Xuejia Lai
Xuejia Lai
Email verificata su cs.sjtu.edu.cn
Citata da
Citata da
A proposal for a new block encryption standard
X Lai, JL Massey
Workshop on the Theory and Application of of Cryptographic Techniques, 389-404, 1990
Markov ciphers and differential cryptanalysis
X Lai, JL Massey, S Murphy
Workshop on the Theory and Application of of Cryptographic Techniques, 17-38, 1991
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD.
X Wang, D Feng, X Lai, H Yu
IACR Cryptol. ePrint Arch. 2004, 199, 2004
Cryptanalysis of the Hash Functions MD4 and RIPEMD
X Wang, X Lai, D Feng, H Chen, X Yu
Annual international conference on the theory and applications of…, 2005
On the design and security of block ciphers
X Lai
ETH Zurich, 1992
Higher order derivatives and differential cryptanalysis
X Lai
Communications and cryptography, 227-233, 1994
Hash functions based on block ciphers
X Lai, JL Massey
Workshop on the Theory and Application of of Cryptographic Techniques, 55-70, 1992
New field of cryptography: DNA cryptography
G Xiao, M Lu, L Qin, X Lai
Chinese Science Bulletin 51 (12), 1413-1420, 2006
A secure implementation of white-box AES
Y Xiao, X Lai
2009 2nd International Conference on Computer Science and its Applications, 1-6, 2009
Device for the Conversion of a Digital Block and Use of Same
JL Massey, X Lai
US Patent 5,214,703, 1993
Improved collision attack on hash function MD5
J Liang, XJ Lai
Journal of Computer Science and Technology 22 (1), 79-87, 2007
Survey on cyberspace security
HG Zhang, WB Han, X Lai, D Lin, JF Ma, JH Li
Science China Information Sciences 58 (11), 1-43, 2015
Attacks on fast double block length hash functions
LR Knudsen, X Lai, B Preneel
Journal of Cryptology 11 (1), 59-72, 1998
Symmetric-key cryptosystem with DNA technology
MX Lu, XJ Lai, GZ Xiao, L Qin
Science in China Series F: Information Sciences 50 (3), 324-333, 2007
Asymmetric encryption and signature method with DNA technology
XJ Lai, MX Lu, L Qin, JS Han, XW Fang
Science China Information Sciences 53 (3), 506-514, 2010
Security of iterated hash functions based on block ciphers
W Hohl, X Lai, T Meier, C Waldvogel
Annual International Cryptology Conference, 379-390, 1993
A lightweight stream cipher WG-7 for RFID encryption and authentication
Y Luo, Q Chai, G Gong, X Lai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
A unified method for finding impossible differentials of block cipher structures
Y Luo, X Lai, Z Wu, G Gong
Information Sciences 263, 211-220, 2014
Collisions for hash functions MD4
X Wang, D Feng, X Lai, H Yu
MD5, HAVAL-128 and RIPEMD, rump session of Crypto 4, 2004
Additive and linear structures of cryptographic functions
X Lai
International Workshop on Fast Software Encryption, 75-85, 1994
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20