↓ Skip to main content

Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings

Overview of attention for book
Cover of 'Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
  3. Altmetric Badge
    Chapter 2 New Construction of Group Secret Handshakes Based on Pairings
  4. Altmetric Badge
    Chapter 3 nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
  5. Altmetric Badge
    Chapter 4 An Efficient Password-Only Two-Server Authenticated Key Exchange System
  6. Altmetric Badge
    Chapter 5 Formal Definition and Construction of Nominative Signature
  7. Altmetric Badge
    Chapter 6 Short Group Signature Without Random Oracles
  8. Altmetric Badge
    Chapter 7 (Convertible) Undeniable Signatures Without Random Oracles
  9. Altmetric Badge
    Chapter 8 A New Dynamic Accumulator for Batch Updates
  10. Altmetric Badge
    Chapter 9 Preventing Unofficial Information Propagation
  11. Altmetric Badge
    Chapter 10 A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
  12. Altmetric Badge
    Chapter 11 Privacy Protection on Multiple Sensitive Attributes
  13. Altmetric Badge
    Chapter 12 Audio Watermarking Algorithm Based on Centroid and Statistical Features
  14. Altmetric Badge
    Chapter 13 A Semi-blind Watermarking Based on Discrete Wavelet Transform
  15. Altmetric Badge
    Chapter 14 On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
  16. Altmetric Badge
    Chapter 15 High Speed Modular Divider Based on GCD Algorithm
  17. Altmetric Badge
    Chapter 16 MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
  18. Altmetric Badge
    Chapter 17 Compact and Secure Design of Masked AES S-Box
  19. Altmetric Badge
    Chapter 18 Boudot’s Range-Bounded Commitment Scheme Revisited
  20. Altmetric Badge
    Chapter 19 Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
  21. Altmetric Badge
    Chapter 20 Secure Multiparty Computation of DNF
  22. Altmetric Badge
    Chapter 21 Square Like Attack on Camellia
  23. Altmetric Badge
    Chapter 22 Differential Fault Analysis on CLEFIA
  24. Altmetric Badge
    Chapter 23 Extending FORK-256 Attack to the Full Hash Function
  25. Altmetric Badge
    Chapter 24 Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
  26. Altmetric Badge
    Chapter 25 A Framework for Game-Based Security Proofs
  27. Altmetric Badge
    Chapter 26 What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
  28. Altmetric Badge
    Chapter 27 Modeling Agreement Problems in the Universal Composability Framework
  29. Altmetric Badge
    Chapter 28 A System Architecture for History-Based Access Control for XML Documents
  30. Altmetric Badge
    Chapter 29 Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
  31. Altmetric Badge
    Chapter 30 Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
  32. Altmetric Badge
    Chapter 31 A Novel Approach for Untrusted Code Execution
  33. Altmetric Badge
    Chapter 32 Detection and Diagnosis of Control Interception
  34. Altmetric Badge
    Chapter 33 BIOS Security Analysis and a Kind of Trusted BIOS
  35. Altmetric Badge
    Chapter 34 Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
  36. Altmetric Badge
    Chapter 35 DDoS Attack Detection Algorithms Based on Entropy Computing
  37. Altmetric Badge
    Chapter 36 Firewall for Dynamic IP Address in Mobile IPv6
  38. Altmetric Badge
    Chapter 37 Application of the PageRank Algorithm to Alarm Graphs
  39. Altmetric Badge
    Chapter 38 Drive-By Pharming
Attention for Chapter 23: Extending FORK-256 Attack to the Full Hash Function
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
20 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Extending FORK-256 Attack to the Full Hash Function
Chapter number 23
Book title
Information and Communications Security
Published in
ADS, December 2007
DOI 10.1007/978-3-540-77048-0_23
Book ISBNs
978-3-54-077047-3, 978-3-54-077048-0
Authors

Scott Contini, Krystian Matusiewicz, Josef Pieprzyk

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 35%
Student > Master 4 20%
Researcher 2 10%
Lecturer 1 5%
Other 1 5%
Other 3 15%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 17 85%
Physics and Astronomy 1 5%
Unknown 2 10%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 23 August 2014.
All research outputs
#7,453,350
of 22,786,087 outputs
Outputs from ADS
#9,284
of 37,325 outputs
Outputs of similar age
#41,314
of 156,005 outputs
Outputs of similar age from ADS
#131
of 457 outputs
Altmetric has tracked 22,786,087 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 37,325 research outputs from this source. They receive a mean Attention Score of 4.6. This one is in the 29th percentile – i.e., 29% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 156,005 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 18th percentile – i.e., 18% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 457 others from the same source and published within six weeks on either side of this one. This one is in the 19th percentile – i.e., 19% of its contemporaries scored the same or lower than it.