Xuejia Lai

From MaRDI portal
Person:522213


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Impossible differential cryptanalysis and a security evaluation framework for AND-RX ciphers
IEEE Transactions on Information Theory
2024-07-23Paper
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers
IEEE Transactions on Information Theory
2024-03-18Paper
Weak rotational property and its application
Designs, Codes and Cryptography
2023-10-12Paper
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
Designs, Codes and Cryptography
2023-09-07Paper
Asymmetric encryption and signature method with DNA technology
Science China Information Sciences
2022-10-28Paper
Improved integral attack on generalized Feistel cipher
Information Security and Cryptology
2022-10-14Paper
Tweaking key-alternating Feistel block ciphers
 
2021-02-23Paper
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys
Science China Information Sciences
2019-11-18Paper
Attacks on the HKM / HFX cryptosystem
Fast Software Encryption
2017-11-15Paper
Transposition of AES key schedule
Information Security and Cryptology
2017-05-05Paper
Generic attacks on the Lai-Massey scheme
Designs, Codes and Cryptography
2017-04-13Paper
Distinguishing properties and applications of higher order derivatives of Boolean functions
Information Sciences
2016-07-08Paper
A unified method for finding impossible differentials of block cipher structures
Information Sciences
2016-01-14Paper
Capacity and data complexity in multidimensional linear attack
Lecture Notes in Computer Science
2015-12-10Paper
What is the effective key length for a block cipher: an attack on every practical block cipher
Science China Information Sciences
2015-11-20Paper
Attacks on a double length blockcipher-based hash proposal
Cryptography and Communications
2015-11-19Paper
On the key schedule of lightweight block ciphers
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Optimal assignment schemes for general access structures based on linear programming
Designs, Codes and Cryptography
2015-03-12Paper
Revisiting key schedule's diffusion in relation with round function's diffusion
Designs, Codes and Cryptography
2014-08-01Paper
Pseudorandomness analysis of the (extended) Lai-Massey scheme
Information Processing Letters
2013-04-04Paper
Preimage attack on reduced DHA-256
 
2012-10-26Paper
Security analysis of cryptographic protocols based on fine-grained freshness
 
2011-09-29Paper
Certificateless key-insulated signature without random oracles
Journal of Zhejiang University. Science A
2011-02-02Paper
On the security of multivariate hash functions
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Formal analysis of authentication in 802.11i
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Strong key-insulated signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Improved efficiency of Kiltz07-KEM
Information Processing Letters
2010-08-20Paper
An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
Wuhan University Journal of Natural Sciences
2010-02-12Paper
The key-dependent attack on block ciphers
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Improved Integral Attacks on MISTY1
Selected Areas in Cryptography
2009-12-09Paper
A synthetic indifferentiability analysis of some block-cipher-based hash functions
Designs, Codes and Cryptography
2009-03-31Paper
Cryptanalysis of the Hash Functions MD4 and RIPEMD
Lecture Notes in Computer Science
2008-05-06Paper
Symmetric-key cryptosystem with DNA technology
Science in China. Series F
2007-10-12Paper
New field of cryptography: DNA cryptography
Chinese Science Bulletin
2007-03-27Paper
Attacks on fast double block length hash functions
Journal of Cryptology
2001-11-22Paper
scientific article; zbMATH DE number 1498330 (Why is no real title available?)
 
2000-08-30Paper
scientific article; zbMATH DE number 1455092 (Why is no real title available?)
 
2000-06-05Paper
scientific article; zbMATH DE number 1149170 (Why is no real title available?)
 
1998-05-06Paper
scientific article; zbMATH DE number 1088934 (Why is no real title available?)
 
1998-04-22Paper
scientific article; zbMATH DE number 1024071 (Why is no real title available?)
 
1997-09-17Paper
scientific article; zbMATH DE number 1024020 (Why is no real title available?)
 
1997-08-14Paper
Higher Order Derivatives and Differential Cryptanalysis
Communications and Cryptography
1996-07-04Paper
scientific article; zbMATH DE number 503327 (Why is no real title available?)
 
1994-02-22Paper
scientific article; zbMATH DE number 177050 (Why is no real title available?)
 
1993-05-18Paper
Markov Ciphers and Differential Cryptanalysis
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
Condition for the nonsingularity of a feedback shift-register over a general finite field (Corresp.)
IEEE Transactions on Information Theory
1987-01-01Paper


Research outcomes over time


This page was built for person: Xuejia Lai