default search action
Xuejia Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. IEEE Trans. Computers 73(2): 613-620 (2024) - [j46]Kai Zhang, Senpeng Wang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Tairong Shi:
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 70(8): 6025-6040 (2024) - 2023
- [j45]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu:
A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci. China Inf. Sci. 66(3) (2023) - [j44]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. Des. Codes Cryptogr. 91(9): 2845-2878 (2023) - [j43]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Weak rotational property and its application. Des. Codes Cryptogr. 91(10): 3187-3214 (2023) - [j42]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Selecting Rotation Constants on SIMON-Type Ciphers. J. Database Manag. 34(1): 1-23 (2023) - [j41]Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers. IEEE Trans. Inf. Theory 69(2): 1282-1294 (2023) - 2022
- [j40]Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Research on the Security Level of μ2 against Impossible Differential cryptanalysis. KSII Trans. Internet Inf. Syst. 16(3): 972-985 (2022) - [j39]Kai Zhang, Xuejia Lai:
Another Perspective on Automatic Construction of Integral Distinguishers for ARX Ciphers. Symmetry 14(3): 461 (2022) - 2021
- [j38]Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure key-alternating Feistel ciphers without key schedule. Sci. China Inf. Sci. 64(1) (2021) - [j37]Siyu Pang, Tingting Lin, Xuejia Lai, Zheng Gong:
A White-Box Implementation of IDEA. Symmetry 13(6): 1066 (2021) - 2020
- [j36]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [c38]Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai:
Tweaking Key-Alternating Feistel Block Ciphers. ACNS (1) 2020: 69-88 - [i23]Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure Key-Alternating Feistel Ciphers Without Key Schedule. IACR Cryptol. ePrint Arch. 2020: 288 (2020)
2010 – 2019
- 2019
- [j35]Hailun Yan, Yiyuan Luo, Mo Chen, Xuejia Lai:
New observation on the key schedule of RECTANGLE. Sci. China Inf. Sci. 62(3): 32108:1-32108:13 (2019) - [j34]Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu, Yiran Xing:
New zero-sum distinguishers on full 24-round Keccak-f using the division property. IET Inf. Secur. 13(5): 469-478 (2019) - [c37]Zhichao Xu, Hong Xu, Xuejia Lai:
Improved Integral Attack on Generalized Feistel Cipher. Inscrypt 2019: 463-479 - [c36]Tingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu:
Software Tamper Resistance Based on White-Box SMS4 Implementation. iSCI 2019: 486-495 - [e7]Guojun Wang, Abdulmotaleb El-Saddik, Xuejia Lai, Gregorio Martínez Pérez, Kim-Kwang Raymond Choo:
Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1122, Springer 2019, ISBN 978-981-15-1300-8 [contents] - 2018
- [j33]Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia:
Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm. Comput. J. 61(12): 1783-1790 (2018) - [c35]Yiran Xing, Hailun Yan, Xuejia Lai:
New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation. CSAE 2018: 8:1-8:6 - 2017
- [j32]Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen:
A new construction on randomized message-locked encryption in the standard model via UCEs. Sci. China Inf. Sci. 60(5): 52101 (2017) - [j31]Yiyuan Luo, Xuejia Lai, Yujie Zhou:
Generic attacks on the Lai-Massey scheme. Des. Codes Cryptogr. 83(2): 407-423 (2017) - [j30]Tingting Lin, Xuejia Lai, Weijia Xue, Yin Jia:
A New Feistel-Type White-Box Encryption Scheme. J. Comput. Sci. Technol. 32(2): 386-395 (2017) - [j29]Yiyuan Luo, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. Secur. Commun. Networks 2017: 5980251:1-5980251:9 (2017) - [i22]Yiyuan Luo, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. IACR Cryptol. ePrint Arch. 2017: 1209 (2017) - 2016
- [j28]Tingting Lin, Xuejia Lai, Weijia Xue, Geshi Huang:
Discussion on the theoretical results of white-box cryptography. Sci. China Inf. Sci. 59(11): 112101 (2016) - [j27]Weijia Xue, Tingting Lin, Xin Shun, Fenglei Xue, Xuejia Lai:
On the estimation of the second largest eigenvalue of Markov ciphers. Secur. Commun. Networks 9(13): 2093-2099 (2016) - [c34]Jialin Huang, Hailun Yan, Xuejia Lai:
Transposition of AES Key Schedule. Inscrypt 2016: 84-102 - [c33]Yin Jia, Tingting Lin, Xuejia Lai:
A generic attack against white box implementation of block ciphers. CITS 2016: 1-5 - [i21]Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. IACR Cryptol. ePrint Arch. 2016: 51 (2016) - 2015
- [j26]Yiyuan Luo, Xuejia Lai, Tiejun Jia:
Attacks on a double length blockcipher-based hash proposal. Cryptogr. Commun. 7(3): 289-295 (2015) - [j25]Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li:
Survey on cyberspace security. Sci. China Inf. Sci. 58(11): 1-43 (2015) - [j24]Qiang Li, Xiangxue Li, Xuejia Lai, Kefei Chen:
Optimal assignment schemes for general access structures based on linear programming. Des. Codes Cryptogr. 74(3): 623-644 (2015) - [j23]Hong Xu, Yonghui Zheng, Xuejia Lai:
Construction of perfect diffusion layers from linear feedback shift registers. IET Inf. Secur. 9(2): 127-135 (2015) - [j22]Weijia Xue, Xuejia Lai:
Impossible differential cryptanalysis of MARS-like structures. IET Inf. Secur. 9(4): 219-222 (2015) - [j21]Yiyuan Luo, Xuejia Lai, Jing Hu:
The Pseudorandomness of Many-Round Lai-Massey Scheme. J. Inf. Sci. Eng. 31(3): 1085-1096 (2015) - [c32]Zhen Ju, Peiyuan Liu, Weijia Xue, Daoguang Mu, Xuejia Lai:
On the equivalence of LBlock and TWINE in structure. ChinaCom 2015: 289-294 - [c31]Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. CRYPTO (1) 2015: 141-160 - [c30]Hong Xu, Ping Jia, Geshi Huang, Xuejia Lai:
Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s. ICICS 2015: 97-108 - 2014
- [j20]Jialin Huang, Xuejia Lai:
What is the effective key length for a block cipher: an attack on every practical block cipher. Sci. China Inf. Sci. 57(7): 1-11 (2014) - [j19]Xiwen Fang, Xuejia Lai:
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys. Sci. China Inf. Sci. 57(9): 1-10 (2014) - [j18]Jialin Huang, Xuejia Lai:
Revisiting key schedule's diffusion in relation with round function's diffusion. Des. Codes Cryptogr. 73(1): 85-103 (2014) - [j17]Yiyuan Luo, Xuejia Lai, Zhongming Wu, Guang Gong:
A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263: 211-220 (2014) - [j16]Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, Xuejia Lai:
Distinguishing properties and applications of higher order derivatives of Boolean functions. Inf. Sci. 271: 224-235 (2014) - [c29]Xiwen Fang, Xuejia Lai:
DNA-Chip-Based Information Hiding Scheme. BIC-TA 2014: 123-127 - [c28]Jialin Huang, Serge Vaudenay, Xuejia Lai:
On the Key Schedule of Lightweight Block Ciphers. INDOCRYPT 2014: 124-142 - [c27]Hong Xu, Lin Tan, Xuejia Lai:
On the Recursive Construction of MDS Matrices for Lightweight Cryptography. ISPEC 2014: 552-563 - [c26]Rui Luo, Xuejia Lai, Rong You:
A new attempt of white-box AES implementation. SPAC 2014: 423-429 - 2013
- [j15]Jialin Huang, Xuejia Lai:
Chosen-plaintext linear attacks on Serpent. IET Inf. Secur. 7(4): 293-299 (2013) - [c25]Chengbing Liu, Xuejia Lai:
Evaluation of Statistical Tests for Randomness Using Conditional Entropy. CyberC 2013: 504-509 - [c24]Xiwen Fang, Xuejia Lai:
Multiplier System in the Tile Assembly Model with Reduced Tileset-Size. IBICA 2013: 95-104 - [c23]Xiwen Fang, Xuejia Lai:
Modular Algorithm in Tile Self-assembly Model. IBICA 2013: 133-142 - [i20]Yiyuan Luo, Xuejia Lai:
Attacks on JH, Grstl and SMASH Hash Functions. IACR Cryptol. ePrint Arch. 2013: 233 (2013) - 2012
- [j14]Jianying Zhou, Xuejia Lai, Hui Li:
Message from the Guest Editors. Int. J. Inf. Sec. 11(5): 291-292 (2012) - [j13]Jinmin Zhong, Xuejia Lai:
Improved preimage attack on one-block MD4. J. Syst. Softw. 85(4): 981-994 (2012) - [i19]Jialin Huang, Xuejia Lai:
Transposition of AES Key Schedule. IACR Cryptol. ePrint Arch. 2012: 260 (2012) - [i18]Jialin Huang, Xuejia Lai:
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion. IACR Cryptol. ePrint Arch. 2012: 415 (2012) - [i17]Jialin Huang, Xuejia Lai:
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher. IACR Cryptol. ePrint Arch. 2012: 677 (2012) - 2011
- [j12]Zhong-Mei Wan, Jian Weng, Xuejia Lai, Shengli Liu, Jiguo Li:
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption. J. Inf. Sci. Eng. 27(1): 243-259 (2011) - [j11]Jinmin Zhong, Xuejia Lai:
Preimage Attack on Reduced DHA-256. J. Inf. Sci. Eng. 27(4): 1315-1327 (2011) - [c22]Yiyuan Luo, Xuejia Lai, Zheng Gong:
Indifferentiability of Domain Extension Modes for Hash Functions. INTRUST 2011: 138-155 - [e6]Xuejia Lai, Moti Yung, Dongdai Lin:
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6584, Springer 2011, ISBN 978-3-642-21517-9 [contents] - [e5]Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li:
Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 56, Springer 2011, ISBN 978-3-642-23601-3 [contents] - [e4]Xuejia Lai, Jianying Zhou, Hui Li:
Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings. Lecture Notes in Computer Science 7001, Springer 2011, ISBN 978-3-642-24860-3 [contents] - [i16]Ming Duan, Xuejia Lai:
Improved zero-sum distinguisher for full round Keccak-f permutation. IACR Cryptol. ePrint Arch. 2011: 23 (2011) - [i15]Yiyuan Luo, Xuejia Lai:
Attacks On a Double Length Blockcipher-based Hash Proposal. IACR Cryptol. ePrint Arch. 2011: 238 (2011) - 2010
- [j10]Xuejia Lai, MingXin Lu, Lei Qin, Junsong Han, Xiwen Fang:
Asymmetric encryption and signature method with DNA technology. Sci. China Inf. Sci. 53(3): 506-514 (2010) - [j9]Yiyuan Luo, Xuejia Lai, Zheng Gong:
Pseudorandomness analysis of the (extended) Lai-Massey scheme. Inf. Process. Lett. 111(2): 90-96 (2010) - [c21]Yiyuan Luo, Qi Chai, Guang Gong, Xuejia Lai:
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication. GLOBECOM 2010: 1-6 - [c20]Jialin Huang, Xuejia Lai:
Measuring Random Tests by Conditional Entropy and Optimal Execution Order. INTRUST 2010: 148-159 - [i14]Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu:
Distinguishing Properties of Higher Order Derivatives of Boolean Functions. IACR Cryptol. ePrint Arch. 2010: 417 (2010) - [i13]Jinmin Zhong, Xuejia Lai:
Improved Preimage Attack on One-block MD4. IACR Cryptol. ePrint Arch. 2010: 583 (2010) - [i12]Yiyuan Luo, Xuejia Lai:
More Insights on Blockcipher-Based Hash Functions. IACR Cryptol. ePrint Arch. 2010: 642 (2010)
2000 – 2009
- 2009
- [j8]Xianhui Lu, Xuejia Lai, Dake He:
Improved efficiency of Kiltz07-KEM. Inf. Process. Lett. 109(18): 1093-1096 (2009) - [j7]Ling Dong, Kefei Chen, Xuejia Lai, Mi Wen:
When is a key establishment protocol correct? Secur. Commun. Networks 2(6): 567-579 (2009) - [c19]Xiaorui Sun, Xuejia Lai:
The Key-Dependent Attack on Block Ciphers. ASIACRYPT 2009: 19-36 - [c18]Zhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu:
Improved Cryptanalysis of the FOX Block Cipher. INTRUST 2009: 236-249 - [c17]Bo Zhu, Kefei Chen, Xuejia Lai:
Bitwise Higher Order Differential Cryptanalysis. INTRUST 2009: 250-262 - [c16]Xiaorui Sun, Xuejia Lai:
Improved Integral Attacks on MISTY1. Selected Areas in Cryptography 2009: 266-280 - [i11]Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai:
Revisiting the Indifferentiability of PGV Hash Functions. IACR Cryptol. ePrint Arch. 2009: 265 (2009) - [i10]Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu:
Pseudorandomness Analysis of the Lai-Massey Scheme. IACR Cryptol. ePrint Arch. 2009: 266 (2009) - [i9]Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo:
Impossible Differential Cryptanalysis of FOX. IACR Cryptol. ePrint Arch. 2009: 357 (2009) - [i8]Jinmin Zhong, Xuejia Lai:
Preimage Attacks on Reduced DHA-256. IACR Cryptol. ePrint Arch. 2009: 552 (2009) - [i7]Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong:
A Unified Method for Finding Impossible Differentials of Block Cipher Structures. IACR Cryptol. ePrint Arch. 2009: 627 (2009) - 2008
- [j6]Zheng Gong, Xuejia Lai, Kefei Chen:
A synthetic indifferentiability analysis of some block-cipher-based hash functions. Des. Codes Cryptogr. 48(3): 293-305 (2008) - [j5]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [e3]Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4 [contents] - [i6]Xianhui Lu, Xuejia Lai, Dake He:
Improved efficiency of Kiltz07-KEM. IACR Cryptol. ePrint Arch. 2008: 312 (2008) - [i5]Yiyuan Luo, Xuejia Lai:
Higher Order Differential Cryptanalysis of Multivariate Hash Functions. IACR Cryptol. ePrint Arch. 2008: 350 (2008) - 2007
- [j4]MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin:
Symmetric-key cryptosystem with DNA technology. Sci. China Ser. F Inf. Sci. 50(3): 324-333 (2007) - [j3]Jie Liang, Xuejia Lai:
Improved Collision Attack on Hash Function MD5. J. Comput. Sci. Technol. 22(1): 79-87 (2007) - [c15]Xizhe Zhang, Yong Xie, Xuejia Lai, Shensheng Zhang, Zijian Deng:
A Multi-core Security Architecture Based on EFI. OTM Conferences (2) 2007: 1675-1687 - [c14]Zijian Deng, Xuejia Lai:
A New Architecture of Sensitive File Management Based on Dual-Core and EFI. SITIS 2007: 183-189 - [i4]Xianhui Lu, Xuejia Lai, Dake He, Guomin Li:
Weak adaptive chosen ciphertext secure hybrid encryption scheme. IACR Cryptol. ePrint Arch. 2007: 447 (2007) - [i3]Zheng Gong, Xuejia Lai, Kefei Chen:
A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions. IACR Cryptol. ePrint Arch. 2007: 465 (2007) - 2006
- [e2]Xuejia Lai, Kefei Chen:
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings. Lecture Notes in Computer Science 4284, Springer 2006, ISBN 3-540-49475-8 [contents] - [e1]Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou:
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings. Lecture Notes in Computer Science 3903, Springer 2006, ISBN 3-540-33052-6 [contents] - 2005
- [c13]Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 - [i2]Jie Liang, Xuejia Lai:
Improved Collision Attack on Hash Function MD5. IACR Cryptol. ePrint Arch. 2005: 425 (2005) - 2004
- [i1]Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu:
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. IACR Cryptol. ePrint Arch. 2004: 199 (2004) - 2000
- [c12]Xuejia Lai:
Public Key Infrastructure: Managing the e-Business Security. SEC 2000: 505-505
1990 – 1999
- 1998
- [j2]Lars R. Knudsen, Xuejia Lai, Bart Preneel:
Attacks on Fast Double Block Length Hash Functions. J. Cryptol. 11(1): 59-72 (1998) - 1996
- [c11]Xuejia Lai, Rainer A. Rueppel:
Attacks on the HKM/HFX Cryptosystem. FSE 1996: 1-14 - 1994
- [c10]Lars R. Knudsen, Xuejia Lai:
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. EUROCRYPT 1994: 410-418 - [c9]Xuejia Lai:
Additive and Linear Structures of Cryptographic Functions. FSE 1994: 75-85 - [c8]Alexander Herrigel, Xuejia Lai:
Secure IN internetworking. SMARTNET 1994: 149-158 - 1993
- [c7]Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel:
Security of Iterated Hash Functions Based on Block Ciphers. CRYPTO 1993: 379-390 - [c6]Xuejia Lai, Lars R. Knudsen:
Attacks on Double Block Length Hash Functions. FSE 1993: 157-165 - 1992
- [b1]Xuejia Lai:
On the design and security of block ciphers. ETH Zurich, Zürich, Switzerland, Hartung-Gorre 1992, ISBN 978-3-89191-573-8, pp. 1-108 - [c5]Xuejia Lai, Rainer A. Rueppel, Jack Woollven:
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. AUSCRYPT 1992: 339-348 - [c4]Xuejia Lai, James L. Massey:
Hash Function Based on Block Ciphers. EUROCRYPT 1992: 55-70 - 1991
- [c3]Xuejia Lai, James L. Massey, Sean Murphy:
Markov Ciphers and Differential Cryptanalysis. EUROCRYPT 1991: 17-38 - [c2]Heinz Bonnenberg, Andreas Curiger, Norbert Felber, Hubert Kaeslin, Xuejia Lai:
VLSI Implementation of a New Block Cipher. ICCD 1991: 510-513 - 1990
- [c1]Xuejia Lai, James L. Massey:
A Proposal for a New Block Encryption Standard. EUROCRYPT 1990: 389-404
1980 – 1989
- 1987
- [j1]Xuejia Lai:
Condition for the nonsingularity of a feedback shift-register over a general finite field. IEEE Trans. Inf. Theory 33(5): 747-749 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint