↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
  3. Altmetric Badge
    Chapter 2 A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
  4. Altmetric Badge
    Chapter 3 An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
  5. Altmetric Badge
    Chapter 4 Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
  6. Altmetric Badge
    Chapter 5 Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
  7. Altmetric Badge
    Chapter 6 ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
  8. Altmetric Badge
    Chapter 7 Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
  9. Altmetric Badge
    Chapter 8 Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques
  10. Altmetric Badge
    Chapter 9 Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
  11. Altmetric Badge
    Chapter 10 RSA Key Recovery from Digit Equivalence Information
  12. Altmetric Badge
    Chapter 11 Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
  13. Altmetric Badge
    Chapter 12 Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
  14. Altmetric Badge
    Chapter 13 KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
  15. Altmetric Badge
    Chapter 14 Improving the Privacy of Tor Onion Services
  16. Altmetric Badge
    Chapter 15 Privacy-Preserving Authenticated Key Exchange for Constrained Devices
  17. Altmetric Badge
    Chapter 16 Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
  18. Altmetric Badge
    Chapter 17 An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
  19. Altmetric Badge
    Chapter 18 IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
  20. Altmetric Badge
    Chapter 19 Probing for Passwords -- Privacy Implications of SSIDs in Probe Requests
  21. Altmetric Badge
    Chapter 20 A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
  22. Altmetric Badge
    Chapter 21 Don’t Tamper with Dual System Encryption
  23. Altmetric Badge
    Chapter 22 Progressive and Efficient Verification for Digital Signatures
  24. Altmetric Badge
    Chapter 23 Revocable Hierarchical Attribute-Based Signatures from Lattices
  25. Altmetric Badge
    Chapter 24 Covert Authentication from Lattices
  26. Altmetric Badge
    Chapter 25 Spreading the Privacy Blanket:
  27. Altmetric Badge
    Chapter 26 Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
  28. Altmetric Badge
    Chapter 27 (Commit-and-Prove) Predictable Arguments with Privacy
  29. Altmetric Badge
    Chapter 28 Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
  30. Altmetric Badge
    Chapter 29 PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
  31. Altmetric Badge
    Chapter 30 Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
  32. Altmetric Badge
    Chapter 31 Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security
  33. Altmetric Badge
    Chapter 32 Efficient Two-Party Exponentiation from Quotient Transfer
  34. Altmetric Badge
    Chapter 33 Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
  35. Altmetric Badge
    Chapter 34 How Byzantine is a Send Corruption?
  36. Altmetric Badge
    Chapter 35 Babel Fees via Limited Liabilities
  37. Altmetric Badge
    Chapter 36 FAST: Fair Auctions via Secret Transactions
  38. Altmetric Badge
    Chapter 37 Astrape: Anonymous Payment Channels with Boring Cryptography
  39. Altmetric Badge
    Chapter 38 A White-Box Speck Implementation Using Self-equivalence Encodings
  40. Altmetric Badge
    Chapter 39 Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
  41. Altmetric Badge
    Chapter 40 Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher
  42. Altmetric Badge
    Chapter 41 Carry-Less to BIKE Faster
  43. Altmetric Badge
    Chapter 42 Faster Kyber and Dilithium on the Cortex-M4
  44. Altmetric Badge
    Chapter 43 Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
  45. Altmetric Badge
    Chapter 44 Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

news
8 news outlets
twitter
20 X users
wikipedia
1 Wikipedia page

Citations

dimensions_citation
2 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer International Publishing, June 2022
DOI 10.1007/978-3-031-09234-3
ISBNs
978-3-03-109233-6, 978-3-03-109234-3
Editors

Ateniese, Giuseppe, Venturi, Daniele

X Demographics

X Demographics

The data shown below were collected from the profiles of 20 X users who shared this research output. Click here to find out more about how the information was compiled.