↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography
  3. Altmetric Badge
    Chapter 2 Simple Security Definitions for and Constructions of 0-RTT Key Exchange
  4. Altmetric Badge
    Chapter 3 TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF
  5. Altmetric Badge
    Chapter 4 Secure and Efficient Pairing at 256-Bit Security Level
  6. Altmetric Badge
    Chapter 5 No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices
  7. Altmetric Badge
    Chapter 6 Are You Lying: Validating the Time-Location of Outdoor Images
  8. Altmetric Badge
    Chapter 7 Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks
  9. Altmetric Badge
    Chapter 8 A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords
  10. Altmetric Badge
    Chapter 9 Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security
  11. Altmetric Badge
    Chapter 10 A Novel GPU-Based Implementation of the Cube Attack
  12. Altmetric Badge
    Chapter 11 Related-Key Impossible-Differential Attack on Reduced-Round Skinny
  13. Altmetric Badge
    Chapter 12 Faster Secure Multi-party Computation of AES and DES Using Lookup Tables
  14. Altmetric Badge
    Chapter 13 An Experimental Study of the BDD Approach for the Search LWE Problem
  15. Altmetric Badge
    Chapter 14 Efficiently Obfuscating Re-Encryption Program Under DDH Assumption
  16. Altmetric Badge
    Chapter 15 Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
  17. Altmetric Badge
    Chapter 16 Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols
  18. Altmetric Badge
    Chapter 17 Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)
  19. Altmetric Badge
    Chapter 18 More Efficient Construction of Bounded KDM Secure Encryption
  20. Altmetric Badge
    Chapter 19 Signature Schemes with Randomized Verification
  21. Altmetric Badge
    Chapter 20 Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
  22. Altmetric Badge
    Chapter 21 A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
  23. Altmetric Badge
    Chapter 22 Side-Channel Attacks Meet Secure Network Protocols
  24. Altmetric Badge
    Chapter 23 Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
  25. Altmetric Badge
    Chapter 24 Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
  26. Altmetric Badge
    Chapter 25 Bounds in Various Generalized Settings of the Discrete Logarithm Problem
  27. Altmetric Badge
    Chapter 26 An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis
  28. Altmetric Badge
    Chapter 27 SCRAPE: Scalable Randomness Attested by Public Entities
  29. Altmetric Badge
    Chapter 28 cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
  30. Altmetric Badge
    Chapter 29 Almost Optimal Oblivious Transfer from QA-NIZK
  31. Altmetric Badge
    Chapter 30 OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
  32. Altmetric Badge
    Chapter 31 Accountable Storage
  33. Altmetric Badge
    Chapter 32 Maliciously Secure Multi-Client ORAM
  34. Altmetric Badge
    Chapter 33 Legacy-Compliant Data Authentication for Industrial Control System Traffic
  35. Altmetric Badge
    Chapter 34 Multi-client Oblivious RAM Secure Against Malicious Servers
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
5 X users
patent
4 patents

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
19 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer, Cham, January 2017
DOI 10.1007/978-3-319-61204-1
ISBNs
978-3-31-961203-4, 978-3-31-961204-1
Editors

Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 19 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 19 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 6 32%
Student > Ph. D. Student 3 16%
Other 2 11%
Researcher 1 5%
Professor > Associate Professor 1 5%
Other 0 0%
Unknown 6 32%
Readers by discipline Count As %
Computer Science 12 63%
Unknown 7 37%