↓ Skip to main content

Information, Security and Cryptology – ICISC 2009

Overview of attention for book
Cover of 'Information, Security and Cryptology – ICISC 2009'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Generic One Round Group Key Exchange in the Standard Model
  3. Altmetric Badge
    Chapter 2 Information, Security and Cryptology – ICISC 2009
  4. Altmetric Badge
    Chapter 3 Efficient Certificateless KEM in the Standard Model
  5. Altmetric Badge
    Chapter 4 Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing
  6. Altmetric Badge
    Chapter 5 Factoring Unbalanced Moduli with Known Bits
  7. Altmetric Badge
    Chapter 6 Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
  8. Altmetric Badge
    Chapter 7 MXL 3 : An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals
  9. Altmetric Badge
    Chapter 8 Improved Linear Cryptanalysis of SOSEMANUK
  10. Altmetric Badge
    Chapter 9 Serial Model for Attack Tree Computations
  11. Altmetric Badge
    Chapter 10 Lightweight Cryptography and RFID: Tackling the Hidden Overheads
  12. Altmetric Badge
    Chapter 11 Power Analysis of Single-Rail Storage Elements as Used in MDPL
  13. Altmetric Badge
    Chapter 12 A Timing Attack against Patterson Algorithm in the McEliece PKC
  14. Altmetric Badge
    Chapter 13 Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
  15. Altmetric Badge
    Chapter 14 First CPIR Protocol with Data-Dependent Computation
  16. Altmetric Badge
    Chapter 15 Efficient Fuzzy Matching and Intersection on Private Datasets
  17. Altmetric Badge
    Chapter 16 Efficient Privacy-Preserving Face Recognition
  18. Altmetric Badge
    Chapter 17 Linear, Constant-Rounds Bit-Decomposition
  19. Altmetric Badge
    Chapter 18 Attacking and Repairing the Improved ModOnions Protocol
  20. Altmetric Badge
    Chapter 19 Secret Handshakes with Revocation Support
  21. Altmetric Badge
    Chapter 20 Practical Rebound Attack on 12-Round Cheetah-256
  22. Altmetric Badge
    Chapter 21 Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
  23. Altmetric Badge
    Chapter 22 Improved Preimage Attack for 68-Step HAS-160
  24. Altmetric Badge
    Chapter 23 Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1
  25. Altmetric Badge
    Chapter 24 Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
  26. Altmetric Badge
    Chapter 25 Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth
Attention for Chapter 14: First CPIR Protocol with Data-Dependent Computation
Altmetric Badge

About this Attention Score

  • Above-average Attention Score compared to outputs of the same age and source (58th percentile)

Mentioned by

wikipedia
3 Wikipedia pages

Readers on

mendeley
42 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
First CPIR Protocol with Data-Dependent Computation
Chapter number 14
Book title
Information, Security and Cryptology – ICISC 2009
Published in
Lecture notes in computer science, December 2009
DOI 10.1007/978-3-642-14423-3_14
Book ISBNs
978-3-64-214422-6, 978-3-64-214423-3
Authors

Helger Lipmaa

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 42 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Estonia 1 2%
Unknown 41 98%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 24%
Student > Master 9 21%
Researcher 6 14%
Student > Bachelor 3 7%
Student > Doctoral Student 2 5%
Other 8 19%
Unknown 4 10%
Readers by discipline Count As %
Computer Science 32 76%
Engineering 3 7%
Mathematics 2 5%
Physics and Astronomy 1 2%
Unknown 4 10%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 09 October 2022.
All research outputs
#7,730,207
of 23,504,694 outputs
Outputs from Lecture notes in computer science
#2,491
of 8,138 outputs
Outputs of similar age
#49,415
of 168,702 outputs
Outputs of similar age from Lecture notes in computer science
#47
of 194 outputs
Altmetric has tracked 23,504,694 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,138 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has gotten more attention than average, scoring higher than 54% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 168,702 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 21st percentile – i.e., 21% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 194 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 58% of its contemporaries.