↓ Skip to main content

Advances in Cryptology – ASIACRYPT 2012

Overview of attention for book
Cover of 'Advances in Cryptology – ASIACRYPT 2012'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Pairing-Based Cryptography: Past, Present, and Future
  3. Altmetric Badge
    Chapter 2 Some Mathematical Mysteries in Lattices
  4. Altmetric Badge
    Chapter 3 Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
  5. Altmetric Badge
    Chapter 4 Dual Form Signatures: An Approach for Proving Security from Static Assumptions
  6. Altmetric Badge
    Chapter 5 Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
  7. Altmetric Badge
    Chapter 6 On the (Im)possibility of Projecting Property in Prime-Order Setting
  8. Altmetric Badge
    Chapter 7 Optimal Reductions of Some Decisional Problems to the Rank Problem
  9. Altmetric Badge
    Chapter 8 Signature Schemes Secure against Hard-to-Invert Leakage
  10. Altmetric Badge
    Chapter 9 Completeness for Symmetric Two-Party Functionalities - Revisited
  11. Altmetric Badge
    Chapter 10 Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
  12. Altmetric Badge
    Chapter 11 The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions
  13. Altmetric Badge
    Chapter 12 Perfect Algebraic Immune Functions
  14. Altmetric Badge
    Chapter 13 Differential Analysis of the LED Block Cipher
  15. Altmetric Badge
    Chapter 14 PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
  16. Altmetric Badge
    Chapter 15 Analysis of Differential Attacks in ARX Constructions
  17. Altmetric Badge
    Chapter 16 Integral and Multidimensional Linear Distinguishers with Correlation Zero
  18. Altmetric Badge
    Chapter 17 Differential Attacks against Stream Cipher ZUC
  19. Altmetric Badge
    Chapter 18 An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
  20. Altmetric Badge
    Chapter 19 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
  21. Altmetric Badge
    Chapter 20 Understanding Adaptivity: Random Systems Revisited
  22. Altmetric Badge
    Chapter 21 RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
  23. Altmetric Badge
    Chapter 22 Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
  24. Altmetric Badge
    Chapter 23 Computing on Authenticated Data: New Privacy Definitions and Constructions
  25. Altmetric Badge
    Chapter 24 A Coding-Theoretic Approach to Recovering Noisy RSA Keys
  26. Altmetric Badge
    Chapter 25 Certifying RSA
  27. Altmetric Badge
    Chapter 26 Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
  28. Altmetric Badge
    Chapter 27 Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
  29. Altmetric Badge
    Chapter 28 On Polynomial Systems Arising from a Weil Descent
  30. Altmetric Badge
    Chapter 29 ECM at Work
  31. Altmetric Badge
    Chapter 30 IND-CCA Secure Cryptography Based on a Variant of the LPN Problem
  32. Altmetric Badge
    Chapter 31 Provable Security of the Knudsen-Preneel Compression Functions
  33. Altmetric Badge
    Chapter 32 Optimal Collision Security in Double Block Length Hashing with Single Length Key
  34. Altmetric Badge
    Chapter 33 Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings
  35. Altmetric Badge
    Chapter 34 Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
  36. Altmetric Badge
    Chapter 35 Generic Related-Key Attacks for HMAC
  37. Altmetric Badge
    Chapter 36 The Five-Card Trick Can Be Done with Four Cards
  38. Altmetric Badge
    Chapter 37 A Mix-Net from Any CCA2 Secure Cryptosystem
  39. Altmetric Badge
    Chapter 38 How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
  40. Altmetric Badge
    Chapter 39 Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
  41. Altmetric Badge
    Chapter 40 Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
  42. Altmetric Badge
    Chapter 41 Calling Out Cheaters: Covert Security with Public Verifiability
  43. Altmetric Badge
    Chapter 42 A Unified Framework for UC from Only OT
  44. Altmetric Badge
    Chapter 43 Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
  45. Altmetric Badge
    Chapter 44 Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
  46. Altmetric Badge
    Chapter 45 Theory and Practice of a Leakage Resilient Masking Scheme
  47. Altmetric Badge
    Chapter 46 Erratum: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
Attention for Chapter 38: How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age
  • Above-average Attention Score compared to outputs of the same age and source (58th percentile)

Mentioned by

twitter
3 X users

Citations

dimensions_citation
11 Dimensions

Readers on

mendeley
79 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
Chapter number 38
Book title
Advances in Cryptology – ASIACRYPT 2012
Published in
Lecture notes in computer science, January 2012
DOI 10.1007/978-3-642-34961-4_38
Book ISBNs
978-3-64-234960-7, 978-3-64-234961-4
Authors

David Bernhard, Olivier Pereira, Bogdan Warinschi

Editors

Xiaoyun Wang, Kazue Sako

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 79 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 2 3%
Unknown 77 97%

Demographic breakdown

Readers by professional status Count As %
Student > Master 20 25%
Student > Ph. D. Student 19 24%
Researcher 12 15%
Student > Postgraduate 4 5%
Student > Doctoral Student 3 4%
Other 12 15%
Unknown 9 11%
Readers by discipline Count As %
Computer Science 51 65%
Mathematics 7 9%
Engineering 4 5%
Physics and Astronomy 3 4%
Design 2 3%
Other 0 0%
Unknown 12 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 16 May 2023.
All research outputs
#13,505,554
of 23,773,220 outputs
Outputs from Lecture notes in computer science
#3,821
of 8,163 outputs
Outputs of similar age
#148,072
of 248,854 outputs
Outputs of similar age from Lecture notes in computer science
#195
of 488 outputs
Altmetric has tracked 23,773,220 research outputs across all sources so far. This one is in the 42nd percentile – i.e., 42% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,163 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has gotten more attention than average, scoring higher than 51% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 248,854 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 39th percentile – i.e., 39% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 488 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 58% of its contemporaries.