Search the dblp DataBase
Xuejia Lai :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xuejia Lai , Rainer A. Rueppel , Jack Woollven A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:339-348 [Conf ] Walter Hohl , Xuejia Lai , Thomas Meier , Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:379-390 [Conf ] Lars R. Knudsen , Xuejia Lai New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:410-418 [Conf ] Xuejia Lai , James L. Massey A Proposal for a New Block Encryption Standard. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:389-404 [Conf ] Xuejia Lai , James L. Massey Markov Ciphers and Differentail Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:17-38 [Conf ] Xuejia Lai , James L. Massey Hash Function Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:55-70 [Conf ] Xiaoyun Wang , Xuejia Lai , Dengguo Feng , Hui Chen , Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:1-18 [Conf ] Xuejia Lai Additive and Linear Structures of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:75-85 [Conf ] Xuejia Lai , Lars R. Knudsen Attacks on Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:157-165 [Conf ] Xuejia Lai , Rainer A. Rueppel Attacks on the HKM/HFX Cryptosystem. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:1-14 [Conf ] H. Bonnenberg , Andreas Curiger , Norbert Felber , Hubert Kaeslin , Xuejia Lai VLSI Implementation of a New Block Cipher. [Citation Graph (0, 0)][DBLP ] ICCD, 1991, pp:510-513 [Conf ] Xuejia Lai Public Key Infrastructure: Managing the e-Business Security. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:505-505 [Conf ] Alexander Herrigel , Xuejia Lai Secure IN internetworking. [Citation Graph (0, 0)][DBLP ] SMARTNET, 1994, pp:149-158 [Conf ] Lars R. Knudsen , Xuejia Lai , Bart Preneel Attacks on Fast Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1998, v:11, n:1, pp:59-72 [Journal ] Xuejia Lai Condition for the nonsingularity of a feedback shift-register over a general finite field. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:747-0 [Journal ] Xizhe Zhang , Yong Xie , Xuejia Lai , Shensheng Zhang , Zijian Deng A Multi-core Security Architecture Based on EFI. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1675-1687 [Conf ] The Key-Dependent Attack on Block Ciphers. [Citation Graph (, )][DBLP ] Improved Integral Attacks on MISTY1. [Citation Graph (, )][DBLP ] Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP ] Improved Cryptanalysis of the FOX Block Cipher. [Citation Graph (, )][DBLP ] A synthetic indifferentiability analysis of some block-cipher-based hash functions. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs