t-multiple discrete logarithm problem and solving difficulty. CoRR abs/1605.04870 (2016) - [i8]Heliang Huang, You-Wei Zhao, Tan Li, Feng-Guang Li, Yu-Tao Du, Xiangqun Fu, Shuo Zhang, Xiang Wang, Wansu Bao:
Homomorphic Encryption Experiments on IBM's Cloud Quantum Computing Platform. CoRR abs/1612.02886 (2016) - 2015
- [i7]Wansu Bao, Heliang Huang:
Middle-Solving Grobner bases algorithm for cryptanalysis over finite fields. CoRR abs/1507.03480 (2015) - [i6]Heliang Huang, Wansu Bao:
Algorithm for Solving Massively Underdefined Systems of Multivariate Quadratic Equations over Finite Fields. CoRR abs/1507.03674 (2015) - 2014
- [j5]Chun Zhou, Wansu Bao, Hong-Wei Li, Yang Wang, Xiangqun Fu:
Key-leakage evaluation of authentication in quantum key distribution with finite resources. Quantum Inf. Process. 13(4): 935-955 (2014) - [j4]Heliang Huang, Wansu Bao, Shukai Liu:
Parallel Gaussian elimination for XL family over GF(2). Secur. Commun. Networks 7(3): 503-510 (2014) - [i5]Xiangqun Fu, Wansu Bao, Jianhong Shi, Fada Li, Yuchao Zhang:
Parameter security characterization of knapsack public-key crypto under quantum computing. CoRR abs/1402.7032 (2014) - 2013
- [i4]Fada Li, Wansu Bao, Xiangqun Fu, Yuchao Zhang, Tan Li:
A subexponential-time quantum algorithm for LWE problem. CoRR abs/1305.3769 (2013) - [i3]Heliang Huang, Wansu Bao:
Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2). CoRR abs/1310.2332 (2013) - 2011
- [j3]Hong-Wei Li, Zheng-Qiang Yin, Shuang Wang, Wansu Bao, Guang-Can Guo, Zheng-Fu Han:
Security of quantum key distribution with state-dependent imperfections. Quantum Inf. Comput. 11(11-12): 937-947 (2011) - 2010
- [j2]Chun Zhou, Wansu Bao, Xiangqun Fu:
Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations. Sci. China Inf. Sci. 53(12): 2485-2494 (2010) - [j1]Hong-Wei Li, Zheng-Qiang Yin, Zheng-Fu Han, Wansu Bao, Guang-Can Guo:
Security of practical phase-coding quantum key distribution. Quantum Inf. Comput. 10(9&10): 771-779 (2010) - [c3]Xiangqun Fu, Wansu Bao, Chun Zhou:
Design and Implementation of Quantum Factorization Algorithm. IITSI 2010: 748-752 - [c2]Li Tian, Wansu Bao:
A Medium Field Multivariate Public Key Signature Scheme with External Perturbation. IITSI 2010: 753-757
2000 – 2009
- 2009
- [i2]Yun Wei, Guo-Hua Xiong, Xing-Kai Zhang, Wansu Bao:
Security Analysis and Design of Proxy Signature Schemes over Braid Groups. IACR Cryptol. ePrint Arch. 2009: 458 (2009) - [i1]Yun Wei, Guo-Hua Xiong, Wansu Bao, Xing-Kai Zhang:
A Strong Blind Signature Scheme over Braid Groups. IACR Cryptol. ePrint Arch. 2009: 622 (2009) - 2008
- [c1]Wansu Bao, Yun Wei:
A Forward Secure Ring Signature Scheme. IIH-MSP 2008: 215-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint