↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A review of the SESAME development
  3. Altmetric Badge
    Chapter 2 The security of public key cryptosystems based on integer factorization
  4. Altmetric Badge
    Chapter 3 A uniform approach to securing Unix applications using SESAME
  5. Altmetric Badge
    Chapter 4 Integrated management of network and host based security mechanisms
  6. Altmetric Badge
    Chapter 5 Covert distributed computing using Java through Web Spoofing
  7. Altmetric Badge
    Chapter 6 Differential cryptanalysis of a block cipher
  8. Altmetric Badge
    Chapter 7 On private-key cryptosystems based on product codes
  9. Altmetric Badge
    Chapter 8 Key schedules of iterative block ciphers
  10. Altmetric Badge
    Chapter 9 Low-cost secure server connection with limited-privilege clients
  11. Altmetric Badge
    Chapter 10 A solution to open standard of PKI
  12. Altmetric Badge
    Chapter 11 Comparison of commitment schemes used in mix-mediated anonymous communication for preventing pool-mode attacks
  13. Altmetric Badge
    Chapter 12 Correlation attacks on up/down cascades
  14. Altmetric Badge
    Chapter 13 A stream cipher based on linear feedback over GF(28)
  15. Altmetric Badge
    Chapter 14 A probabilistic correlation attack on the shrinking generator
  16. Altmetric Badge
    Chapter 15 Bounds and constructions for A3-code with multi-senders
  17. Altmetric Badge
    Chapter 16 Rotation-symmetric functions and fast hashing
  18. Altmetric Badge
    Chapter 17 How to improve the nonlinearity of bijective S-boxes
  19. Altmetric Badge
    Chapter 18 Object modeling of cryptographic algorithms with UML
  20. Altmetric Badge
    Chapter 19 Adapting an electronic purse for internet payments
  21. Altmetric Badge
    Chapter 20 LITESET: A light-weight secure electronic transaction protocol
  22. Altmetric Badge
    Chapter 21 Applications of linearised and sub-linearised polynomials to information security
  23. Altmetric Badge
    Chapter 22 Protocol failures related to order of encryption and signature computation of discrete logarithms in RSA groups
  24. Altmetric Badge
    Chapter 23 Protection against EEPROM modification attacks
  25. Altmetric Badge
    Chapter 24 Trends in quantum cryptography in Czech Republic
  26. Altmetric Badge
    Chapter 25 A high level language for conventional access control models
  27. Altmetric Badge
    Chapter 26 Fast access control decisions from delegation certificate databases
  28. Altmetric Badge
    Chapter 27 Meta objects for access control: Role-based principals
  29. Altmetric Badge
    Chapter 28 A dynamically typed access control model
  30. Altmetric Badge
    Chapter 29 Efficient identity-based conference key distribution protocols
  31. Altmetric Badge
    Chapter 30 A formal model for systematic design of key establishment protocols
  32. Altmetric Badge
    Chapter 31 Key establishment protocols for secure mobile communications: A selective survey
  33. Altmetric Badge
    Chapter 32 Detecting key-dependencies
  34. Altmetric Badge
    Chapter 33 Secret sharing in multilevel and compartmented groups
  35. Altmetric Badge
    Chapter 34 On construction of cumulative secret sharing schemes
  36. Altmetric Badge
    Chapter 35 A comment on the efficiency of secret sharing scheme over any finite abelian group
  37. Altmetric Badge
    Chapter 36 A user identification system using signature written with mouse
  38. Altmetric Badge
    Chapter 37 On Zhang's nonrepudiable proxy signature schemes
Attention for Chapter 21: Applications of linearised and sub-linearised polynomials to information security
Altmetric Badge

Mentioned by

patent
2 patents

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
20 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Applications of linearised and sub-linearised polynomials to information security
Chapter number 21
Book title
Information Security and Privacy
Published by
Springer, Berlin, Heidelberg, July 1998
DOI 10.1007/bfb0053736
Book ISBNs
978-3-54-064732-4, 978-3-54-069101-3
Authors

Marie Henderson, Henderson, Marie

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 35%
Student > Master 4 20%
Researcher 3 15%
Professor 1 5%
Other 1 5%
Other 2 10%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 17 85%
Physics and Astronomy 1 5%
Unknown 2 10%