↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields
  3. Altmetric Badge
    Chapter 2 Security Analysis and Improvement of the Global Key Recovery System
  4. Altmetric Badge
    Chapter 3 The LILI-II Keystream Generator
  5. Altmetric Badge
    Chapter 4 A Secure Re-keying Scheme with Key Recovery Property
  6. Altmetric Badge
    Chapter 5 Modelling Trust Structures for Public Key Infrastructures
  7. Altmetric Badge
    Chapter 6 Size of Broadcast in Threshold Schemes with Disenrollment
  8. Altmetric Badge
    Chapter 7 Requirements for Group Independent Linear Threshold Secret Sharing Schemes
  9. Altmetric Badge
    Chapter 8 Information Security and Privacy
  10. Altmetric Badge
    Chapter 9 Information Security and Privacy
  11. Altmetric Badge
    Chapter 10 Note on Fast Computation of Secret RSA Exponents
  12. Altmetric Badge
    Chapter 11 Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
  13. Altmetric Badge
    Chapter 12 Cryptanalysis of Stream Cipher COS (2, 128) Mode I
  14. Altmetric Badge
    Chapter 13 The Analysis of Zheng-Seberry Scheme
  15. Altmetric Badge
    Chapter 14 Cryptanalysis of Stream Cipher Alpha1
  16. Altmetric Badge
    Chapter 15 A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
  17. Altmetric Badge
    Chapter 16 Isomorphism Classes of Hyperelliptic Curves of Genus 2 over \( \mathbb{F}_q \)
  18. Altmetric Badge
    Chapter 17 Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
  19. Altmetric Badge
    Chapter 18 A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
  20. Altmetric Badge
    Chapter 19 Strengthening the Key Schedule of the AES
  21. Altmetric Badge
    Chapter 20 On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes
  22. Altmetric Badge
    Chapter 21 Security Management: An Information Systems Setting
  23. Altmetric Badge
    Chapter 22 Resolving Conflicts in Authorization Delegations
  24. Altmetric Badge
    Chapter 23 Information Security and Privacy
  25. Altmetric Badge
    Chapter 24 Maintaining the Validity of Digital Signatures in B2B Applications
  26. Altmetric Badge
    Chapter 25 Short 3-Secure Fingerprinting Codes for Copyright Protection
  27. Altmetric Badge
    Chapter 26 An Order-Specified Multisignature Scheme Secure against Active Insider Attacks
  28. Altmetric Badge
    Chapter 27 Authenticated Operation of Open Computing Devices
  29. Altmetric Badge
    Chapter 28 A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
  30. Altmetric Badge
    Chapter 29 A Brief Outline of Research on Correlation Immune Functions
  31. Altmetric Badge
    Chapter 30 m out of n Oblivious Transfer
  32. Altmetric Badge
    Chapter 31 On the Security of Reduced Versions of 3-Pass HAVAL
  33. Altmetric Badge
    Chapter 32 On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
  34. Altmetric Badge
    Chapter 33 On the Security of a Modified Paillier Public-Key Primitive
  35. Altmetric Badge
    Chapter 34 How to Play Sherlock Holmes in the World of Mobile Agents
  36. Altmetric Badge
    Chapter 35 A Practical Approach Defeating Blackmailing
  37. Altmetric Badge
    Chapter 36 Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
  38. Altmetric Badge
    Chapter 37 Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries
Attention for Chapter 15: A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
25 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
Chapter number 15
Book title
Information Security and Privacy
Published in
Lecture notes in computer science, July 2002
DOI 10.1007/3-540-45450-0_15
Book ISBNs
978-3-54-043861-8, 978-3-54-045450-2
Authors

James Hughes

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 25 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 1 4%
Ireland 1 4%
Unknown 23 92%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 40%
Student > Master 5 20%
Researcher 2 8%
Professor > Associate Professor 2 8%
Other 1 4%
Other 3 12%
Unknown 2 8%
Readers by discipline Count As %
Computer Science 18 72%
Mathematics 3 12%
Arts and Humanities 1 4%
Physics and Astronomy 1 4%
Unknown 2 8%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 26 December 2014.
All research outputs
#18,387,239
of 22,775,504 outputs
Outputs from Lecture notes in computer science
#6,005
of 8,124 outputs
Outputs of similar age
#42,552
of 44,559 outputs
Outputs of similar age from Lecture notes in computer science
#24
of 29 outputs
Altmetric has tracked 22,775,504 research outputs across all sources so far. This one is in the 11th percentile – i.e., 11% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,124 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 14th percentile – i.e., 14% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 44,559 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 2nd percentile – i.e., 2% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 29 others from the same source and published within six weeks on either side of this one. This one is in the 3rd percentile – i.e., 3% of its contemporaries scored the same or lower than it.