Cryptographers' World
 

Xuejia Lai


Author's Web Page Link

13 papers in database with 1433 citations StarStar

Editor of 1 conference proceedings book

H-number: 10

Conference Proceedings

 
1. Xuejia LaiKefei Chen, editors, Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings. Springer, 2006. ISBN 3-540-49475-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Zheng Gong,  Xuejia Lai,  Kefei Chen,  A synthetic indifferentiability analysis of some block-cipher-based hash functions, Designs, Codes and Cryptography, Volume 48(3), pp. 293 - 305, Springer, 2008.

[Electronic Edition][Cited 2 times ]

2. Lars R. Knudsen,  Xuejia Lai,  Bart Preneel,  Attacks on Fast Double Block Length Hash Functions, Journal of Cryptology, Volume 11(1), pp. 59 - 72, Springer, 1998.

[Cited 57 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Xiaorui Sun,  Xuejia Lai,  The Key-Dependent Attack on Block Ciphers, pp. 19 - 36, ASIACRYPT 2009.

[Electronic Edition][No citation]

2. Xiaoyun Wang,  Xuejia Lai,  Dengguo Feng,  Hui Chen,  Xiuyuan Yu,  Cryptanalysis of the Hash Functions MD4 and RIPEMD, pp. 1 - 18, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 304 times Red StarRed StarRed Star]

3. Xuejia Lai,  Rainer A. Rueppel,  Attacks on the HKM/HFX Cryptosystem, pp. 1 - 14, FSE 1996.

[Electronic Edition][No citation]

4. Xuejia Lai,  Additive and Linear Structures of Cryptographic Functions, pp. 75 - 85, FSE 1994.

[Electronic Edition][Cited 15 times ]

5. Lars R. Knudsen,  Xuejia Lai,  New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM, pp. 410 - 418, EUROCRYPT 1994.

[Electronic Edition][Cited 18 times ]

6. Xuejia Lai,  Lars R. Knudsen,  Attacks on Double Block Length Hash Functions, pp. 157 - 165, FSE 1993.

[Electronic Edition][Cited 11 times ]

7. Walter Hohl,  Xuejia Lai,  Thomas Meier,  Christian Waldvogel,  Security of Iterated Hash Functions Based on Block Ciphers, pp. 379 - 390, CRYPTO 1993.

[Electronic Edition][Cited 43 times ]

8. Xuejia Lai,  Rainer A. Rueppel,  Jack Woollven,  A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers, pp. 339 - 348, ASIACRYPT 1992.

[Electronic Edition][Cited 26 times ]

9. Xuejia Lai,  James L. Massey,  Hash Functions Based on Block Ciphers, pp. 55 - 70, EUROCRYPT 1992.

[Electronic Edition][Cited 130 times Red StarRed Star]

10. Xuejia Lai,  James L. Massey,  Markov Ciphers and Differential Cryptanalysis, pp. 17 - 38, EUROCRYPT 1991.

[Electronic Edition][Cited 434 times Red StarRed StarRed Star]

11. Xuejia Lai,  James L. Massey,  A Proposal for a New Block Encryption Standard, pp. 389 - 404, EUROCRYPT 1990.

[Electronic Edition][Cited 393 times Red StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...