↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Generic Transformation to Strongly Unforgeable Signatures
  3. Altmetric Badge
    Chapter 2 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
  4. Altmetric Badge
    Chapter 3 Merkle Signatures with Virtually Unlimited Signature Capacity
  5. Altmetric Badge
    Chapter 4 Midpoints Versus Endpoints: From Protocols to Firewalls
  6. Altmetric Badge
    Chapter 5 An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
  7. Altmetric Badge
    Chapter 6 Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
  8. Altmetric Badge
    Chapter 7 Cryptanalysis of the TRMC-4 Public Key Cryptosystem
  9. Altmetric Badge
    Chapter 8 Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
  10. Altmetric Badge
    Chapter 9 A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA
  11. Altmetric Badge
    Chapter 10 Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
  12. Altmetric Badge
    Chapter 11 Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
  13. Altmetric Badge
    Chapter 12 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
  14. Altmetric Badge
    Chapter 13 Bayesian Methods for Practical Traitor Tracing
  15. Altmetric Badge
    Chapter 14 A New Protocol for Conditional Disclosure of Secrets and Its Applications
  16. Altmetric Badge
    Chapter 15 An Unconditionally Secure Protocol for Multi-Party Set Intersection
  17. Altmetric Badge
    Chapter 16 Privacy-Preserving Set Union
  18. Altmetric Badge
    Chapter 17 Universal Accumulators with Efficient Nonmembership Proofs
  19. Altmetric Badge
    Chapter 18 Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
  20. Altmetric Badge
    Chapter 19 Identity-Based Proxy Re-encryption
  21. Altmetric Badge
    Chapter 20 A More Natural Way to Construct Identity-Based Identification Schemes
  22. Altmetric Badge
    Chapter 21 Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
  23. Altmetric Badge
    Chapter 22 Certified E-Mail Protocol in the ID-Based Setting
  24. Altmetric Badge
    Chapter 23 Efficient Content Authentication in Peer-to-Peer Networks
  25. Altmetric Badge
    Chapter 24 An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
  26. Altmetric Badge
    Chapter 25 Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
  27. Altmetric Badge
    Chapter 26 BAP: Broadcast Authentication Using Cryptographic Puzzles
  28. Altmetric Badge
    Chapter 27 Compressed XTR
  29. Altmetric Badge
    Chapter 28 Sliding Window Method for NTRU
  30. Altmetric Badge
    Chapter 29 Efficient Certificateless Signature Schemes
  31. Altmetric Badge
    Chapter 30 Security Mediated Certificateless Signatures
  32. Altmetric Badge
    Chapter 31 Gradually Convertible Undeniable Signatures
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
5 patents
wikipedia
2 Wikipedia pages

Citations

dimensions_citation
8 Dimensions

Readers on

mendeley
14 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer, Berlin, Heidelberg, January 2007
DOI 10.1007/978-3-540-72738-5
ISBNs
978-3-54-072737-8, 978-3-54-072738-5
Authors

Katz, Jonathan, Yung, Moti

Editors

Jonathan Katz, Moti Yung

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Japan 2 14%
Spain 1 7%
Sweden 1 7%
Unknown 10 71%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 43%
Student > Master 4 29%
Researcher 2 14%
Unspecified 2 14%
Other 1 7%
Other 3 21%
Readers by discipline Count As %
Computer Science 15 107%
Unspecified 2 14%
Physics and Astronomy 1 7%