↓ Skip to main content

Fast Software Encryption

Overview of attention for book
Cover of 'Fast Software Encryption'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 “Provable” Security against Differential and Linear Cryptanalysis
  3. Altmetric Badge
    Chapter 2 Improved Attacks on Full GOST
  4. Altmetric Badge
    Chapter 3 Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
  5. Altmetric Badge
    Chapter 4 A Model for Structure Attacks, with Applications to PRESENT and Serpent
  6. Altmetric Badge
    Chapter 5 A Methodology for Differential-Linear Cryptanalysis and Its Applications
  7. Altmetric Badge
    Chapter 6 New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
  8. Altmetric Badge
    Chapter 7 Improved Rebound Attack on the Finalist Grøstl
  9. Altmetric Badge
    Chapter 8 (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
  10. Altmetric Badge
    Chapter 9 Practical Cryptanalysis of ARMADILLO2
  11. Altmetric Badge
    Chapter 10 On the (In)Security of IDEA in Various Hashing Modes
  12. Altmetric Badge
    Chapter 11 The Security of Ciphertext Stealing
  13. Altmetric Badge
    Chapter 12 McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
  14. Altmetric Badge
    Chapter 13 Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
  15. Altmetric Badge
    Chapter 14 Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
  16. Altmetric Badge
    Chapter 15 Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
  17. Altmetric Badge
    Chapter 16 Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
  18. Altmetric Badge
    Chapter 17 UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
  19. Altmetric Badge
    Chapter 18 ElimLin Algorithm Revisited
  20. Altmetric Badge
    Chapter 19 Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication
  21. Altmetric Badge
    Chapter 20 Lapin: An Efficient Authentication Protocol Based on Ring-LPN
  22. Altmetric Badge
    Chapter 21 Higher-Order Masking Schemes for S-Boxes
  23. Altmetric Badge
    Chapter 22 Recursive Diffusion Layers for Block Ciphers and Hash Functions
  24. Altmetric Badge
    Chapter 23 Unaligned Rebound Attack: Application to Keccak
  25. Altmetric Badge
    Chapter 24 Differential Propagation Analysis of Keccak
  26. Altmetric Badge
    Chapter 25 New Attacks on Keccak-224 and Keccak-256
Attention for Chapter 2: Improved Attacks on Full GOST
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (67th percentile)
  • Good Attention Score compared to outputs of the same age and source (68th percentile)

Mentioned by

facebook
1 Facebook page
wikipedia
2 Wikipedia pages

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
52 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Improved Attacks on Full GOST
Chapter number 2
Book title
Fast Software Encryption
Published in
Lecture notes in computer science, March 2012
DOI 10.1007/978-3-642-34047-5_2
Book ISBNs
978-3-64-234046-8, 978-3-64-234047-5
Authors

Itai Dinur, Orr Dunkelman, Adi Shamir, Anne Canteaut, Dinur, Itai, Dunkelman, Orr, Shamir, Adi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 52 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 52 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 13 25%
Student > Master 11 21%
Researcher 5 10%
Lecturer 3 6%
Professor > Associate Professor 3 6%
Other 9 17%
Unknown 8 15%
Readers by discipline Count As %
Computer Science 33 63%
Mathematics 5 10%
Physics and Astronomy 2 4%
Engineering 2 4%
Materials Science 1 2%
Other 1 2%
Unknown 8 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 4. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 28 February 2018.
All research outputs
#7,204,207
of 22,771,140 outputs
Outputs from Lecture notes in computer science
#2,401
of 8,123 outputs
Outputs of similar age
#50,333
of 159,788 outputs
Outputs of similar age from Lecture notes in computer science
#5
of 16 outputs
Altmetric has tracked 22,771,140 research outputs across all sources so far. This one has received more attention than most of these and is in the 67th percentile.
So far Altmetric has tracked 8,123 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 69% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 159,788 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 67% of its contemporaries.
We're also able to compare this research output to 16 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 68% of its contemporaries.