The following pages link to Xuejia Lai (Q522213):
Displaying 28 items.
- Generic attacks on the Lai-Massey scheme (Q522214) (← links)
- Formal analysis of authentication in 802.11i (Q615212) (← links)
- On the security of multivariate hash functions (Q615226) (← links)
- Strong key-insulated signature in the standard model (Q615357) (← links)
- Certificateless key-insulated signature without random oracles (Q621463) (← links)
- Distinguishing properties and applications of higher order derivatives of Boolean functions (Q726339) (← links)
- New field of cryptography: DNA cryptography (Q871844) (← links)
- Attacks on a double length blockcipher-based hash proposal (Q892386) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- A unified method for finding impossible differentials of block cipher structures (Q903652) (← links)
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- Attacks on fast double block length hash functions (Q1382149) (← links)
- Pseudorandomness analysis of the (extended) Lai-Massey scheme (Q1944043) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Optimal assignment schemes for general access structures based on linear programming (Q2260793) (← links)
- DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys (Q2335945) (← links)
- Symmetric-key cryptosystem with DNA technology (Q2385402) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- On the Key Schedule of Lightweight Block Ciphers (Q2945378) (← links)
- Transposition of AES Key Schedule (Q2980847) (← links)
- (Q3165327) (← links)
- (Q3170753) (← links)
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis (Q3403215) (← links)
- Asymmetric encryption and signature method with DNA technology (Q5046379) (← links)
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework (Q6048704) (← links)
- Weak rotational property and its application (Q6074020) (← links)
- Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers (Q6193594) (← links)