The SCEAS System
Navigation Menu

Search the dblp DataBase


Xuejia Lai: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xuejia Lai, Rainer A. Rueppel, Jack Woollven
    A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:339-348 [Conf]
  2. Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel
    Security of Iterated Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:379-390 [Conf]
  3. Lars R. Knudsen, Xuejia Lai
    New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:410-418 [Conf]
  4. Xuejia Lai, James L. Massey
    A Proposal for a New Block Encryption Standard. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:389-404 [Conf]
  5. Xuejia Lai, James L. Massey
    Markov Ciphers and Differentail Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:17-38 [Conf]
  6. Xuejia Lai, James L. Massey
    Hash Function Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:55-70 [Conf]
  7. Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu
    Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:1-18 [Conf]
  8. Xuejia Lai
    Additive and Linear Structures of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:75-85 [Conf]
  9. Xuejia Lai, Lars R. Knudsen
    Attacks on Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:157-165 [Conf]
  10. Xuejia Lai, Rainer A. Rueppel
    Attacks on the HKM/HFX Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:1-14 [Conf]
  11. H. Bonnenberg, Andreas Curiger, Norbert Felber, Hubert Kaeslin, Xuejia Lai
    VLSI Implementation of a New Block Cipher. [Citation Graph (0, 0)][DBLP]
    ICCD, 1991, pp:510-513 [Conf]
  12. Xuejia Lai
    Public Key Infrastructure: Managing the e-Business Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:505-505 [Conf]
  13. Alexander Herrigel, Xuejia Lai
    Secure IN internetworking. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 1994, pp:149-158 [Conf]
  14. Lars R. Knudsen, Xuejia Lai, Bart Preneel
    Attacks on Fast Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1998, v:11, n:1, pp:59-72 [Journal]
  15. Xuejia Lai
    Condition for the nonsingularity of a feedback shift-register over a general finite field. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:747-0 [Journal]
  16. Xizhe Zhang, Yong Xie, Xuejia Lai, Shensheng Zhang, Zijian Deng
    A Multi-core Security Architecture Based on EFI. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1675-1687 [Conf]

  17. The Key-Dependent Attack on Block Ciphers. [Citation Graph (, )][DBLP]

  18. Improved Integral Attacks on MISTY1. [Citation Graph (, )][DBLP]

  19. Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP]

  20. Improved Cryptanalysis of the FOX Block Cipher. [Citation Graph (, )][DBLP]

  21. A synthetic indifferentiability analysis of some block-cipher-based hash functions. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002