↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Transparent, Distributed, and Replicated Dynamic Provable Data Possession
  3. Altmetric Badge
    Chapter 2 Client-Controlled Cryptography-as-a-Service in the Cloud
  4. Altmetric Badge
    Chapter 3 CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
  5. Altmetric Badge
    Chapter 4 Computing on Authenticated Data for Adjustable Predicates
  6. Altmetric Badge
    Chapter 5 Towards Efficient Private Distributed Computation on Unbounded Input Streams
  7. Altmetric Badge
    Chapter 6 From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting
  8. Altmetric Badge
    Chapter 7 Private Database Queries Using Somewhat Homomorphic Encryption
  9. Altmetric Badge
    Chapter 8 BLAKE2: Simpler, Smaller, Fast as MD5
  10. Altmetric Badge
    Chapter 9 Cryptophia’s Short Combiner for Collision-Resistant Hash Functions
  11. Altmetric Badge
    Chapter 10 Generic Attacks for the Xor of k Random Permutations
  12. Altmetric Badge
    Chapter 11 Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
  13. Altmetric Badge
    Chapter 12 Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles
  14. Altmetric Badge
    Chapter 13 Sequential Aggregate Signatures Made Shorter
  15. Altmetric Badge
    Chapter 14 How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
  16. Altmetric Badge
    Chapter 15 Toward Practical Group Encryption
  17. Altmetric Badge
    Chapter 16 Experimental Analysis of Attacks on Next Generation Air Traffic Communication
  18. Altmetric Badge
    Chapter 17 Launching Generic Attacks on iOS with Approved Third-Party Applications
  19. Altmetric Badge
    Chapter 18 Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
  20. Altmetric Badge
    Chapter 19 Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors
  21. Altmetric Badge
    Chapter 20 NEON Implementation of an Attribute-Based Encryption Scheme
  22. Altmetric Badge
    Chapter 21 Fast and Maliciously Secure Two-Party Computation Using the GPU
  23. Altmetric Badge
    Chapter 22 Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
  24. Altmetric Badge
    Chapter 23 FROST
  25. Altmetric Badge
    Chapter 24 Attacking Atmel’s CryptoMemory EEPROM with Special-Purpose Hardware
  26. Altmetric Badge
    Chapter 25 Keystroke Timing Analysis of on-the-fly Web Apps
  27. Altmetric Badge
    Chapter 26 Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance
  28. Altmetric Badge
    Chapter 27 CrowdShare: Secure Mobile Resource Sharing
  29. Altmetric Badge
    Chapter 28 Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
  30. Altmetric Badge
    Chapter 29 Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
  31. Altmetric Badge
    Chapter 30 Public Key Exchange Using Semidirect Product of (Semi)Groups
  32. Altmetric Badge
    Chapter 31 Leakage Resilient IBE and IPE under the DLIN Assumption
  33. Altmetric Badge
    Chapter 32 Batch Proofs of Partial Knowledge
  34. Altmetric Badge
    Chapter 33 Efficient Signatures of Knowledge and DAA in the Standard Model
  35. Altmetric Badge
    Chapter 34 Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes
  36. Altmetric Badge
    Chapter 35 Primeless Factoring-Based Cryptography
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

wikipedia
3 Wikipedia pages

Citations

dimensions_citation
6 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer, Berlin, Heidelberg, January 2013
DOI 10.1007/978-3-642-38980-1
ISBNs
978-3-64-238979-5, 978-3-64-238980-1
Editors

Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini