Search results for: Chao Li
Lecture Notes in Computer Science > Cryptology and Network Security > Algebraic and Number-Theoretic Schemes > 402-412
Lecture Notes in Computer Science > Information Security and Cryptology > Boolean Functions > 271-282
Lecture Notes in Computer Science > Information Security > Algebraic Attacks and Proxy Re-Encryption > 177-185
Lecture Notes in Computer Science > Information Security Applications > Applied Cryptography > 109-117
Science China Information Sciences > 2013 > 56 > 3 > 1-9
Mathematical and Computer Modelling > 2012 > 55 > 3-4 > 828-836
Applied Mathematics Letters > 2011 > 24 > 12 > 2093-2096
IEEE Transactions on Information Theory > 2008 > 54 > 3 > 1330 - 1334
Science China Information Sciences > 2008 > 51 > 2 > 120-127
IEEE Transactions on Information Theory > 2007 > 53 > 8 > 2908 - 2910