The SCEAS System
| |||||||

## Search the dblp DataBase
Xuejia Lai:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xuejia Lai, Rainer A. Rueppel, Jack Woollven
**A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:339-348 [Conf] - Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel
**Security of Iterated Hash Functions Based on Block Ciphers.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:379-390 [Conf] - Lars R. Knudsen, Xuejia Lai
**New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:410-418 [Conf] - Xuejia Lai, James L. Massey
**A Proposal for a New Block Encryption Standard.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:389-404 [Conf] - Xuejia Lai, James L. Massey
**Markov Ciphers and Differentail Cryptanalysis.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:17-38 [Conf] - Xuejia Lai, James L. Massey
**Hash Function Based on Block Ciphers.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:55-70 [Conf] - Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu
**Cryptanalysis of the Hash Functions MD4 and RIPEMD.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:1-18 [Conf] - Xuejia Lai
**Additive and Linear Structures of Cryptographic Functions.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1994, pp:75-85 [Conf] - Xuejia Lai, Lars R. Knudsen
**Attacks on Double Block Length Hash Functions.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1993, pp:157-165 [Conf] - Xuejia Lai, Rainer A. Rueppel
**Attacks on the HKM/HFX Cryptosystem.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1996, pp:1-14 [Conf] - H. Bonnenberg, Andreas Curiger, Norbert Felber, Hubert Kaeslin, Xuejia Lai
**VLSI Implementation of a New Block Cipher.**[Citation Graph (0, 0)][DBLP] ICCD, 1991, pp:510-513 [Conf] - Xuejia Lai
**Public Key Infrastructure: Managing the e-Business Security.**[Citation Graph (0, 0)][DBLP] SEC, 2000, pp:505-505 [Conf] - Alexander Herrigel, Xuejia Lai
**Secure IN internetworking.**[Citation Graph (0, 0)][DBLP] SMARTNET, 1994, pp:149-158 [Conf] - Lars R. Knudsen, Xuejia Lai, Bart Preneel
**Attacks on Fast Double Block Length Hash Functions.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1998, v:11, n:1, pp:59-72 [Journal] - Xuejia Lai
**Condition for the nonsingularity of a feedback shift-register over a general finite field.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:747-0 [Journal] - Xizhe Zhang, Yong Xie, Xuejia Lai, Shensheng Zhang, Zijian Deng
**A Multi-core Security Architecture Based on EFI.**[Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2007, pp:1675-1687 [Conf] **The Key-Dependent Attack on Block Ciphers.**[Citation Graph (, )][DBLP]**Improved Integral Attacks on MISTY1.**[Citation Graph (, )][DBLP]**Bitwise Higher Order Differential Cryptanalysis.**[Citation Graph (, )][DBLP]**Improved Cryptanalysis of the FOX Block Cipher.**[Citation Graph (, )][DBLP]**A synthetic indifferentiability analysis of some block-cipher-based hash functions.**[Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |