l X. Lai, J. L. Massey and S. Murphy, ''Markov Ciphers and Differential Cryptanalysis'', Advances in Cryptology -- EUROCRYPT'91, Proceedings, LNCS 547, pp. 17-38, Springer-Verlag, Berlin, 1992
l X. Lai and J. L. Massey, ''Hash Functions based on Block Ciphers'', Advances in Cryptology -- EUROCRYPT'92 Proceedings, LNCS 658, pp. 55-70, Springer-Verlag, 1993
l X. Lai, "Higher order derivatives and differential cryptanalysis'', pp. 227-233 in Communications and Cryptography, Edt. R.E. Blahut, Kluwer Academic Publishers, 1994
l L. Knudsen, X. Lai and B. Preneel, "Attacks on fast double block length hash functions", J. Cryptology, (1998) 11: 59-72
l Xiaoyun Wang, Xuejia Lai, Dengguo Feng: Cryptanalysis of the Hash Functions MD4 and RIPEMD, EUROCRYPT 2005, LNCS 3494, pp.1-18, Springer-Verlag, 2005
l Xiaorui Sun and Xuejia Lai, The Key-Dependent Attack on Block Ciphers, Proceedings of Asiacrypt2009,LNCS 5912, pp19-36. Springer,2009
l XueJia Lai, MingXin Lu, Lei Qin, JunSong Han & XiWen Fang,Asymmetric encryption and signature method with DNA technology, Science China Information Sciences, Volume 53 Number 3, 506 – 514, 2010
l Yaying Xiao and Xuejia Lai,A Secure Implementation of White-Box AES, 2nd International Conference on Computer Science and its Applications 10-12 Dec. 2009,CSA '09
l Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, Xuejia Lai, Distinguishing Properties and Applications of Higher Order Derivatives of Boolean Functions,Information Sciences, 271(224-235),2014
l Yiyuan Luo; Xuejia Lai; Zhongming Wu; Guang Gong,A Unified Method for Finding Impossible Differentials of Block Cipher Structures. Information Sciences 263 (2014) 211–220,10.1016
l Jialin Huang and Xuejia Lai, ”Revisiting Key Schedule’s Diffusion In Relation With Round Function’s Diffusion”, Designs, Codes and Cryptography. (2014) 73:85–103.
l Jialin Huang and Xuejia Lai, What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher, SCIENCE CHINA Information Sciences, 57(7): 1-11.