A proposal for a new block encryption standard X Lai, JL Massey Advances in Cryptology—EUROCRYPT’90: Workshop on the Theory and Application …, 1991 | 1181 | 1991 |
Markov ciphers and differential cryptanalysis X Lai, JL Massey, S Murphy Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application …, 1991 | 1075 | 1991 |
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD X Wang, D Feng, X Lai, H Yu Cryptology ePrint Archive, 2004 | 704 | 2004 |
Cryptanalysis of the Hash Functions MD4 and RIPEMD X Wang, X Lai, D Feng, H Chen, X Yu Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 656 | 2005 |
On the design and security of block ciphers X Lai ETH Zurich, 1992 | 635 | 1992 |
Higher order derivatives and differential cryptanalysis X Lai Communications and Cryptography: Two Sides of One Tapestry, 227-233, 1994 | 616 | 1994 |
Hash functions based on block ciphers X Lai, JL Massey Workshop on the Theory and Application of of Cryptographic Techniques, 55-70, 1992 | 337 | 1992 |
New field of cryptography: DNA cryptography G Xiao, M Lu, L Qin, X Lai Chinese Science Bulletin 51, 1413-1420, 2006 | 241 | 2006 |
A secure implementation of white-box AES Y Xiao, X Lai 2009 2nd International Conference on Computer Science and its Applications, 1-6, 2009 | 179 | 2009 |
Improved collision attack on hash function MD5 J Liang, XJ Lai Journal of Computer Science and Technology 22 (1), 79-87, 2007 | 124 | 2007 |
Survey on cyberspace security H Zhang, W Han, X Lai, D Lin, J Ma, JH Li Science China Information Sciences 58, 1-43, 2015 | 123 | 2015 |
Device for the Conversion of a Digital Block and Use of Same JL Massey, X Lai US Patent 5,214,703, 1993 | 123 | 1993 |
Asymmetric encryption and signature method with DNA technology XJ Lai, MX Lu, L Qin, JS Han, XW Fang Science China Information Sciences 53, 506-514, 2010 | 103 | 2010 |
A unified method for finding impossible differentials of block cipher structures Y Luo, X Lai, Z Wu, G Gong Information Sciences 263, 211-220, 2014 | 99 | 2014 |
Symmetric-key cryptosystem with DNA technology MX Lu, XJ Lai, GZ Xiao, L Qin Science in China Series F: Information Sciences 50, 324-333, 2007 | 97 | 2007 |
A lightweight stream cipher WG-7 for RFID encryption and authentication Y Luo, Q Chai, G Gong, X Lai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 92 | 2010 |
Attacks on fast double block length hash functions LR Knudsen, X Lai, B Preneel Journal of Cryptology 11 (1), 59-72, 1998 | 92 | 1998 |
Security of iterated hash functions based on block ciphers W Hohl, X Lai, T Meier, C Waldvogel Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994 | 78 | 1994 |
Collisions for hash functions MD4 X Wang, D Feng, X Lai, H Yu MD5, HAVAL-128 and RIPEMD, rump session of Crypto 4, 2004 | 76 | 2004 |
Additive and linear structures of cryptographic functions X Lai Fast Software Encryption: Second International Workshop Leuven, Belgium …, 1995 | 72 | 1995 |