↓ Skip to main content

Advances in Cryptology - CRYPTO 2009

Overview of attention for book
Cover of 'Advances in Cryptology - CRYPTO 2009'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Reconstructing RSA Private Keys from Random Key Bits
  3. Altmetric Badge
    Chapter 2 Public-Key Cryptosystems Resilient to Key Leakage
  4. Altmetric Badge
    Chapter 3 Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
  5. Altmetric Badge
    Chapter 4 Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
  6. Altmetric Badge
    Chapter 5 Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
  7. Altmetric Badge
    Chapter 6 Private Mutual Authentication and Conditional Oblivious Transfer
  8. Altmetric Badge
    Chapter 7 Randomizable Proofs and Delegatable Anonymous Credentials
  9. Altmetric Badge
    Chapter 8 Computational Differential Privacy
  10. Altmetric Badge
    Chapter 9 Probabilistically Checkable Arguments
  11. Altmetric Badge
    Chapter 10 On the Composition of Public-Coin Zero-Knowledge Protocols
  12. Altmetric Badge
    Chapter 11 On the Amortized Complexity of Zero-Knowledge Protocols
  13. Altmetric Badge
    Chapter 12 Linear Algebra with Sub-linear Zero-Knowledge Arguments
  14. Altmetric Badge
    Chapter 13 New Birthday Attacks on Some MACs Based on Block Ciphers
  15. Altmetric Badge
    Chapter 14 Distinguisher and Related-Key Attack on the Full AES-256
  16. Altmetric Badge
    Chapter 15 Cryptanalysis of C2
  17. Altmetric Badge
    Chapter 16 Message Authentication Codes from Unpredictable Block Ciphers
  18. Altmetric Badge
    Chapter 17 How to Encipher Messages on a Small Domain
  19. Altmetric Badge
    Chapter 18 How to Hash into Elliptic Curves
  20. Altmetric Badge
    Chapter 19 Batch Binary Edwards
  21. Altmetric Badge
    Chapter 20 Solving Hidden Number Problem with One Bit Oracle and Advice
  22. Altmetric Badge
    Chapter 21 Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
  23. Altmetric Badge
    Chapter 22 Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle
  24. Altmetric Badge
    Chapter 23 Position Based Cryptography
  25. Altmetric Badge
    Chapter 24 Improving the Security of Quantum Protocols via Commit-and-Open
  26. Altmetric Badge
    Chapter 25 Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
  27. Altmetric Badge
    Chapter 26 How Risky Is the Random-Oracle Model?
  28. Altmetric Badge
    Chapter 27 Abstraction in Cryptography
  29. Altmetric Badge
    Chapter 28 Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
  30. Altmetric Badge
    Chapter 29 The Round Complexity of Verifiable Secret Sharing Revisited
  31. Altmetric Badge
    Chapter 30 Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
  32. Altmetric Badge
    Chapter 31 Collusion-Free Multiparty Computation in the Mediated Model
  33. Altmetric Badge
    Chapter 32 Privacy-Enhancing Auctions Using Rational Cryptography
  34. Altmetric Badge
    Chapter 33 Utility Dependence in Correct and Fair Rational Secret Sharing
  35. Altmetric Badge
    Chapter 34 On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem
  36. Altmetric Badge
    Chapter 35 Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
  37. Altmetric Badge
    Chapter 36 Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
  38. Altmetric Badge
    Chapter 37 The Group of Signed Quadratic Residues and Applications
  39. Altmetric Badge
    Chapter 38 Short and Stateless Signatures from the RSA Assumption
  40. Altmetric Badge
    Chapter 39 Smooth Projective Hashing for Conditionally Extractable Commitments
Attention for Chapter 14: Distinguisher and Related-Key Attack on the Full AES-256
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (76th percentile)
  • Good Attention Score compared to outputs of the same age and source (75th percentile)

Mentioned by

twitter
2 X users
wikipedia
3 Wikipedia pages

Citations

dimensions_citation
17 Dimensions

Readers on

mendeley
99 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Distinguisher and Related-Key Attack on the Full AES-256
Chapter number 14
Book title
Advances in Cryptology - CRYPTO 2009
Published in
Lecture notes in computer science, January 2009
DOI 10.1007/978-3-642-03356-8_14
Book ISBNs
978-3-64-203355-1, 978-3-64-203356-8
Authors

Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić, Ivica Nikolić

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 99 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 1 1%
Switzerland 1 1%
Italy 1 1%
Brazil 1 1%
Spain 1 1%
Japan 1 1%
Unknown 93 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 25 25%
Student > Master 23 23%
Researcher 12 12%
Student > Bachelor 5 5%
Student > Postgraduate 5 5%
Other 16 16%
Unknown 13 13%
Readers by discipline Count As %
Computer Science 59 60%
Engineering 11 11%
Mathematics 6 6%
Physics and Astronomy 4 4%
Arts and Humanities 2 2%
Other 2 2%
Unknown 15 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 5. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 26 February 2020.
All research outputs
#5,862,627
of 22,719,618 outputs
Outputs from Lecture notes in computer science
#1,924
of 8,125 outputs
Outputs of similar age
#38,935
of 168,889 outputs
Outputs of similar age from Lecture notes in computer science
#41
of 177 outputs
Altmetric has tracked 22,719,618 research outputs across all sources so far. This one has received more attention than most of these and is in the 73rd percentile.
So far Altmetric has tracked 8,125 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 75% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 168,889 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 76% of its contemporaries.
We're also able to compare this research output to 177 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 75% of its contemporaries.