↓ Skip to main content

Cryptography and Security Systems

Overview of attention for book
Cover of 'Cryptography and Security Systems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes
  3. Altmetric Badge
    Chapter 2 Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a Pair
  4. Altmetric Badge
    Chapter 3 On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition
  5. Altmetric Badge
    Chapter 4 Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators
  6. Altmetric Badge
    Chapter 5 Identity-Based Cryptography in Credit Card Payments
  7. Altmetric Badge
    Chapter 6 On a Cipher Based on Pseudo-random Walks on Graphs
  8. Altmetric Badge
    Chapter 7 On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups
  9. Altmetric Badge
    Chapter 8 Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities
  10. Altmetric Badge
    Chapter 9 Efficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme
  11. Altmetric Badge
    Chapter 10 A Lightweight Authentication Protocol for RFID
  12. Altmetric Badge
    Chapter 11 Long-Term Secure Two-Round Group Key Establishment from Pairings
  13. Altmetric Badge
    Chapter 12 Optimizing SHA256 in Bitcoin Mining
  14. Altmetric Badge
    Chapter 13 Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange
  15. Altmetric Badge
    Chapter 14 Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices
  16. Altmetric Badge
    Chapter 15 Secure Multihop Key Establishment Protocols for Wireless Sensor Networks
  17. Altmetric Badge
    Chapter 16 Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML
  18. Altmetric Badge
    Chapter 17 Context-Aware Secure Routing Protocol for Real-Time Services
Attention for Chapter 11: Long-Term Secure Two-Round Group Key Establishment from Pairings
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Long-Term Secure Two-Round Group Key Establishment from Pairings
Chapter number 11
Book title
Cryptography and Security Systems
Published by
Springer, Berlin, Heidelberg, September 2014
DOI 10.1007/978-3-662-44893-9_11
Book ISBNs
978-3-66-244892-2, 978-3-66-244893-9
Authors

Kashi Neupane, Neupane, Kashi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Other 1 50%
Readers by discipline Count As %
Computer Science 2 100%