|
Search the dblp DataBase
Lihua Liu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. [Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:1-12 [Conf]
- Jianer Chen, Lihua Liu, Songqiao Chen, Weijia Jia
An Intuitive and Effective New Representation for Interconnection Network Structures. [Citation Graph (0, 0)][DBLP] ISAAC, 2000, pp:350-361 [Conf]
- Lihua Liu, Hao Shen
Explicit constructions of separating hash families from algebraic curves over finite fields. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:41, n:2, pp:221-233 [Journal]
- Lihua Liu, Zhengjun Cao
On computing ordN(2) and its application. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2006, v:204, n:7, pp:1173-1178 [Journal]
- Fang Zhao, Zhenyu Xuan, Lihua Liu, Michael Q. Zhang
TRED: a Transcriptional Regulatory Element Database and a platform for in silico gene regulation studies. [Citation Graph (0, 0)][DBLP] Nucleic Acids Research, 2005, v:33, n:Database-Issue, pp:103-107 [Journal]
- Jianer Chen, Lihua Liu, Weijia Jia
Improvement on vertex cover for low-degree graphs. [Citation Graph (0, 0)][DBLP] Networks, 2000, v:35, n:4, pp:253-259 [Journal]
- Zhengjun Cao, Lihua Liu
Boudot's Range-Bounded Commitment Scheme Revisited. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:230-238 [Conf]
A General Attack against Several Group Signatures. [Citation Graph (, )][DBLP]
Analysis of Two Signature Schemes from CIS'2006. [Citation Graph (, )][DBLP]
A Strong RSA Signature Scheme and Its Application. [Citation Graph (, )][DBLP]
A Group Key Agreement Scheme Revisited. [Citation Graph (, )][DBLP]
Generalized Greedy Algorithm for Shortest Superstring. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|