↓ Skip to main content

Information Security and Cryptology -- ICISC 2013

Overview of attention for book
Cover of 'Information Security and Cryptology -- ICISC 2013'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy Assurances in Multiple Data-Aggregation Transactions
  3. Altmetric Badge
    Chapter 2 A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
  4. Altmetric Badge
    Chapter 3 Towards Secure Two-Party Computation from the Wire-Tap Channel
  5. Altmetric Badge
    Chapter 4 Combined Proxy Re-encryption
  6. Altmetric Badge
    Chapter 5 Certificateless Proxy Re-Encryption Without Pairings
  7. Altmetric Badge
    Chapter 6 Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes
  8. Altmetric Badge
    Chapter 7 Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
  9. Altmetric Badge
    Chapter 8 Impossible Differential Attack on Reduced-Round TWINE
  10. Altmetric Badge
    Chapter 9 Optimal Storage for Rainbow Tables
  11. Altmetric Badge
    Chapter 10 First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$
  12. Altmetric Badge
    Chapter 11 Rebound Attacks on Stribog
  13. Altmetric Badge
    Chapter 12 Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs
  14. Altmetric Badge
    Chapter 13 General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
  15. Altmetric Badge
    Chapter 14 Integral Based Fault Attack on LBlock
  16. Altmetric Badge
    Chapter 15 Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks
  17. Altmetric Badge
    Chapter 16 Parallel Implementations of LEA
  18. Altmetric Badge
    Chapter 17 Invertible Polynomial Representation for Private Set Operations
  19. Altmetric Badge
    Chapter 18 On the Efficacy of Solving LWE by Reduction to Unique-SVP
  20. Altmetric Badge
    Chapter 19 A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function
  21. Altmetric Badge
    Chapter 20 Ambiguous One-Move Nominative Signature Without Random Oracles
  22. Altmetric Badge
    Chapter 21 A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
  23. Altmetric Badge
    Chapter 22 An Anonymous Reputation System with Reputation Secrecy for Manager
  24. Altmetric Badge
    Chapter 23 Database Outsourcing with Hierarchical Authenticated Data Structures
  25. Altmetric Badge
    Chapter 24 Information-Theoretically Secure Entity Authentication in the Multi-user Setting
  26. Altmetric Badge
    Chapter 25 Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
  27. Altmetric Badge
    Chapter 26 Revocable Group Signatures with Compact Revocation List Using Accumulators
  28. Altmetric Badge
    Chapter 27 Semantic Feature Selection for Text with Application to Phishing Email Detection
  29. Altmetric Badge
    Chapter 28 Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts
  30. Altmetric Badge
    Chapter 29 Dark Side of the Shader: Mobile GPU-Aided Malware Delivery
  31. Altmetric Badge
    Chapter 30 Industry-Wide Misunderstandings of HTTPS
  32. Altmetric Badge
    Chapter 31 Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
Attention for Chapter 17: Invertible Polynomial Representation for Private Set Operations
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
22 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Invertible Polynomial Representation for Private Set Operations
Chapter number 17
Book title
Information Security and Cryptology -- ICISC 2013
Published by
Springer, Cham, November 2013
DOI 10.1007/978-3-319-12160-4_17
Book ISBNs
978-3-31-912159-8, 978-3-31-912160-4
Authors

Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee, Cheon, Jung Hee, Hong, Hyunsook, Lee, Hyung Tae

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 22 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 5%
Unknown 21 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 9 41%
Student > Master 3 14%
Researcher 3 14%
Professor > Associate Professor 2 9%
Professor 1 5%
Other 2 9%
Unknown 2 9%
Readers by discipline Count As %
Computer Science 16 73%
Mathematics 1 5%
Physics and Astronomy 1 5%
Engineering 1 5%
Unknown 3 14%