↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 CryptoZoo: A Viewer for Reduction Proofs
  3. Altmetric Badge
    Chapter 2 Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols
  4. Altmetric Badge
    Chapter 3 A New Approach to Efficient and Secure Fixed-Point Computation
  5. Altmetric Badge
    Chapter 4 Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
  6. Altmetric Badge
    Chapter 5 Verification Protocol for Stable Matching from Conditional Disclosure of Secrets
  7. Altmetric Badge
    Chapter 6 Non-malleable Fuzzy Extractors
  8. Altmetric Badge
    Chapter 7 Upgrading Fuzzy Extractors
  9. Altmetric Badge
    Chapter 8 X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
  10. Altmetric Badge
    Chapter 9 Efficient Clustering on Encrypted Data
  11. Altmetric Badge
    Chapter 10 Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
  12. Altmetric Badge
    Chapter 11 Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections
  13. Altmetric Badge
    Chapter 12 Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
  14. Altmetric Badge
    Chapter 13 KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More
  15. Altmetric Badge
    Chapter 14 Subversion-Resilient Signatures Without Random Oracles
  16. Altmetric Badge
    Chapter 15 Practical Lattice-Based Distributed Signatures for a Small Number of Signers
  17. Altmetric Badge
    Chapter 16 Building MPCitH-Based Signatures from MQ, MinRank, and Rank SD
  18. Altmetric Badge
    Chapter 17 Exploring SIDH-Based Signature Parameters
  19. Altmetric Badge
    Chapter 18 Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (70th percentile)

Mentioned by

twitter
5 X users
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Lecture notes in computer science, January 2024
DOI 10.1007/978-3-031-54770-6
ISBNs
978-3-03-154769-0, 978-3-03-154770-6
Editors

Pöpper, Christina, Batina, Lejla

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 4. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 07 March 2024.
All research outputs
#7,878,581
of 25,877,363 outputs
Outputs from Lecture notes in computer science
#2,285
of 8,175 outputs
Outputs of similar age
#106,994
of 360,463 outputs
Outputs of similar age from Lecture notes in computer science
#1
of 2 outputs
Altmetric has tracked 25,877,363 research outputs across all sources so far. This one has received more attention than most of these and is in the 69th percentile.
So far Altmetric has tracked 8,175 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.2. This one has gotten more attention than average, scoring higher than 72% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 360,463 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 70% of its contemporaries.
We're also able to compare this research output to 2 others from the same source and published within six weeks on either side of this one. This one has scored higher than all of them