Xuejia Lai
Orcid: 0000-0001-5917-4783
According to our database1,
Xuejia Lai
authored at least 100 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers.
IEEE Trans. Inf. Theory, August, 2024
IEEE Trans. Computers, February, 2024
2023
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework.
Des. Codes Cryptogr., September, 2023
A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis.
Sci. China Inf. Sci., March, 2023
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers.
IEEE Trans. Inf. Theory, February, 2023
2022
Another Perspective on Automatic Construction of Integral Distinguishers for ARX Ciphers.
Symmetry, 2022
KSII Trans. Internet Inf. Syst., 2022
2021
Sci. China Inf. Sci., 2021
2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IET Inf. Secur., 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm.
Comput. J., 2018
New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018
2017
Secur. Commun. Networks, 2017
A new construction on randomized message-locked encryption in the standard model via UCEs.
Sci. China Inf. Sci., 2017
2016
Secur. Commun. Networks, 2016
IACR Cryptol. ePrint Arch., 2016
Sci. China Inf. Sci., 2016
Proceedings of the International Conference on Computer, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IET Inf. Secur., 2015
Optimal assignment schemes for general access structures based on linear programming.
Des. Codes Cryptogr., 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the 10th International Conference on Communications and Networking in China, 2015
2014
Inf. Sci., 2014
Distinguishing properties and applications of higher order derivatives of Boolean functions.
Inf. Sci., 2014
Des. Codes Cryptogr., 2014
What is the effective key length for a block cipher: an attack on every practical block cipher.
Sci. China Inf. Sci., 2014
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys.
Sci. China Inf. Sci., 2014
Proceedings of the Proceedings IEEE International Conference on Security, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014
2013
Proceedings of the Innovations in Bio-inspired Computing and Applications, 2013
Proceedings of the Innovations in Bio-inspired Computing and Applications, 2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
2012
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher.
IACR Cryptol. ePrint Arch., 2012
2011
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
2010
Inf. Process. Lett., 2010
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Global Communications Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Des. Codes Cryptogr., 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
2005
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
2000
Public Key Infrastructure: Managing the e-Business Security.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1998
1996
Proceedings of the Fast Software Encryption, 1996
1994
Secure IN internetworking.
Proceedings of the Intelligent Networks, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Proceedings 1991 IEEE International Conference on Computer Design: VLSI in Computer & Processors, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1987
Condition for the nonsingularity of a feedback shift-register over a general finite field.
IEEE Trans. Inf. Theory, 1987