BibTeX records: Xuejia Lai

download as .bib file

@article{DBLP:journals/tc/ZhangLWGHWS24,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Lei Wang and
                  Jie Guan and
                  Bin Hu and
                  Senpeng Wang and
                  Tairong Shi},
  title        = {Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT
                  Nodes},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {2},
  pages        = {613--620},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2023.3315057},
  doi          = {10.1109/TC.2023.3315057},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/ZhangLWGHWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangLWGH23,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Lei Wang and
                  Jie Guan and
                  Bin Hu},
  title        = {A revisited security evaluation of Simeck family ciphers against impossible
                  differential cryptanalysis},
  journal      = {Sci. China Inf. Sci.},
  volume       = {66},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11432-022-3466-x},
  doi          = {10.1007/S11432-022-3466-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangLWGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangLWGHWS23,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Lei Wang and
                  Jie Guan and
                  Bin Hu and
                  Senpeng Wang and
                  Tairong Shi},
  title        = {Meet-in-the-middle attack with splice-and-cut technique and a general
                  automatic framework},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2845--2878},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01226-4},
  doi          = {10.1007/S10623-023-01226-4},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangLWGHWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangLGH23,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Jie Guan and
                  Bin Hu},
  title        = {Weak rotational property and its application},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3187--3214},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01241-5},
  doi          = {10.1007/S10623-023-01241-5},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangLGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/0026LG023,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Jie Guan and
                  Bin Hu},
  title        = {Selecting Rotation Constants on SIMON-Type Ciphers},
  journal      = {J. Database Manag.},
  volume       = {34},
  number       = {1},
  pages        = {1--23},
  year         = {2023},
  url          = {https://doi.org/10.4018/jdm.318452},
  doi          = {10.4018/JDM.318452},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/0026LG023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhangLWGHWS23,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Lei Wang and
                  Jie Guan and
                  Bin Hu and
                  Senpeng Wang and
                  Tairong Shi},
  title        = {Rotational-XOR Differential Cryptanalysis and an Automatic Framework
                  for {AND-RX} Ciphers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {2},
  pages        = {1282--1294},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2022.3218186},
  doi          = {10.1109/TIT.2022.3218186},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZhangLWGHWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/0026LG022,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Jie Guan and
                  Bin Hu},
  title        = {Research on the Security Level of {\(\mu\)}2 against Impossible Differential
                  cryptanalysis},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {16},
  number       = {3},
  pages        = {972--985},
  year         = {2022},
  url          = {https://doi.org/10.3837/tiis.2022.03.012},
  doi          = {10.3837/TIIS.2022.03.012},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/0026LG022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZhangL22,
  author       = {Kai Zhang and
                  Xuejia Lai},
  title        = {Another Perspective on Automatic Construction of Integral Distinguishers
                  for {ARX} Ciphers},
  journal      = {Symmetry},
  volume       = {14},
  number       = {3},
  pages        = {461},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14030461},
  doi          = {10.3390/SYM14030461},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZhangL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ShenYWL21,
  author       = {Yaobin Shen and
                  Hailun Yan and
                  Lei Wang and
                  Xuejia Lai},
  title        = {Secure key-alternating Feistel ciphers without key schedule},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-019-9938-0},
  doi          = {10.1007/S11432-019-9938-0},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ShenYWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/PangLLG21,
  author       = {Siyu Pang and
                  Tingting Lin and
                  Xuejia Lai and
                  Zheng Gong},
  title        = {A White-Box Implementation of {IDEA}},
  journal      = {Symmetry},
  volume       = {13},
  number       = {6},
  pages        = {1066},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13061066},
  doi          = {10.3390/SYM13061066},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/PangLLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YanWSL20,
  author       = {Hailun Yan and
                  Lei Wang and
                  Yaobin Shen and
                  Xuejia Lai},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Tweaking Key-Alternating Feistel Block Ciphers},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {69--88},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_4},
  doi          = {10.1007/978-3-030-57808-4\_4},
  timestamp    = {Sat, 12 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YanWSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenYWL20,
  author       = {Yaobin Shen and
                  Hailun Yan and
                  Lei Wang and
                  Xuejia Lai},
  title        = {Secure Key-Alternating Feistel Ciphers Without Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenYWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YanLCL19,
  author       = {Hailun Yan and
                  Yiyuan Luo and
                  Mo Chen and
                  Xuejia Lai},
  title        = {New observation on the key schedule of {RECTANGLE}},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {3},
  pages        = {32108:1--32108:13},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-018-9527-8},
  doi          = {10.1007/S11432-018-9527-8},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/YanLCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YanLWYX19,
  author       = {Hailun Yan and
                  Xuejia Lai and
                  Lei Wang and
                  Yu Yu and
                  Yiran Xing},
  title        = {New zero-sum distinguishers on full 24-round Keccak-f using the division
                  property},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {469--478},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5263},
  doi          = {10.1049/IET-IFS.2018.5263},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YanLWYX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/XuXL19,
  author       = {Zhichao Xu and
                  Hong Xu and
                  Xuejia Lai},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Improved Integral Attack on Generalized Feistel Cipher},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {463--479},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_28},
  doi          = {10.1007/978-3-030-42921-8\_28},
  timestamp    = {Mon, 06 Apr 2020 19:10:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/XuXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isci/LinZLQ19,
  author       = {Tingting Lin and
                  Yixin Zhong and
                  Xuejia Lai and
                  Weidong Qiu},
  editor       = {Guojun Wang and
                  Abdulmotaleb El{-}Saddik and
                  Xuejia Lai and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kim{-}Kwang Raymond Choo},
  title        = {Software Tamper Resistance Based on White-Box {SMS4} Implementation},
  booktitle    = {Smart City and Informatization - 7th International Conference, iSCI
                  2019, Guangzhou, China, November 12-15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1122},
  pages        = {486--495},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-1301-5\_38},
  doi          = {10.1007/978-981-15-1301-5\_38},
  timestamp    = {Tue, 28 Jan 2020 21:18:31 +0100},
  biburl       = {https://dblp.org/rec/conf/isci/LinZLQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isci/2019,
  editor       = {Guojun Wang and
                  Abdulmotaleb El{-}Saddik and
                  Xuejia Lai and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kim{-}Kwang Raymond Choo},
  title        = {Smart City and Informatization - 7th International Conference, iSCI
                  2019, Guangzhou, China, November 12-15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1122},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-1301-5},
  doi          = {10.1007/978-981-15-1301-5},
  isbn         = {978-981-15-1300-8},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isci/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LinYLZJ18,
  author       = {Tingting Lin and
                  Hailun Yan and
                  Xuejia Lai and
                  Yixin Zhong and
                  Yin Jia},
  title        = {Security Evaluation and Improvement of a White-Box {SMS4} Implementation
                  Based on Affine Equivalence Algorithm},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {12},
  pages        = {1783--1790},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy068},
  doi          = {10.1093/COMJNL/BXY068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LinYLZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csae/XingYL18,
  author       = {Yiran Xing and
                  Hailun Yan and
                  Xuejia Lai},
  editor       = {Ali Emrouznejad and
                  Zhihong Qian},
  title        = {New Observation on Division Property: Simplifying Models of Basic
                  Operations and Modeling Modular Multiplication Operation},
  booktitle    = {The 2nd International Conference on Computer Science and Application
                  Engineering, {CSAE} 2018, Hohhot, China, October 22-24, 2018},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3207677.3278003},
  doi          = {10.1145/3207677.3278003},
  timestamp    = {Thu, 10 Jun 2021 16:50:33 +0200},
  biburl       = {https://dblp.org/rec/conf/csae/XingYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangCQLW17,
  author       = {Huige Wang and
                  Kefei Chen and
                  Baodong Qin and
                  Xuejia Lai and
                  Yunhua Wen},
  title        = {A new construction on randomized message-locked encryption in the
                  standard model via UCEs},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {52101},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-1037-2},
  doi          = {10.1007/S11432-015-1037-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangCQLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuoLZ17,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Yujie Zhou},
  title        = {Generic attacks on the Lai-Massey scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {83},
  number       = {2},
  pages        = {407--423},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0235-2},
  doi          = {10.1007/S10623-016-0235-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuoLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LinLXJ17,
  author       = {Tingting Lin and
                  Xuejia Lai and
                  Weijia Xue and
                  Yin Jia},
  title        = {A New Feistel-Type White-Box Encryption Scheme},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {32},
  number       = {2},
  pages        = {386--395},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11390-017-1727-x},
  doi          = {10.1007/S11390-017-1727-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LinLXJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuoL17,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Improvements for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {5980251:1--5980251:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/5980251},
  doi          = {10.1155/2017/5980251},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL17,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Improvements for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LinLXH16,
  author       = {Tingting Lin and
                  Xuejia Lai and
                  Weijia Xue and
                  Geshi Huang},
  title        = {Discussion on the theoretical results of white-box cryptography},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {11},
  pages        = {112101},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-015-5474-8},
  doi          = {10.1007/S11432-015-5474-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LinLXH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XueLSXL16,
  author       = {Weijia Xue and
                  Tingting Lin and
                  Xin Shun and
                  Fenglei Xue and
                  Xuejia Lai},
  title        = {On the estimation of the second largest eigenvalue of Markov ciphers},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {13},
  pages        = {2093--2099},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1465},
  doi          = {10.1002/SEC.1465},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XueLSXL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuangYL16,
  author       = {Jialin Huang and
                  Hailun Yan and
                  Xuejia Lai},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Transposition of {AES} Key Schedule},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {84--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_6},
  doi          = {10.1007/978-3-319-54705-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuangYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cits/JiaLL16,
  author       = {Yin Jia and
                  Tingting Lin and
                  Xuejia Lai},
  title        = {A generic attack against white box implementation of block ciphers},
  booktitle    = {International Conference on Computer, Information and Telecommunication
                  Systems, {CITS} 2016, Kunming, China, July 6-8, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CITS.2016.7546449},
  doi          = {10.1109/CITS.2016.7546449},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cits/JiaLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangVLN16,
  author       = {Jialin Huang and
                  Serge Vaudenay and
                  Xuejia Lai and
                  Kaisa Nyberg},
  title        = {Capacity and Data Complexity in Multidimensional Linear Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangVLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LuoLJ15,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Tiejun Jia},
  title        = {Attacks on a double length blockcipher-based hash proposal},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {289--295},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0117-2},
  doi          = {10.1007/S12095-014-0117-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangHLLML15,
  author       = {Huanguo Zhang and
                  Wenbao Han and
                  Xuejia Lai and
                  Dongdai Lin and
                  Jianfeng Ma and
                  Jianhua Li},
  title        = {Survey on cyberspace security},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {11},
  pages        = {1--43},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5433-4},
  doi          = {10.1007/S11432-015-5433-4},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangHLLML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiLLC15,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Xuejia Lai and
                  Kefei Chen},
  title        = {Optimal assignment schemes for general access structures based on
                  linear programming},
  journal      = {Des. Codes Cryptogr.},
  volume       = {74},
  number       = {3},
  pages        = {623--644},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-013-9879-3},
  doi          = {10.1007/S10623-013-9879-3},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiLLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/XuZL15,
  author       = {Hong Xu and
                  Yonghui Zheng and
                  Xuejia Lai},
  title        = {Construction of perfect diffusion layers from linear feedback shift
                  registers},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {127--135},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0411},
  doi          = {10.1049/IET-IFS.2013.0411},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/XuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/XueL15,
  author       = {Weijia Xue and
                  Xuejia Lai},
  title        = {Impossible differential cryptanalysis of MARS-like structures},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {219--222},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0183},
  doi          = {10.1049/IET-IFS.2014.0183},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/XueL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LuoLH15,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Jing Hu},
  title        = {The Pseudorandomness of Many-Round Lai-Massey Scheme},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {31},
  number       = {3},
  pages        = {1085--1096},
  year         = {2015},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2015/201505\_17.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LuoLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinacom/JuLXML15,
  author       = {Zhen Ju and
                  Peiyuan Liu and
                  Weijia Xue and
                  Daoguang Mu and
                  Xuejia Lai},
  title        = {On the equivalence of LBlock and {TWINE} in structure},
  booktitle    = {10th International Conference on Communications and Networking in
                  China, ChinaCom 2015, Shanghai, China, August 15-17, 2015},
  pages        = {289--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CHINACOM.2015.7497953},
  doi          = {10.1109/CHINACOM.2015.7497953},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chinacom/JuLXML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuangVLN15,
  author       = {Jialin Huang and
                  Serge Vaudenay and
                  Xuejia Lai and
                  Kaisa Nyberg},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Capacity and Data Complexity in Multidimensional Linear Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {141--160},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_7},
  doi          = {10.1007/978-3-662-47989-6\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuangVLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuJHL15,
  author       = {Hong Xu and
                  Ping Jia and
                  Geshi Huang and
                  Xuejia Lai},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round
                  LBlock-s},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_9},
  doi          = {10.1007/978-3-319-29814-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/XuJHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangL14,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {What is the effective key length for a block cipher: an attack on
                  every practical block cipher},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {7},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-014-5096-6},
  doi          = {10.1007/S11432-014-5096-6},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/FangL14,
  author       = {Xiwen Fang and
                  Xuejia Lai},
  title        = {DNA-chip-based dynamic broadcast encryption scheme with constant-size
                  ciphertexts and decryption keys},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {9},
  pages        = {1--10},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-014-5139-z},
  doi          = {10.1007/S11432-014-5139-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/FangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangL14,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Revisiting key schedule's diffusion in relation with round function's
                  diffusion},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {85--103},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9804-9},
  doi          = {10.1007/S10623-013-9804-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LuoLWG14,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zhongming Wu and
                  Guang Gong},
  title        = {A unified method for finding impossible differentials of block cipher
                  structures},
  journal      = {Inf. Sci.},
  volume       = {263},
  pages        = {211--220},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.08.051},
  doi          = {10.1016/J.INS.2013.08.051},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LuoLWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/DuanYSZL14,
  author       = {Ming Duan and
                  Mohan Yang and
                  Xiaorui Sun and
                  Bo Zhu and
                  Xuejia Lai},
  title        = {Distinguishing properties and applications of higher order derivatives
                  of Boolean functions},
  journal      = {Inf. Sci.},
  volume       = {271},
  pages        = {224--235},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.108},
  doi          = {10.1016/J.INS.2014.02.108},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/DuanYSZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bic-ta/FangL14,
  author       = {Xiwen Fang and
                  Xuejia Lai},
  editor       = {Linqiang Pan and
                  Gheorghe Paun and
                  Mario J. P{\'{e}}rez{-}Jim{\'{e}}nez and
                  Tao Song},
  title        = {DNA-Chip-Based Information Hiding Scheme},
  booktitle    = {Bio-Inspired Computing - Theories and Applications - 9th International
                  Conference, {BIC-TA} 2014, Wuhan, China, October 16-19, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {472},
  pages        = {123--127},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45049-9\_20},
  doi          = {10.1007/978-3-662-45049-9\_20},
  timestamp    = {Wed, 17 May 2017 14:24:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bic-ta/FangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/HuangVL14,
  author       = {Jialin Huang and
                  Serge Vaudenay and
                  Xuejia Lai},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {On the Key Schedule of Lightweight Block Ciphers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {124--142},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_8},
  doi          = {10.1007/978-3-319-13039-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/HuangVL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuTL14,
  author       = {Hong Xu and
                  Lin Tan and
                  Xuejia Lai},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {On the Recursive Construction of {MDS} Matrices for Lightweight Cryptography},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {552--563},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_40},
  doi          = {10.1007/978-3-319-06320-1\_40},
  timestamp    = {Fri, 09 Apr 2021 18:45:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuTL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spac/LuoLY14,
  author       = {Rui Luo and
                  Xuejia Lai and
                  Rong You},
  title        = {A new attempt of white-box {AES} implementation},
  booktitle    = {Proceedings {IEEE} International Conference on Security, Pattern Analysis,
                  and Cybernetics, {SPAC} 2014, Wuhan, China, October 18-19, 2014},
  pages        = {423--429},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPAC.2014.6982727},
  doi          = {10.1109/SPAC.2014.6982727},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/spac/LuoLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HuangL13,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Chosen-plaintext linear attacks on Serpent},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {293--299},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0287},
  doi          = {10.1049/IET-IFS.2012.0287},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HuangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/LiuL13,
  author       = {Chengbing Liu and
                  Xuejia Lai},
  title        = {Evaluation of Statistical Tests for Randomness Using Conditional Entropy},
  booktitle    = {2013 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12,
                  2013},
  pages        = {504--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CyberC.2013.93},
  doi          = {10.1109/CYBERC.2013.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/LiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ibica/FangL13,
  author       = {Xiwen Fang and
                  Xuejia Lai},
  editor       = {Ajith Abraham and
                  Pavel Kr{\"{o}}mer and
                  V{\'{a}}clav Sn{\'{a}}sel},
  title        = {Multiplier System in the Tile Assembly Model with Reduced Tileset-Size},
  booktitle    = {Innovations in Bio-inspired Computing and Applications - Proceedings
                  of the 4th International Conference on Innovations in Bio-Inspired
                  Computing and Applications, {IBICA} 2013, August 22 -24, 2013 - Ostrava,
                  Czech Republic},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {237},
  pages        = {95--104},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-01781-5\_9},
  doi          = {10.1007/978-3-319-01781-5\_9},
  timestamp    = {Wed, 25 Sep 2019 18:16:19 +0200},
  biburl       = {https://dblp.org/rec/conf/ibica/FangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ibica/FangL13a,
  author       = {Xiwen Fang and
                  Xuejia Lai},
  editor       = {Ajith Abraham and
                  Pavel Kr{\"{o}}mer and
                  V{\'{a}}clav Sn{\'{a}}sel},
  title        = {Modular Algorithm in Tile Self-assembly Model},
  booktitle    = {Innovations in Bio-inspired Computing and Applications - Proceedings
                  of the 4th International Conference on Innovations in Bio-Inspired
                  Computing and Applications, {IBICA} 2013, August 22 -24, 2013 - Ostrava,
                  Czech Republic},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {237},
  pages        = {133--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-01781-5\_13},
  doi          = {10.1007/978-3-319-01781-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ibica/FangL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL13,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Attacks on JH, Grstl and {SMASH} Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhouLL12,
  author       = {Jianying Zhou and
                  Xuejia Lai and
                  Hui Li},
  title        = {Message from the Guest Editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {291--292},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0172-7},
  doi          = {10.1007/S10207-012-0172-7},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhouLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhongL12,
  author       = {Jinmin Zhong and
                  Xuejia Lai},
  title        = {Improved preimage attack on one-block {MD4}},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {4},
  pages        = {981--994},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.11.1020},
  doi          = {10.1016/J.JSS.2011.11.1020},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhongL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL12,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Transposition of {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL12a,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Revisiting Key Schedule's Diffusion In Relation With Round Function's
                  Diffusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL12b,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {What is the Effective Key Length for a Block Cipher: an Attack on
                  Every Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WanWLLL11,
  author       = {Zhong{-}Mei Wan and
                  Jian Weng and
                  Xuejia Lai and
                  Shengli Liu and
                  Jiguo Li},
  title        = {On the Relation between Identity-Based Proxy Re-Encryption and Mediated
                  Identity-Based Encryption},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {27},
  number       = {1},
  pages        = {243--259},
  year         = {2011},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2011/201101\_16.html},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WanWLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZhongL11,
  author       = {Jinmin Zhong and
                  Xuejia Lai},
  title        = {Preimage Attack on Reduced {DHA-256}},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {27},
  number       = {4},
  pages        = {1315--1327},
  year         = {2011},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2011/201107\_08.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ZhongL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LuoLG11,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Indifferentiability of Domain Extension Modes for Hash Functions},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_10},
  doi          = {10.1007/978-3-642-32298-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LuoLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21518-6},
  doi          = {10.1007/978-3-642-21518-6},
  isbn         = {978-3-642-21517-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eforensics/2010,
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23602-0},
  doi          = {10.1007/978-3-642-23602-0},
  isbn         = {978-3-642-23601-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2011,
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0},
  doi          = {10.1007/978-3-642-24861-0},
  isbn         = {978-3-642-24860-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanL11,
  author       = {Ming Duan and
                  Xuejia Lai},
  title        = {Improved zero-sum distinguisher for full round Keccak-f permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL11,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Attacks On a Double Length Blockcipher-based Hash Proposal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LaiLQHF10,
  author       = {Xuejia Lai and
                  MingXin Lu and
                  Lei Qin and
                  Junsong Han and
                  Xiwen Fang},
  title        = {Asymmetric encryption and signature method with {DNA} technology},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {506--514},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0063-3},
  doi          = {10.1007/S11432-010-0063-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LaiLQHF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LuoLG10,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong},
  title        = {Pseudorandomness analysis of the (extended) Lai-Massey scheme},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {2},
  pages        = {90--96},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ipl.2010.10.012},
  doi          = {10.1016/J.IPL.2010.10.012},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/LuoLG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuoCGL10,
  author       = {Yiyuan Luo and
                  Qi Chai and
                  Guang Gong and
                  Xuejia Lai},
  title        = {A Lightweight Stream Cipher {WG-7} for {RFID} Encryption and Authentication},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684215},
  doi          = {10.1109/GLOCOM.2010.5684215},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LuoCGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/HuangL10,
  author       = {Jialin Huang and
                  Xuejia Lai},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Measuring Random Tests by Conditional Entropy and Optimal Execution
                  Order},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_10},
  doi          = {10.1007/978-3-642-25283-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/HuangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanLYSZ10,
  author       = {Ming Duan and
                  Xuejia Lai and
                  Mohan Yang and
                  Xiaorui Sun and
                  Bo Zhu},
  title        = {Distinguishing Properties of Higher Order Derivatives of Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/417},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanLYSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongL10,
  author       = {Jinmin Zhong and
                  Xuejia Lai},
  title        = {Improved Preimage Attack on One-block {MD4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL10,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {More Insights on Blockcipher-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LuLH09,
  author       = {Xianhui Lu and
                  Xuejia Lai and
                  Dake He},
  title        = {Improved efficiency of Kiltz07-KEM},
  journal      = {Inf. Process. Lett.},
  volume       = {109},
  number       = {18},
  pages        = {1093--1096},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ipl.2009.07.003},
  doi          = {10.1016/J.IPL.2009.07.003},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/LuLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DongCLW09,
  author       = {Ling Dong and
                  Kefei Chen and
                  Xuejia Lai and
                  Mi Wen},
  title        = {When is a key establishment protocol correct?},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {6},
  pages        = {567--579},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.100},
  doi          = {10.1002/SEC.100},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DongCLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SunL09,
  author       = {Xiaorui Sun and
                  Xuejia Lai},
  editor       = {Mitsuru Matsui},
  title        = {The Key-Dependent Attack on Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_2},
  doi          = {10.1007/978-3-642-10366-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SunL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WuLLZ09,
  author       = {Zhongming Wu and
                  Yiyuan Luo and
                  Xuejia Lai and
                  Bo Zhu},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Improved Cryptanalysis of the {FOX} Block Cipher},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {236--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_15},
  doi          = {10.1007/978-3-642-14597-1\_15},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WuLLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhuCL09,
  author       = {Bo Zhu and
                  Kefei Chen and
                  Xuejia Lai},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Bitwise Higher Order Differential Cryptanalysis},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {250--262},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_16},
  doi          = {10.1007/978-3-642-14597-1\_16},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhuCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SunL09,
  author       = {Xiaorui Sun and
                  Xuejia Lai},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Improved Integral Attacks on {MISTY1}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {266--280},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_17},
  doi          = {10.1007/978-3-642-05445-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SunL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoGDZL09,
  author       = {Yiyuan Luo and
                  Zheng Gong and
                  Ming Duan and
                  Bo Zhu and
                  Xuejia Lai},
  title        = {Revisiting the Indifferentiability of {PGV} Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/265},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoGDZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoLGW09,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong and
                  Zhongming Wu},
  title        = {Pseudorandomness Analysis of the Lai-Massey Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoLGW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuLZL09,
  author       = {Zhongming Wu and
                  Xuejia Lai and
                  Bo Zhu and
                  Yiyuan Luo},
  title        = {Impossible Differential Cryptanalysis of {FOX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/357},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuLZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongL09,
  author       = {Jinmin Zhong and
                  Xuejia Lai},
  title        = {Preimage Attacks on Reduced {DHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoWLG09,
  author       = {Yiyuan Luo and
                  Zhongming Wu and
                  Xuejia Lai and
                  Guang Gong},
  title        = {A Unified Method for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoWLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GongLC08,
  author       = {Zheng Gong and
                  Xuejia Lai and
                  Kefei Chen},
  title        = {A synthetic indifferentiability analysis of some block-cipher-based
                  hash functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {48},
  number       = {3},
  pages        = {293--305},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9208-4},
  doi          = {10.1007/S10623-008-9208-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GongLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2008,
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1},
  doi          = {10.1007/978-3-540-88733-1},
  isbn         = {978-3-540-88732-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLH08,
  author       = {Xianhui Lu and
                  Xuejia Lai and
                  Dake He},
  title        = {Improved efficiency of Kiltz07-KEM},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL08,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuLXQ07,
  author       = {MingXin Lu and
                  Xuejia Lai and
                  Guozhen Xiao and
                  Lei Qin},
  title        = {Symmetric-key cryptosystem with {DNA} technology},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {324--333},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-0025-6},
  doi          = {10.1007/S11432-007-0025-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuLXQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiangL07,
  author       = {Jie Liang and
                  Xuejia Lai},
  title        = {Improved Collision Attack on Hash Function {MD5}},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {1},
  pages        = {79--87},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9010-1},
  doi          = {10.1007/S11390-007-9010-1},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LiangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/ZhangXLZD07,
  author       = {Xizhe Zhang and
                  Yong Xie and
                  Xuejia Lai and
                  Shensheng Zhang and
                  Zijian Deng},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {A Multi-core Security Architecture Based on {EFI}},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4804},
  pages        = {1675--1687},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76843-2\_39},
  doi          = {10.1007/978-3-540-76843-2\_39},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/ZhangXLZD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/DengL07,
  author       = {Zijian Deng and
                  Xuejia Lai},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Richard Chbeir and
                  Albert Dipanda},
  title        = {A New Architecture of Sensitive File Management Based on Dual-Core
                  and {EFI}},
  booktitle    = {Third International {IEEE} Conference on Signal-Image Technologies
                  and Internet-Based System, {SITIS} 2007, Shanghai, China, December
                  16-18, 2007},
  pages        = {183--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SITIS.2007.38},
  doi          = {10.1109/SITIS.2007.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/DengL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLHL07a,
  author       = {Xianhui Lu and
                  Xuejia Lai and
                  Dake He and
                  Guomin Li},
  title        = {Weak adaptive chosen ciphertext secure hybrid encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLHL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongLC07,
  author       = {Zheng Gong and
                  Xuejia Lai and
                  Kefei Chen},
  title        = {A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2006,
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230},
  doi          = {10.1007/11935230},
  isbn         = {3-540-49475-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2006,
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522},
  doi          = {10.1007/11689522},
  isbn         = {3-540-33052-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangLFCY05,
  author       = {Xiaoyun Wang and
                  Xuejia Lai and
                  Dengguo Feng and
                  Hui Chen and
                  Xiuyuan Yu},
  editor       = {Ronald Cramer},
  title        = {Cryptanalysis of the Hash Functions {MD4} and {RIPEMD}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_1},
  doi          = {10.1007/11426639\_1},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangLFCY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangL05,
  author       = {Jie Liang and
                  Xuejia Lai},
  title        = {Improved Collision Attack on Hash Function {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangFLY04,
  author       = {Xiaoyun Wang and
                  Dengguo Feng and
                  Xuejia Lai and
                  Hongbo Yu},
  title        = {Collisions for Hash Functions MD4, MD5, {HAVAL-128} and {RIPEMD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangFLY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Lai00,
  author       = {Xuejia Lai},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {Public Key Infrastructure: Managing the e-Business Security},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {505--505},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Lai00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KnudsenLP98,
  author       = {Lars R. Knudsen and
                  Xuejia Lai and
                  Bart Preneel},
  title        = {Attacks on Fast Double Block Length Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {59--72},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900035},
  doi          = {10.1007/S001459900035},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KnudsenLP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LaiR96,
  author       = {Xuejia Lai and
                  Rainer A. Rueppel},
  editor       = {Dieter Gollmann},
  title        = {Attacks on the {HKM/HFX} Cryptosystem},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_37},
  doi          = {10.1007/3-540-60865-6\_37},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LaiR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenL94,
  author       = {Lars R. Knudsen and
                  Xuejia Lai},
  editor       = {Alfredo De Santis},
  title        = {New Attacks on all Double Block Length Hash Functions of Hash Rate
                  1, including the Parallel-DM},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {410--418},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053455},
  doi          = {10.1007/BFB0053455},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lai94,
  author       = {Xuejia Lai},
  editor       = {Bart Preneel},
  title        = {Additive and Linear Structures of Cryptographic Functions},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {75--85},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_6},
  doi          = {10.1007/3-540-60590-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lai94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnet/HerrigelL94,
  author       = {Alexander Herrigel and
                  Xuejia Lai},
  editor       = {Jarmo Harju and
                  Tapani Karttunen and
                  Olli Martikainen},
  title        = {Secure {IN} internetworking},
  booktitle    = {Intelligent Networks, Proceedings of the {IFIP} workshop on intelligent
                  networks 1994},
  pages        = {149--158},
  publisher    = {Chapman {\&} Hall},
  year         = {1994},
  timestamp    = {Fri, 13 May 2005 15:36:09 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnet/HerrigelL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohlLMW93,
  author       = {Walter Hohl and
                  Xuejia Lai and
                  Thomas Meier and
                  Christian Waldvogel},
  editor       = {Douglas R. Stinson},
  title        = {Security of Iterated Hash Functions Based on Block Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {379--390},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_32},
  doi          = {10.1007/3-540-48329-2\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohlLMW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LaiK93,
  author       = {Xuejia Lai and
                  Lars R. Knudsen},
  editor       = {Ross J. Anderson},
  title        = {Attacks on Double Block Length Hash Functions},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {157--165},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_19},
  doi          = {10.1007/3-540-58108-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LaiK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Lai92,
  author       = {Xuejia Lai},
  title        = {On the design and security of block ciphers},
  school       = {{ETH} Zurich, Z{\"{u}}rich, Switzerland},
  year         = {1992},
  url          = {https://d-nb.info/920912710},
  doi          = {10.3929/ETHZ-A-000646711},
  isbn         = {978-3-89191-573-8},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/dnb/Lai92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaiRW92,
  author       = {Xuejia Lai and
                  Rainer A. Rueppel and
                  Jack Woollven},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {339--348},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_73},
  doi          = {10.1007/3-540-57220-1\_73},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LaiRW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiM92,
  author       = {Xuejia Lai and
                  James L. Massey},
  editor       = {Rainer A. Rueppel},
  title        = {Hash Function Based on Block Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_5},
  doi          = {10.1007/3-540-47555-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiM91,
  author       = {Xuejia Lai and
                  James L. Massey and
                  Sean Murphy},
  editor       = {Donald W. Davies},
  title        = {Markov Ciphers and Differential Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {17--38},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_2},
  doi          = {10.1007/3-540-46416-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/BonnenbergCFKL91,
  author       = {Heinz Bonnenberg and
                  Andreas Curiger and
                  Norbert Felber and
                  Hubert Kaeslin and
                  Xuejia Lai},
  title        = {{VLSI} Implementation of a New Block Cipher},
  booktitle    = {Proceedings 1991 {IEEE} International Conference on Computer Design:
                  {VLSI} in Computer {\&} Processors, {ICCD} '91, Cambridge, MA,
                  USA, October 14-16, 1991},
  pages        = {510--513},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/ICCD.1991.139960},
  doi          = {10.1109/ICCD.1991.139960},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccd/BonnenbergCFKL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiM90,
  author       = {Xuejia Lai and
                  James L. Massey},
  editor       = {Ivan Damg{\aa}rd},
  title        = {A Proposal for a New Block Encryption Standard},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_35},
  doi          = {10.1007/3-540-46877-3\_35},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Lai87,
  author       = {Xuejia Lai},
  title        = {Condition for the nonsingularity of a feedback shift-register over
                  a general finite field},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {33},
  number       = {5},
  pages        = {747--749},
  year         = {1987},
  url          = {https://doi.org/10.1109/TIT.1987.1057338},
  doi          = {10.1109/TIT.1987.1057338},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Lai87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics