↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Applied Cryptography and Network Security
  3. Altmetric Badge
    Chapter 2 Session-state Reveal Is Stronger Than Ephemeral Key Reveal : Attacking the NAXOS Authenticated Key Exchange Protocol
  4. Altmetric Badge
    Chapter 3 Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior
  5. Altmetric Badge
    Chapter 4 How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
  6. Altmetric Badge
    Chapter 5 Novel Precomputation Schemes for Elliptic Curve Cryptosystems
  7. Altmetric Badge
    Chapter 6 Practical Secure Evaluation of Semi-private Functions
  8. Altmetric Badge
    Chapter 7 Secure Hamming Distance Based Computation and Its Applications
  9. Altmetric Badge
    Chapter 8 Efficient Robust Private Set Intersection
  10. Altmetric Badge
    Chapter 9 A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
  11. Altmetric Badge
    Chapter 10 An Efficient Identity-Based Online/Offline Encryption Scheme
  12. Altmetric Badge
    Chapter 11 Dual-Policy Attribute Based Encryption
  13. Altmetric Badge
    Chapter 12 Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
  14. Altmetric Badge
    Chapter 13 Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
  15. Altmetric Badge
    Chapter 14 A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
  16. Altmetric Badge
    Chapter 15 Breaking Two k -Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size
  17. Altmetric Badge
    Chapter 16 Tracing and Revoking Pirate Rebroadcasts
  18. Altmetric Badge
    Chapter 17 Efficient Deniable Authentication for Signatures
  19. Altmetric Badge
    Chapter 18 Homomorphic MACs: MAC-Based Integrity for Network Coding
  20. Altmetric Badge
    Chapter 19 Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
  21. Altmetric Badge
    Chapter 20 Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
  22. Altmetric Badge
    Chapter 21 Cryptanalysis of Twister
  23. Altmetric Badge
    Chapter 22 Cryptanalysis of CubeHash
  24. Altmetric Badge
    Chapter 23 Collision Attack on Boole
  25. Altmetric Badge
    Chapter 24 Integrity Protection for Revision Control
  26. Altmetric Badge
    Chapter 25 Fragility of the Robust Security Network: 802.11 Denial of Service
  27. Altmetric Badge
    Chapter 26 Fast Packet Classification Using Condition Factorization
  28. Altmetric Badge
    Chapter 27 Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
  29. Altmetric Badge
    Chapter 28 Broadcast Attacks against Lattice-Based Cryptosystems
  30. Altmetric Badge
    Chapter 29 Partial Key Exposure Attack on CRT-RSA
  31. Altmetric Badge
    Chapter 30 How to Compare Profiled Side-Channel Attacks?
  32. Altmetric Badge
    Chapter 31 Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
  33. Altmetric Badge
    Chapter 32 Attacking ECDSA-Enabled RFID Devices
Attention for Chapter 32: Attacking ECDSA-Enabled RFID Devices
Altmetric Badge

Mentioned by

1 X user


4 Dimensions

Readers on

33 Mendeley
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Attacking ECDSA-Enabled RFID Devices
Chapter number 32
Book title
Applied Cryptography and Network Security
Published in
Lecture notes in computer science, January 2009
DOI 10.1007/978-3-642-01957-9_32
Book ISBNs
978-3-64-201956-2, 978-3-64-201957-9

Michael Hutter, Marcel Medwed, Daniel Hein, Johannes Wolkerstorfer

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 33 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 6%
Austria 1 3%
Unknown 30 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 11 33%
Student > Master 7 21%
Researcher 5 15%
Lecturer 2 6%
Other 1 3%
Other 4 12%
Unknown 3 9%
Readers by discipline Count As %
Computer Science 23 70%
Engineering 3 9%
Physics and Astronomy 1 3%
Mathematics 1 3%
Chemistry 1 3%
Other 1 3%
Unknown 3 9%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 09 February 2012.
All research outputs
of 22,662,201 outputs
Outputs from Lecture notes in computer science
of 8,123 outputs
Outputs of similar age
of 168,710 outputs
Outputs of similar age from Lecture notes in computer science
of 177 outputs
Altmetric has tracked 22,662,201 research outputs across all sources so far. This one is in the 22nd percentile – i.e., 22% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,123 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 27th percentile – i.e., 27% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 168,710 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 7th percentile – i.e., 7% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 177 others from the same source and published within six weeks on either side of this one. This one is in the 24th percentile – i.e., 24% of its contemporaries scored the same or lower than it.