↓ Skip to main content

Information Security and Cryptology -- ICISC 2013

Overview of attention for book
Cover of 'Information Security and Cryptology -- ICISC 2013'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy Assurances in Multiple Data-Aggregation Transactions
  3. Altmetric Badge
    Chapter 2 A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
  4. Altmetric Badge
    Chapter 3 Towards Secure Two-Party Computation from the Wire-Tap Channel
  5. Altmetric Badge
    Chapter 4 Combined Proxy Re-encryption
  6. Altmetric Badge
    Chapter 5 Certificateless Proxy Re-Encryption Without Pairings
  7. Altmetric Badge
    Chapter 6 Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes
  8. Altmetric Badge
    Chapter 7 Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
  9. Altmetric Badge
    Chapter 8 Impossible Differential Attack on Reduced-Round TWINE
  10. Altmetric Badge
    Chapter 9 Optimal Storage for Rainbow Tables
  11. Altmetric Badge
    Chapter 10 First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$
  12. Altmetric Badge
    Chapter 11 Rebound Attacks on Stribog
  13. Altmetric Badge
    Chapter 12 Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs
  14. Altmetric Badge
    Chapter 13 General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
  15. Altmetric Badge
    Chapter 14 Integral Based Fault Attack on LBlock
  16. Altmetric Badge
    Chapter 15 Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks
  17. Altmetric Badge
    Chapter 16 Parallel Implementations of LEA
  18. Altmetric Badge
    Chapter 17 Invertible Polynomial Representation for Private Set Operations
  19. Altmetric Badge
    Chapter 18 On the Efficacy of Solving LWE by Reduction to Unique-SVP
  20. Altmetric Badge
    Chapter 19 A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function
  21. Altmetric Badge
    Chapter 20 Ambiguous One-Move Nominative Signature Without Random Oracles
  22. Altmetric Badge
    Chapter 21 A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
  23. Altmetric Badge
    Chapter 22 An Anonymous Reputation System with Reputation Secrecy for Manager
  24. Altmetric Badge
    Chapter 23 Database Outsourcing with Hierarchical Authenticated Data Structures
  25. Altmetric Badge
    Chapter 24 Information-Theoretically Secure Entity Authentication in the Multi-user Setting
  26. Altmetric Badge
    Chapter 25 Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
  27. Altmetric Badge
    Chapter 26 Revocable Group Signatures with Compact Revocation List Using Accumulators
  28. Altmetric Badge
    Chapter 27 Semantic Feature Selection for Text with Application to Phishing Email Detection
  29. Altmetric Badge
    Chapter 28 Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts
  30. Altmetric Badge
    Chapter 29 Dark Side of the Shader: Mobile GPU-Aided Malware Delivery
  31. Altmetric Badge
    Chapter 30 Industry-Wide Misunderstandings of HTTPS
  32. Altmetric Badge
    Chapter 31 Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
2 X users
wikipedia
1 Wikipedia page

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology -- ICISC 2013
Published by
Springer International Publishing, October 2014
DOI 10.1007/978-3-319-12160-4
ISBNs
978-3-31-912159-8, 978-3-31-912160-4
Editors

Lee, Hyang-Sook, Han, Dong-Guk

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 24%
Researcher 3 14%
Professor > Associate Professor 2 10%
Lecturer 1 5%
Student > Bachelor 1 5%
Other 3 14%
Unknown 6 29%
Readers by discipline Count As %
Computer Science 13 62%
Linguistics 1 5%
Engineering 1 5%
Unknown 6 29%