↓ Skip to main content

The Dark Side of Black-Box Cryptography, or: Should We Trust Capstone?

Overview of attention for book
Cover of 'The Dark Side of Black-Box Cryptography, or: Should We Trust Capstone?'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Keying Hash Functions for Message Authentication
  3. Altmetric Badge
    Chapter 2 Universal Hashing and Multiple Authentication
  4. Altmetric Badge
    Chapter 3 Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings
  5. Altmetric Badge
    Chapter 4 Asymmetric Cryptography with a Hidden Monomial
  6. Altmetric Badge
    Chapter 5 Anonymous Communication and Anonymous Cash
  7. Altmetric Badge
    Chapter 6 Weaknesses in Some Threshold Cryptosystems
  8. Altmetric Badge
    Chapter 7 Hidden Collisions on DSS
  9. Altmetric Badge
    Chapter 8 The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
  10. Altmetric Badge
    Chapter 9 Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
  11. Altmetric Badge
    Chapter 10 All Bits in ax + b mod p are Hard
  12. Altmetric Badge
    Chapter 11 Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
  13. Altmetric Badge
    Chapter 12 Security of 2t-Root Identification and Signatures
  14. Altmetric Badge
    Chapter 13 Robust and Efficient Sharing of RSA Functions
  15. Altmetric Badge
    Chapter 14 New Generation of Secure and Practical RSA-Based Signatures
  16. Altmetric Badge
    Chapter 15 Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers
  17. Altmetric Badge
    Chapter 16 Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
  18. Altmetric Badge
    Chapter 17 Improved Differential Attacks on RC5
  19. Altmetric Badge
    Chapter 18 Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
  20. Altmetric Badge
    Chapter 19 Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
  21. Altmetric Badge
    Chapter 20 How to Protect DES Against Exhaustive Key Search
  22. Altmetric Badge
    Chapter 21 Diffie-Hellman Oracles
  23. Altmetric Badge
    Chapter 22 Algorithms for Black-Box Fields and their Application to Cryptography
  24. Altmetric Badge
    Chapter 23 Fast Hashing on the Pentium
  25. Altmetric Badge
    Chapter 24 On Fast and Provably Secure Message Authentication Based on Universal Hashing
  26. Altmetric Badge
    Chapter 25 Quantum Cryptography over Underground Optical Fibers
  27. Altmetric Badge
    Chapter 26 Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
  28. Altmetric Badge
    Chapter 27 Linear Complexity of Periodic Sequences: A General Theory
  29. Altmetric Badge
    Chapter 28 Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations
  30. Altmetric Badge
    Chapter 29 Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
  31. Altmetric Badge
    Chapter 30 New Results on Visual Cryptography
Attention for Chapter 9: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Altmetric Badge

About this Attention Score

  • In the top 5% of all research outputs scored by Altmetric
  • Among the highest-scoring outputs from this source (#31 of 8,127)
  • High Attention Score compared to outputs of the same age (99th percentile)
  • High Attention Score compared to outputs of the same age and source (85th percentile)

Mentioned by

news
11 news outlets
blogs
2 blogs
patent
2 patents
wikipedia
14 Wikipedia pages

Citations

dimensions_citation
30 Dimensions

Readers on

mendeley
507 Mendeley
citeulike
4 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Chapter number 9
Book title
Advances in Cryptology — CRYPTO ’96
Published in
Lecture notes in computer science, August 1996
DOI 10.1007/3-540-68697-5_9
Book ISBNs
978-3-54-061512-5, 978-3-54-068697-2
Authors

Paul C. Kocher

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 507 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 5 <1%
France 4 <1%
United Kingdom 3 <1%
Netherlands 2 <1%
Switzerland 2 <1%
Japan 2 <1%
Brazil 2 <1%
Malaysia 1 <1%
Sweden 1 <1%
Other 6 1%
Unknown 479 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 136 27%
Student > Master 100 20%
Researcher 59 12%
Student > Bachelor 50 10%
Professor > Associate Professor 19 4%
Other 64 13%
Unknown 79 16%
Readers by discipline Count As %
Computer Science 273 54%
Engineering 101 20%
Mathematics 16 3%
Physics and Astronomy 9 2%
Business, Management and Accounting 5 <1%
Other 14 3%
Unknown 89 18%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 104. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 07 July 2023.
All research outputs
#337,704
of 22,792,160 outputs
Outputs from Lecture notes in computer science
#31
of 8,127 outputs
Outputs of similar age
#64
of 29,888 outputs
Outputs of similar age from Lecture notes in computer science
#1
of 7 outputs
Altmetric has tracked 22,792,160 research outputs across all sources so far. Compared to these this one has done particularly well and is in the 98th percentile: it's in the top 5% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done particularly well, scoring higher than 99% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 29,888 tracked outputs that were published within six weeks on either side of this one in any source. This one has done particularly well, scoring higher than 99% of its contemporaries.
We're also able to compare this research output to 7 others from the same source and published within six weeks on either side of this one. This one has scored higher than all of them