↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Universal η T Pairing Algorithm over Arbitrary Extension Degree
  3. Altmetric Badge
    Chapter 2 Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction
  4. Altmetric Badge
    Chapter 3 Secret Signatures: How to Achieve Business Privacy Efficiently?
  5. Altmetric Badge
    Chapter 4 Implementation of BioAPI Conformance Test Suite Using BSP Testing Model
  6. Altmetric Badge
    Chapter 5 Information Hiding in Software with Mixed Boolean-Arithmetic Transforms
  7. Altmetric Badge
    Chapter 6 Geometrically Invariant Image Watermarking in the DWT Domain
  8. Altmetric Badge
    Chapter 7 Implementation of LSM-Based RBAC Module for Embedded System
  9. Altmetric Badge
    Chapter 8 Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations
  10. Altmetric Badge
    Chapter 9 A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
  11. Altmetric Badge
    Chapter 10 Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine
  12. Altmetric Badge
    Chapter 11 An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks
  13. Altmetric Badge
    Chapter 12 Detecting Motifs in System Call Sequences
  14. Altmetric Badge
    Chapter 13 Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System
  15. Altmetric Badge
    Chapter 14 Breaking 104 Bit WEP in Less Than 60 Seconds
  16. Altmetric Badge
    Chapter 15 Efficient Implementation of the Pairing on Mobilephones Using BREW
  17. Altmetric Badge
    Chapter 16 Security Analysis of MISTY1
  18. Altmetric Badge
    Chapter 17 A Generic Method for Secure SBox Implementation
  19. Altmetric Badge
    Chapter 18 On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences
  20. Altmetric Badge
    Chapter 19 Authorization Constraints Specification of RBAC
  21. Altmetric Badge
    Chapter 20 Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk
  22. Altmetric Badge
    Chapter 21 A Compositional Multiple Policies Operating System Security Model
  23. Altmetric Badge
    Chapter 22 Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones
  24. Altmetric Badge
    Chapter 23 Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures
  25. Altmetric Badge
    Chapter 24 Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
  26. Altmetric Badge
    Chapter 25 Risk & Distortion Based K -Anonymity
  27. Altmetric Badge
    Chapter 26 Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System
  28. Altmetric Badge
    Chapter 27 ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems
Attention for Chapter 23: Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
36 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures
Chapter number 23
Book title
Information Security Applications
Published by
Springer, Berlin, Heidelberg, August 2007
DOI 10.1007/978-3-540-77535-5_23
Book ISBNs
978-3-54-077534-8, 978-3-54-077535-5
Authors

Robert McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane, McEvoy, Robert, Tunstall, Michael, Murphy, Colin C., Marnane, William P.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 36 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 36 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 12 33%
Researcher 7 19%
Student > Master 6 17%
Lecturer 2 6%
Student > Bachelor 2 6%
Other 3 8%
Unknown 4 11%
Readers by discipline Count As %
Computer Science 20 56%
Engineering 7 19%
Mathematics 3 8%
Physics and Astronomy 2 6%
Unknown 4 11%