Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xuejia Lai
@article{DBLP:journals/tc/ZhangLWGHWS24, author = {Kai Zhang and Xuejia Lai and Lei Wang and Jie Guan and Bin Hu and Senpeng Wang and Tairong Shi}, title = {Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes}, journal = {{IEEE} Trans. Computers}, volume = {73}, number = {2}, pages = {613--620}, year = {2024}, url = {https://doi.org/10.1109/TC.2023.3315057}, doi = {10.1109/TC.2023.3315057}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/ZhangLWGHWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangLWGH23, author = {Kai Zhang and Xuejia Lai and Lei Wang and Jie Guan and Bin Hu}, title = {A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis}, journal = {Sci. China Inf. Sci.}, volume = {66}, number = {3}, year = {2023}, url = {https://doi.org/10.1007/s11432-022-3466-x}, doi = {10.1007/S11432-022-3466-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangLWGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangLWGHWS23, author = {Kai Zhang and Xuejia Lai and Lei Wang and Jie Guan and Bin Hu and Senpeng Wang and Tairong Shi}, title = {Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2845--2878}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01226-4}, doi = {10.1007/S10623-023-01226-4}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangLWGHWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangLGH23, author = {Kai Zhang and Xuejia Lai and Jie Guan and Bin Hu}, title = {Weak rotational property and its application}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3187--3214}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01241-5}, doi = {10.1007/S10623-023-01241-5}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangLGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/0026LG023, author = {Kai Zhang and Xuejia Lai and Jie Guan and Bin Hu}, title = {Selecting Rotation Constants on SIMON-Type Ciphers}, journal = {J. Database Manag.}, volume = {34}, number = {1}, pages = {1--23}, year = {2023}, url = {https://doi.org/10.4018/jdm.318452}, doi = {10.4018/JDM.318452}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/0026LG023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhangLWGHWS23, author = {Kai Zhang and Xuejia Lai and Lei Wang and Jie Guan and Bin Hu and Senpeng Wang and Tairong Shi}, title = {Rotational-XOR Differential Cryptanalysis and an Automatic Framework for {AND-RX} Ciphers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {2}, pages = {1282--1294}, year = {2023}, url = {https://doi.org/10.1109/TIT.2022.3218186}, doi = {10.1109/TIT.2022.3218186}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZhangLWGHWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/0026LG022, author = {Kai Zhang and Xuejia Lai and Jie Guan and Bin Hu}, title = {Research on the Security Level of {\(\mu\)}2 against Impossible Differential cryptanalysis}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {16}, number = {3}, pages = {972--985}, year = {2022}, url = {https://doi.org/10.3837/tiis.2022.03.012}, doi = {10.3837/TIIS.2022.03.012}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/0026LG022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZhangL22, author = {Kai Zhang and Xuejia Lai}, title = {Another Perspective on Automatic Construction of Integral Distinguishers for {ARX} Ciphers}, journal = {Symmetry}, volume = {14}, number = {3}, pages = {461}, year = {2022}, url = {https://doi.org/10.3390/sym14030461}, doi = {10.3390/SYM14030461}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ZhangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ShenYWL21, author = {Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai}, title = {Secure key-alternating Feistel ciphers without key schedule}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {1}, year = {2021}, url = {https://doi.org/10.1007/s11432-019-9938-0}, doi = {10.1007/S11432-019-9938-0}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ShenYWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/PangLLG21, author = {Siyu Pang and Tingting Lin and Xuejia Lai and Zheng Gong}, title = {A White-Box Implementation of {IDEA}}, journal = {Symmetry}, volume = {13}, number = {6}, pages = {1066}, year = {2021}, url = {https://doi.org/10.3390/sym13061066}, doi = {10.3390/SYM13061066}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/PangLLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YanWSL20, author = {Hailun Yan and Lei Wang and Yaobin Shen and Xuejia Lai}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Tweaking Key-Alternating Feistel Block Ciphers}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {69--88}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_4}, doi = {10.1007/978-3-030-57808-4\_4}, timestamp = {Sat, 12 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/YanWSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenYWL20, author = {Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai}, title = {Secure Key-Alternating Feistel Ciphers Without Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2020}, url = {https://eprint.iacr.org/2020/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenYWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YanLCL19, author = {Hailun Yan and Yiyuan Luo and Mo Chen and Xuejia Lai}, title = {New observation on the key schedule of {RECTANGLE}}, journal = {Sci. China Inf. Sci.}, volume = {62}, number = {3}, pages = {32108:1--32108:13}, year = {2019}, url = {https://doi.org/10.1007/s11432-018-9527-8}, doi = {10.1007/S11432-018-9527-8}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/YanLCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YanLWYX19, author = {Hailun Yan and Xuejia Lai and Lei Wang and Yu Yu and Yiran Xing}, title = {New zero-sum distinguishers on full 24-round Keccak-f using the division property}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {5}, pages = {469--478}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5263}, doi = {10.1049/IET-IFS.2018.5263}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YanLWYX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/XuXL19, author = {Zhichao Xu and Hong Xu and Xuejia Lai}, editor = {Zhe Liu and Moti Yung}, title = {Improved Integral Attack on Generalized Feistel Cipher}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {463--479}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_28}, doi = {10.1007/978-3-030-42921-8\_28}, timestamp = {Mon, 06 Apr 2020 19:10:55 +0200}, biburl = {https://dblp.org/rec/conf/cisc/XuXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isci/LinZLQ19, author = {Tingting Lin and Yixin Zhong and Xuejia Lai and Weidong Qiu}, editor = {Guojun Wang and Abdulmotaleb El{-}Saddik and Xuejia Lai and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kim{-}Kwang Raymond Choo}, title = {Software Tamper Resistance Based on White-Box {SMS4} Implementation}, booktitle = {Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1122}, pages = {486--495}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-1301-5\_38}, doi = {10.1007/978-981-15-1301-5\_38}, timestamp = {Tue, 28 Jan 2020 21:18:31 +0100}, biburl = {https://dblp.org/rec/conf/isci/LinZLQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isci/2019, editor = {Guojun Wang and Abdulmotaleb El{-}Saddik and Xuejia Lai and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kim{-}Kwang Raymond Choo}, title = {Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1122}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-1301-5}, doi = {10.1007/978-981-15-1301-5}, isbn = {978-981-15-1300-8}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isci/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinYLZJ18, author = {Tingting Lin and Hailun Yan and Xuejia Lai and Yixin Zhong and Yin Jia}, title = {Security Evaluation and Improvement of a White-Box {SMS4} Implementation Based on Affine Equivalence Algorithm}, journal = {Comput. J.}, volume = {61}, number = {12}, pages = {1783--1790}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy068}, doi = {10.1093/COMJNL/BXY068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LinYLZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csae/XingYL18, author = {Yiran Xing and Hailun Yan and Xuejia Lai}, editor = {Ali Emrouznejad and Zhihong Qian}, title = {New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation}, booktitle = {The 2nd International Conference on Computer Science and Application Engineering, {CSAE} 2018, Hohhot, China, October 22-24, 2018}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3207677.3278003}, doi = {10.1145/3207677.3278003}, timestamp = {Thu, 10 Jun 2021 16:50:33 +0200}, biburl = {https://dblp.org/rec/conf/csae/XingYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangCQLW17, author = {Huige Wang and Kefei Chen and Baodong Qin and Xuejia Lai and Yunhua Wen}, title = {A new construction on randomized message-locked encryption in the standard model via UCEs}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {52101}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-1037-2}, doi = {10.1007/S11432-015-1037-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangCQLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuoLZ17, author = {Yiyuan Luo and Xuejia Lai and Yujie Zhou}, title = {Generic attacks on the Lai-Massey scheme}, journal = {Des. Codes Cryptogr.}, volume = {83}, number = {2}, pages = {407--423}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0235-2}, doi = {10.1007/S10623-016-0235-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuoLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LinLXJ17, author = {Tingting Lin and Xuejia Lai and Weijia Xue and Yin Jia}, title = {A New Feistel-Type White-Box Encryption Scheme}, journal = {J. Comput. Sci. Technol.}, volume = {32}, number = {2}, pages = {386--395}, year = {2017}, url = {https://doi.org/10.1007/s11390-017-1727-x}, doi = {10.1007/S11390-017-1727-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LinLXJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuoL17, author = {Yiyuan Luo and Xuejia Lai}, title = {Improvements for Finding Impossible Differentials of Block Cipher Structures}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {5980251:1--5980251:9}, year = {2017}, url = {https://doi.org/10.1155/2017/5980251}, doi = {10.1155/2017/5980251}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL17, author = {Yiyuan Luo and Xuejia Lai}, title = {Improvements for Finding Impossible Differentials of Block Cipher Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2017}, url = {http://eprint.iacr.org/2017/1209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LinLXH16, author = {Tingting Lin and Xuejia Lai and Weijia Xue and Geshi Huang}, title = {Discussion on the theoretical results of white-box cryptography}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {11}, pages = {112101}, year = {2016}, url = {https://doi.org/10.1007/s11432-015-5474-8}, doi = {10.1007/S11432-015-5474-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LinLXH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XueLSXL16, author = {Weijia Xue and Tingting Lin and Xin Shun and Fenglei Xue and Xuejia Lai}, title = {On the estimation of the second largest eigenvalue of Markov ciphers}, journal = {Secur. Commun. Networks}, volume = {9}, number = {13}, pages = {2093--2099}, year = {2016}, url = {https://doi.org/10.1002/sec.1465}, doi = {10.1002/SEC.1465}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XueLSXL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuangYL16, author = {Jialin Huang and Hailun Yan and Xuejia Lai}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Transposition of {AES} Key Schedule}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {84--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_6}, doi = {10.1007/978-3-319-54705-3\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuangYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cits/JiaLL16, author = {Yin Jia and Tingting Lin and Xuejia Lai}, title = {A generic attack against white box implementation of block ciphers}, booktitle = {International Conference on Computer, Information and Telecommunication Systems, {CITS} 2016, Kunming, China, July 6-8, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CITS.2016.7546449}, doi = {10.1109/CITS.2016.7546449}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/cits/JiaLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangVLN16, author = {Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg}, title = {Capacity and Data Complexity in Multidimensional Linear Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2016}, url = {http://eprint.iacr.org/2016/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangVLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoLJ15, author = {Yiyuan Luo and Xuejia Lai and Tiejun Jia}, title = {Attacks on a double length blockcipher-based hash proposal}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {289--295}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0117-2}, doi = {10.1007/S12095-014-0117-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangHLLML15, author = {Huanguo Zhang and Wenbao Han and Xuejia Lai and Dongdai Lin and Jianfeng Ma and Jianhua Li}, title = {Survey on cyberspace security}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {11}, pages = {1--43}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5433-4}, doi = {10.1007/S11432-015-5433-4}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangHLLML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiLLC15, author = {Qiang Li and Xiangxue Li and Xuejia Lai and Kefei Chen}, title = {Optimal assignment schemes for general access structures based on linear programming}, journal = {Des. Codes Cryptogr.}, volume = {74}, number = {3}, pages = {623--644}, year = {2015}, url = {https://doi.org/10.1007/s10623-013-9879-3}, doi = {10.1007/S10623-013-9879-3}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/XuZL15, author = {Hong Xu and Yonghui Zheng and Xuejia Lai}, title = {Construction of perfect diffusion layers from linear feedback shift registers}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {2}, pages = {127--135}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2013.0411}, doi = {10.1049/IET-IFS.2013.0411}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/XuZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/XueL15, author = {Weijia Xue and Xuejia Lai}, title = {Impossible differential cryptanalysis of MARS-like structures}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {4}, pages = {219--222}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0183}, doi = {10.1049/IET-IFS.2014.0183}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/XueL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LuoLH15, author = {Yiyuan Luo and Xuejia Lai and Jing Hu}, title = {The Pseudorandomness of Many-Round Lai-Massey Scheme}, journal = {J. Inf. Sci. Eng.}, volume = {31}, number = {3}, pages = {1085--1096}, year = {2015}, url = {http://www.iis.sinica.edu.tw/page/jise/2015/201505\_17.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LuoLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinacom/JuLXML15, author = {Zhen Ju and Peiyuan Liu and Weijia Xue and Daoguang Mu and Xuejia Lai}, title = {On the equivalence of LBlock and {TWINE} in structure}, booktitle = {10th International Conference on Communications and Networking in China, ChinaCom 2015, Shanghai, China, August 15-17, 2015}, pages = {289--294}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CHINACOM.2015.7497953}, doi = {10.1109/CHINACOM.2015.7497953}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chinacom/JuLXML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuangVLN15, author = {Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Capacity and Data Complexity in Multidimensional Linear Attack}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {141--160}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_7}, doi = {10.1007/978-3-662-47989-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuangVLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XuJHL15, author = {Hong Xu and Ping Jia and Geshi Huang and Xuejia Lai}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {97--108}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_9}, doi = {10.1007/978-3-319-29814-6\_9}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/XuJHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuangL14, author = {Jialin Huang and Xuejia Lai}, title = {What is the effective key length for a block cipher: an attack on every practical block cipher}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {7}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.1007/s11432-014-5096-6}, doi = {10.1007/S11432-014-5096-6}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HuangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/FangL14, author = {Xiwen Fang and Xuejia Lai}, title = {DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {9}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.1007/s11432-014-5139-z}, doi = {10.1007/S11432-014-5139-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/FangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangL14, author = {Jialin Huang and Xuejia Lai}, title = {Revisiting key schedule's diffusion in relation with round function's diffusion}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {85--103}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9804-9}, doi = {10.1007/S10623-013-9804-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LuoLWG14, author = {Yiyuan Luo and Xuejia Lai and Zhongming Wu and Guang Gong}, title = {A unified method for finding impossible differentials of block cipher structures}, journal = {Inf. Sci.}, volume = {263}, pages = {211--220}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.08.051}, doi = {10.1016/J.INS.2013.08.051}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LuoLWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/DuanYSZL14, author = {Ming Duan and Mohan Yang and Xiaorui Sun and Bo Zhu and Xuejia Lai}, title = {Distinguishing properties and applications of higher order derivatives of Boolean functions}, journal = {Inf. Sci.}, volume = {271}, pages = {224--235}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.108}, doi = {10.1016/J.INS.2014.02.108}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/DuanYSZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/FangL14, author = {Xiwen Fang and Xuejia Lai}, editor = {Linqiang Pan and Gheorghe Paun and Mario J. P{\'{e}}rez{-}Jim{\'{e}}nez and Tao Song}, title = {DNA-Chip-Based Information Hiding Scheme}, booktitle = {Bio-Inspired Computing - Theories and Applications - 9th International Conference, {BIC-TA} 2014, Wuhan, China, October 16-19, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {472}, pages = {123--127}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45049-9\_20}, doi = {10.1007/978-3-662-45049-9\_20}, timestamp = {Wed, 17 May 2017 14:24:48 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/FangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/HuangVL14, author = {Jialin Huang and Serge Vaudenay and Xuejia Lai}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {On the Key Schedule of Lightweight Block Ciphers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {124--142}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_8}, doi = {10.1007/978-3-319-13039-2\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/HuangVL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuTL14, author = {Hong Xu and Lin Tan and Xuejia Lai}, editor = {Xinyi Huang and Jianying Zhou}, title = {On the Recursive Construction of {MDS} Matrices for Lightweight Cryptography}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {552--563}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_40}, doi = {10.1007/978-3-319-06320-1\_40}, timestamp = {Fri, 09 Apr 2021 18:45:22 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuTL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spac/LuoLY14, author = {Rui Luo and Xuejia Lai and Rong You}, title = {A new attempt of white-box {AES} implementation}, booktitle = {Proceedings {IEEE} International Conference on Security, Pattern Analysis, and Cybernetics, {SPAC} 2014, Wuhan, China, October 18-19, 2014}, pages = {423--429}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SPAC.2014.6982727}, doi = {10.1109/SPAC.2014.6982727}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/spac/LuoLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HuangL13, author = {Jialin Huang and Xuejia Lai}, title = {Chosen-plaintext linear attacks on Serpent}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {293--299}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0287}, doi = {10.1049/IET-IFS.2012.0287}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HuangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/LiuL13, author = {Chengbing Liu and Xuejia Lai}, title = {Evaluation of Statistical Tests for Randomness Using Conditional Entropy}, booktitle = {2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12, 2013}, pages = {504--509}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CyberC.2013.93}, doi = {10.1109/CYBERC.2013.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/LiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ibica/FangL13, author = {Xiwen Fang and Xuejia Lai}, editor = {Ajith Abraham and Pavel Kr{\"{o}}mer and V{\'{a}}clav Sn{\'{a}}sel}, title = {Multiplier System in the Tile Assembly Model with Reduced Tileset-Size}, booktitle = {Innovations in Bio-inspired Computing and Applications - Proceedings of the 4th International Conference on Innovations in Bio-Inspired Computing and Applications, {IBICA} 2013, August 22 -24, 2013 - Ostrava, Czech Republic}, series = {Advances in Intelligent Systems and Computing}, volume = {237}, pages = {95--104}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-01781-5\_9}, doi = {10.1007/978-3-319-01781-5\_9}, timestamp = {Wed, 25 Sep 2019 18:16:19 +0200}, biburl = {https://dblp.org/rec/conf/ibica/FangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ibica/FangL13a, author = {Xiwen Fang and Xuejia Lai}, editor = {Ajith Abraham and Pavel Kr{\"{o}}mer and V{\'{a}}clav Sn{\'{a}}sel}, title = {Modular Algorithm in Tile Self-assembly Model}, booktitle = {Innovations in Bio-inspired Computing and Applications - Proceedings of the 4th International Conference on Innovations in Bio-Inspired Computing and Applications, {IBICA} 2013, August 22 -24, 2013 - Ostrava, Czech Republic}, series = {Advances in Intelligent Systems and Computing}, volume = {237}, pages = {133--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-01781-5\_13}, doi = {10.1007/978-3-319-01781-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ibica/FangL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL13, author = {Yiyuan Luo and Xuejia Lai}, title = {Attacks on JH, Grstl and {SMASH} Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2013}, url = {http://eprint.iacr.org/2013/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhouLL12, author = {Jianying Zhou and Xuejia Lai and Hui Li}, title = {Message from the Guest Editors}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {291--292}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0172-7}, doi = {10.1007/S10207-012-0172-7}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhouLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhongL12, author = {Jinmin Zhong and Xuejia Lai}, title = {Improved preimage attack on one-block {MD4}}, journal = {J. Syst. Softw.}, volume = {85}, number = {4}, pages = {981--994}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.11.1020}, doi = {10.1016/J.JSS.2011.11.1020}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhongL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL12, author = {Jialin Huang and Xuejia Lai}, title = {Transposition of {AES} Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2012}, url = {http://eprint.iacr.org/2012/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL12a, author = {Jialin Huang and Xuejia Lai}, title = {Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2012}, url = {http://eprint.iacr.org/2012/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL12b, author = {Jialin Huang and Xuejia Lai}, title = {What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2012}, url = {http://eprint.iacr.org/2012/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WanWLLL11, author = {Zhong{-}Mei Wan and Jian Weng and Xuejia Lai and Shengli Liu and Jiguo Li}, title = {On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {1}, pages = {243--259}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201101\_16.html}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WanWLLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhongL11, author = {Jinmin Zhong and Xuejia Lai}, title = {Preimage Attack on Reduced {DHA-256}}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {4}, pages = {1315--1327}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201107\_08.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhongL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LuoLG11, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Indifferentiability of Domain Extension Modes for Hash Functions}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {138--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_10}, doi = {10.1007/978-3-642-32298-3\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LuoLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2010, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21518-6}, doi = {10.1007/978-3-642-21518-6}, isbn = {978-3-642-21517-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eforensics/2010, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23602-0}, doi = {10.1007/978-3-642-23602-0}, isbn = {978-3-642-23601-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2011, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0}, doi = {10.1007/978-3-642-24861-0}, isbn = {978-3-642-24860-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuanL11, author = {Ming Duan and Xuejia Lai}, title = {Improved zero-sum distinguisher for full round Keccak-f permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2011}, url = {http://eprint.iacr.org/2011/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuanL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL11, author = {Yiyuan Luo and Xuejia Lai}, title = {Attacks On a Double Length Blockcipher-based Hash Proposal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2011}, url = {http://eprint.iacr.org/2011/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LaiLQHF10, author = {Xuejia Lai and MingXin Lu and Lei Qin and Junsong Han and Xiwen Fang}, title = {Asymmetric encryption and signature method with {DNA} technology}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {506--514}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0063-3}, doi = {10.1007/S11432-010-0063-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LaiLQHF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LuoLG10, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong}, title = {Pseudorandomness analysis of the (extended) Lai-Massey scheme}, journal = {Inf. Process. Lett.}, volume = {111}, number = {2}, pages = {90--96}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2010.10.012}, doi = {10.1016/J.IPL.2010.10.012}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LuoLG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuoCGL10, author = {Yiyuan Luo and Qi Chai and Guang Gong and Xuejia Lai}, title = {A Lightweight Stream Cipher {WG-7} for {RFID} Encryption and Authentication}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684215}, doi = {10.1109/GLOCOM.2010.5684215}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LuoCGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/HuangL10, author = {Jialin Huang and Xuejia Lai}, editor = {Liqun Chen and Moti Yung}, title = {Measuring Random Tests by Conditional Entropy and Optimal Execution Order}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {148--159}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_10}, doi = {10.1007/978-3-642-25283-9\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/HuangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuanLYSZ10, author = {Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu}, title = {Distinguishing Properties of Higher Order Derivatives of Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2010}, url = {http://eprint.iacr.org/2010/417}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuanLYSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhongL10, author = {Jinmin Zhong and Xuejia Lai}, title = {Improved Preimage Attack on One-block {MD4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2010}, url = {http://eprint.iacr.org/2010/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhongL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL10, author = {Yiyuan Luo and Xuejia Lai}, title = {More Insights on Blockcipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2010}, url = {http://eprint.iacr.org/2010/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LuLH09, author = {Xianhui Lu and Xuejia Lai and Dake He}, title = {Improved efficiency of Kiltz07-KEM}, journal = {Inf. Process. Lett.}, volume = {109}, number = {18}, pages = {1093--1096}, year = {2009}, url = {https://doi.org/10.1016/j.ipl.2009.07.003}, doi = {10.1016/J.IPL.2009.07.003}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LuLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DongCLW09, author = {Ling Dong and Kefei Chen and Xuejia Lai and Mi Wen}, title = {When is a key establishment protocol correct?}, journal = {Secur. Commun. Networks}, volume = {2}, number = {6}, pages = {567--579}, year = {2009}, url = {https://doi.org/10.1002/sec.100}, doi = {10.1002/SEC.100}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DongCLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SunL09, author = {Xiaorui Sun and Xuejia Lai}, editor = {Mitsuru Matsui}, title = {The Key-Dependent Attack on Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {19--36}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_2}, doi = {10.1007/978-3-642-10366-7\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SunL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WuLLZ09, author = {Zhongming Wu and Yiyuan Luo and Xuejia Lai and Bo Zhu}, editor = {Liqun Chen and Moti Yung}, title = {Improved Cryptanalysis of the {FOX} Block Cipher}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {236--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_15}, doi = {10.1007/978-3-642-14597-1\_15}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WuLLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhuCL09, author = {Bo Zhu and Kefei Chen and Xuejia Lai}, editor = {Liqun Chen and Moti Yung}, title = {Bitwise Higher Order Differential Cryptanalysis}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {250--262}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_16}, doi = {10.1007/978-3-642-14597-1\_16}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhuCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SunL09, author = {Xiaorui Sun and Xuejia Lai}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Improved Integral Attacks on {MISTY1}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {266--280}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_17}, doi = {10.1007/978-3-642-05445-7\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SunL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoGDZL09, author = {Yiyuan Luo and Zheng Gong and Ming Duan and Bo Zhu and Xuejia Lai}, title = {Revisiting the Indifferentiability of {PGV} Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2009}, url = {http://eprint.iacr.org/2009/265}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoGDZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoLGW09, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong and Zhongming Wu}, title = {Pseudorandomness Analysis of the Lai-Massey Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2009}, url = {http://eprint.iacr.org/2009/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoLGW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuLZL09, author = {Zhongming Wu and Xuejia Lai and Bo Zhu and Yiyuan Luo}, title = {Impossible Differential Cryptanalysis of {FOX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2009}, url = {http://eprint.iacr.org/2009/357}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuLZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhongL09, author = {Jinmin Zhong and Xuejia Lai}, title = {Preimage Attacks on Reduced {DHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2009}, url = {http://eprint.iacr.org/2009/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhongL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoWLG09, author = {Yiyuan Luo and Zhongming Wu and Xuejia Lai and Guang Gong}, title = {A Unified Method for Finding Impossible Differentials of Block Cipher Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2009}, url = {http://eprint.iacr.org/2009/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoWLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GongLC08, author = {Zheng Gong and Xuejia Lai and Kefei Chen}, title = {A synthetic indifferentiability analysis of some block-cipher-based hash functions}, journal = {Des. Codes Cryptogr.}, volume = {48}, number = {3}, pages = {293--305}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9208-4}, doi = {10.1007/S10623-008-9208-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GongLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2008, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1}, doi = {10.1007/978-3-540-88733-1}, isbn = {978-3-540-88732-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLH08, author = {Xianhui Lu and Xuejia Lai and Dake He}, title = {Improved efficiency of Kiltz07-KEM}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2008}, url = {http://eprint.iacr.org/2008/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL08, author = {Yiyuan Luo and Xuejia Lai}, title = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2008}, url = {http://eprint.iacr.org/2008/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuLXQ07, author = {MingXin Lu and Xuejia Lai and Guozhen Xiao and Lei Qin}, title = {Symmetric-key cryptosystem with {DNA} technology}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {50}, number = {3}, pages = {324--333}, year = {2007}, url = {https://doi.org/10.1007/s11432-007-0025-6}, doi = {10.1007/S11432-007-0025-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LuLXQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiangL07, author = {Jie Liang and Xuejia Lai}, title = {Improved Collision Attack on Hash Function {MD5}}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {1}, pages = {79--87}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9010-1}, doi = {10.1007/S11390-007-9010-1}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LiangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/ZhangXLZD07, author = {Xizhe Zhang and Yong Xie and Xuejia Lai and Shensheng Zhang and Zijian Deng}, editor = {Robert Meersman and Zahir Tari}, title = {A Multi-core Security Architecture Based on {EFI}}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1675--1687}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_39}, doi = {10.1007/978-3-540-76843-2\_39}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/ZhangXLZD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/DengL07, author = {Zijian Deng and Xuejia Lai}, editor = {Kokou Y{\'{e}}tongnon and Richard Chbeir and Albert Dipanda}, title = {A New Architecture of Sensitive File Management Based on Dual-Core and {EFI}}, booktitle = {Third International {IEEE} Conference on Signal-Image Technologies and Internet-Based System, {SITIS} 2007, Shanghai, China, December 16-18, 2007}, pages = {183--189}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SITIS.2007.38}, doi = {10.1109/SITIS.2007.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/DengL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLHL07a, author = {Xianhui Lu and Xuejia Lai and Dake He and Guomin Li}, title = {Weak adaptive chosen ciphertext secure hybrid encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2007}, url = {http://eprint.iacr.org/2007/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLHL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongLC07, author = {Zheng Gong and Xuejia Lai and Kefei Chen}, title = {A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2007}, url = {http://eprint.iacr.org/2007/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2006, editor = {Xuejia Lai and Kefei Chen}, title = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230}, doi = {10.1007/11935230}, isbn = {3-540-49475-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2006, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522}, doi = {10.1007/11689522}, isbn = {3-540-33052-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangLFCY05, author = {Xiaoyun Wang and Xuejia Lai and Dengguo Feng and Hui Chen and Xiuyuan Yu}, editor = {Ronald Cramer}, title = {Cryptanalysis of the Hash Functions {MD4} and {RIPEMD}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {1--18}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_1}, doi = {10.1007/11426639\_1}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangLFCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangL05, author = {Jie Liang and Xuejia Lai}, title = {Improved Collision Attack on Hash Function {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2005}, url = {http://eprint.iacr.org/2005/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangFLY04, author = {Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu}, title = {Collisions for Hash Functions MD4, MD5, {HAVAL-128} and {RIPEMD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2004}, url = {http://eprint.iacr.org/2004/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangFLY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Lai00, author = {Xuejia Lai}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {Public Key Infrastructure: Managing the e-Business Security}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {505--505}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/Lai00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KnudsenLP98, author = {Lars R. Knudsen and Xuejia Lai and Bart Preneel}, title = {Attacks on Fast Double Block Length Hash Functions}, journal = {J. Cryptol.}, volume = {11}, number = {1}, pages = {59--72}, year = {1998}, url = {https://doi.org/10.1007/s001459900035}, doi = {10.1007/S001459900035}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KnudsenLP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LaiR96, author = {Xuejia Lai and Rainer A. Rueppel}, editor = {Dieter Gollmann}, title = {Attacks on the {HKM/HFX} Cryptosystem}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {1--14}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_37}, doi = {10.1007/3-540-60865-6\_37}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LaiR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenL94, author = {Lars R. Knudsen and Xuejia Lai}, editor = {Alfredo De Santis}, title = {New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {410--418}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053455}, doi = {10.1007/BFB0053455}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lai94, author = {Xuejia Lai}, editor = {Bart Preneel}, title = {Additive and Linear Structures of Cryptographic Functions}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {75--85}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_6}, doi = {10.1007/3-540-60590-8\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lai94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnet/HerrigelL94, author = {Alexander Herrigel and Xuejia Lai}, editor = {Jarmo Harju and Tapani Karttunen and Olli Martikainen}, title = {Secure {IN} internetworking}, booktitle = {Intelligent Networks, Proceedings of the {IFIP} workshop on intelligent networks 1994}, pages = {149--158}, publisher = {Chapman {\&} Hall}, year = {1994}, timestamp = {Fri, 13 May 2005 15:36:09 +0200}, biburl = {https://dblp.org/rec/conf/smartnet/HerrigelL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohlLMW93, author = {Walter Hohl and Xuejia Lai and Thomas Meier and Christian Waldvogel}, editor = {Douglas R. Stinson}, title = {Security of Iterated Hash Functions Based on Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {379--390}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_32}, doi = {10.1007/3-540-48329-2\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohlLMW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LaiK93, author = {Xuejia Lai and Lars R. Knudsen}, editor = {Ross J. Anderson}, title = {Attacks on Double Block Length Hash Functions}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {157--165}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_19}, doi = {10.1007/3-540-58108-1\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LaiK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Lai92, author = {Xuejia Lai}, title = {On the design and security of block ciphers}, school = {{ETH} Zurich, Z{\"{u}}rich, Switzerland}, year = {1992}, url = {https://d-nb.info/920912710}, doi = {10.3929/ETHZ-A-000646711}, isbn = {978-3-89191-573-8}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Lai92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LaiRW92, author = {Xuejia Lai and Rainer A. Rueppel and Jack Woollven}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {339--348}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_73}, doi = {10.1007/3-540-57220-1\_73}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LaiRW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM92, author = {Xuejia Lai and James L. Massey}, editor = {Rainer A. Rueppel}, title = {Hash Function Based on Block Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {55--70}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_5}, doi = {10.1007/3-540-47555-9\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM91, author = {Xuejia Lai and James L. Massey and Sean Murphy}, editor = {Donald W. Davies}, title = {Markov Ciphers and Differential Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {17--38}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_2}, doi = {10.1007/3-540-46416-6\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/BonnenbergCFKL91, author = {Heinz Bonnenberg and Andreas Curiger and Norbert Felber and Hubert Kaeslin and Xuejia Lai}, title = {{VLSI} Implementation of a New Block Cipher}, booktitle = {Proceedings 1991 {IEEE} International Conference on Computer Design: {VLSI} in Computer {\&} Processors, {ICCD} '91, Cambridge, MA, USA, October 14-16, 1991}, pages = {510--513}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/ICCD.1991.139960}, doi = {10.1109/ICCD.1991.139960}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccd/BonnenbergCFKL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM90, author = {Xuejia Lai and James L. Massey}, editor = {Ivan Damg{\aa}rd}, title = {A Proposal for a New Block Encryption Standard}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {389--404}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_35}, doi = {10.1007/3-540-46877-3\_35}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Lai87, author = {Xuejia Lai}, title = {Condition for the nonsingularity of a feedback shift-register over a general finite field}, journal = {{IEEE} Trans. Inf. Theory}, volume = {33}, number = {5}, pages = {747--749}, year = {1987}, url = {https://doi.org/10.1109/TIT.1987.1057338}, doi = {10.1109/TIT.1987.1057338}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Lai87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.