↓ Skip to main content

Advances in Cryptology – ASIACRYPT 2016

Overview of attention for book
Cover of 'Advances in Cryptology – ASIACRYPT 2016'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
  3. Altmetric Badge
    Chapter 2 A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm
  4. Altmetric Badge
    Chapter 3 On the Security of Supersingular Isogeny Cryptosystems
  5. Altmetric Badge
    Chapter 4 Simpira v2: A Family of Efficient Permutations Using the AES Round Function
  6. Altmetric Badge
    Chapter 5 Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
  7. Altmetric Badge
    Chapter 6 Efficient and Provable White-Box Primitives
  8. Altmetric Badge
    Chapter 7 MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
  9. Altmetric Badge
    Chapter 8 Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
  10. Altmetric Badge
    Chapter 9 Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
  11. Altmetric Badge
    Chapter 10 When Are Fuzzy Extractors Possible?
  12. Altmetric Badge
    Chapter 11 More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22
  13. Altmetric Badge
    Chapter 12 Trick or Tweak: On the (In)security of OTR’s Tweaks
  14. Altmetric Badge
    Chapter 13 Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
  15. Altmetric Badge
    Chapter 14 Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
  16. Altmetric Badge
    Chapter 15 Authenticated Encryption with Variable Stretch
  17. Altmetric Badge
    Chapter 16 Salvaging Weak Security Bounds for Blockcipher-Based Constructions
  18. Altmetric Badge
    Chapter 17 How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
  19. Altmetric Badge
    Chapter 18 Design Strategies for ARX with Provable Bounds: Sparx and LAX
  20. Altmetric Badge
    Chapter 19 Side-Channel Analysis Protection and Low-Latency in Action
  21. Altmetric Badge
    Chapter 20 Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
  22. Altmetric Badge
    Chapter 21 Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
  23. Altmetric Badge
    Chapter 22 Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
  24. Altmetric Badge
    Chapter 23 A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
  25. Altmetric Badge
    Chapter 24 Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
  26. Altmetric Badge
    Chapter 25 Reverse Cycle Walking and Its Applications
  27. Altmetric Badge
    Chapter 26 Optimization of \(\mathsf {LPN}\) Solving Algorithms
  28. Altmetric Badge
    Chapter 27 The Kernel Matrix Diffie-Hellman Assumption
  29. Altmetric Badge
    Chapter 28 Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate Polynomials
  30. Altmetric Badge
    Chapter 29 A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
  31. Altmetric Badge
    Chapter 30 A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
  32. Altmetric Badge
    Chapter 31 Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
  33. Altmetric Badge
    Chapter 32 Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
  34. Altmetric Badge
    Chapter 33 Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Attention for Chapter 32: Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
Altmetric Badge

Citations

dimensions_citation
9 Dimensions

Readers on

mendeley
35 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
Chapter number 32
Book title
Advances in Cryptology – ASIACRYPT 2016
Published in
Lecture notes in computer science, November 2016
DOI 10.1007/978-3-662-53887-6_32
Book ISBNs
978-3-66-253886-9, 978-3-66-253887-6
Authors

Antonio Faonio, Daniele Venturi, Antonio Faonio, Daniele Venturi

Editors

Jung Hee Cheon, Tsuyoshi Takagi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 35 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 35 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 12 34%
Student > Master 6 17%
Other 2 6%
Researcher 2 6%
Student > Postgraduate 2 6%
Other 7 20%
Unknown 4 11%
Readers by discipline Count As %
Computer Science 22 63%
Mathematics 3 9%
Physics and Astronomy 2 6%
Engineering 1 3%
Design 1 3%
Other 0 0%
Unknown 6 17%