Wen Gao

Orcid: 0000-0001-9923-068X

Affiliations:
  • Xi'an University of Posts and Telecommunications, School of Cyberspace Security, China
  • Shaanxi University of Science and Technology, College of Electrical and Information Engineering, Xi'an, China (former)
  • Xidian University, Xi'an, China (PhD 2017)


According to our database1, Wen Gao authored at least 14 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Meet-in-the-middle attacks on AES with value constraints.
Des. Codes Cryptogr., September, 2024

Lattice-Based Threshold, Accountable, and Private Signature.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

2023
New Meet-in-the-Middle Attacks on FOX Block Cipher.
Comput. J., May, 2023

2021
Novel efficient identity-based signature on lattices.
Frontiers Inf. Technol. Electron. Eng., 2021

Lattice-based revocable attribute-based encryption with decryption key exposure resistance.
IET Inf. Secur., 2021

Secure Privacy-Preserving Association Rule Mining With Single Cloud Server.
IEEE Access, 2021

2019
Lattice-based Threshold Ring Signature with Message Block Sharing.
KSII Trans. Internet Inf. Syst., 2019

Lattice-based deniable ring signatures.
Int. J. Inf. Sec., 2019

2018
Neural-Network Aided Dynamic Control for Delivering Media Streams in Selfish Wireless Networks With Unknown Node-Selfishness.
IEEE Access, 2018

2017
Improved identification protocol in the quantum random oracle model..
Int. Arab J. Inf. Technol., 2017

2016
Efficient identity-based signature over NTRU lattice.
Frontiers Inf. Technol. Electron. Eng., 2016

Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices.
KSII Trans. Internet Inf. Syst., 2016

Efficient Certificateless Signature Scheme on NTRU Lattice.
KSII Trans. Internet Inf. Syst., 2016

Identity-Based Blind Signature from Lattices in Standard Model.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016


  Loading...