2008 |
22 | | Joonsang Baek,
Feng Bao,
Kefei Chen,
Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Springer 2008 |
21 | EE | Zheng Gong,
Xuejia Lai,
Kefei Chen:
A synthetic indifferentiability analysis of some block-cipher-based hash functions.
Des. Codes Cryptography 48(3): 293-305 (2008) |
20 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
2007 |
19 | EE | Xizhe Zhang,
Yong Xie,
Xuejia Lai,
Shensheng Zhang,
Zijian Deng:
A Multi-core Security Architecture Based on EFI.
OTM Conferences (2) 2007: 1675-1687 |
18 | EE | MingXin Lu,
Xuejia Lai,
Guozhen Xiao,
Lei Qin:
Symmetric-key cryptosystem with DNA technology.
Science in China Series F: Information Sciences 50(3): 324-333 (2007) |
2006 |
17 | | Kefei Chen,
Robert H. Deng,
Xuejia Lai,
Jianying Zhou:
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Springer 2006 |
16 | | Xuejia Lai,
Kefei Chen:
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
Springer 2006 |
2005 |
15 | EE | Xiaoyun Wang,
Xuejia Lai,
Dengguo Feng,
Hui Chen,
Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD.
EUROCRYPT 2005: 1-18 |
2000 |
14 | | Xuejia Lai:
Public Key Infrastructure: Managing the e-Business Security.
SEC 2000: 505-505 |
1998 |
13 | EE | Lars R. Knudsen,
Xuejia Lai,
Bart Preneel:
Attacks on Fast Double Block Length Hash Functions.
J. Cryptology 11(1): 59-72 (1998) |
1996 |
12 | | Xuejia Lai,
Rainer A. Rueppel:
Attacks on the HKM/HFX Cryptosystem.
FSE 1996: 1-14 |
1994 |
11 | EE | Lars R. Knudsen,
Xuejia Lai:
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
EUROCRYPT 1994: 410-418 |
10 | | Xuejia Lai:
Additive and Linear Structures of Cryptographic Functions.
FSE 1994: 75-85 |
9 | | Alexander Herrigel,
Xuejia Lai:
Secure IN internetworking.
SMARTNET 1994: 149-158 |
1993 |
8 | EE | Walter Hohl,
Xuejia Lai,
Thomas Meier,
Christian Waldvogel:
Security of Iterated Hash Functions Based on Block Ciphers.
CRYPTO 1993: 379-390 |
7 | | Xuejia Lai,
Lars R. Knudsen:
Attacks on Double Block Length Hash Functions.
FSE 1993: 157-165 |
1992 |
6 | | Xuejia Lai,
Rainer A. Rueppel,
Jack Woollven:
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers.
AUSCRYPT 1992: 339-348 |
5 | EE | Xuejia Lai,
James L. Massey:
Hash Function Based on Block Ciphers.
EUROCRYPT 1992: 55-70 |
1991 |
4 | EE | Xuejia Lai,
James L. Massey:
Markov Ciphers and Differentail Cryptanalysis.
EUROCRYPT 1991: 17-38 |
3 | | H. Bonnenberg,
Andreas Curiger,
Norbert Felber,
Hubert Kaeslin,
Xuejia Lai:
VLSI Implementation of a New Block Cipher.
ICCD 1991: 510-513 |
1990 |
2 | EE | Xuejia Lai,
James L. Massey:
A Proposal for a New Block Encryption Standard.
EUROCRYPT 1990: 389-404 |
1987 |
1 | | Xuejia Lai:
Condition for the nonsingularity of a feedback shift-register over a general finite field.
IEEE Transactions on Information Theory 33(5): 747- (1987) |