↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Cryptographic Analysis of the WireGuard Protocol
  3. Altmetric Badge
    Chapter 2 Distributed SSH Key Management with Proactive RSA Threshold Signatures
  4. Altmetric Badge
    Chapter 3 Non-interactive Zaps of Knowledge
  5. Altmetric Badge
    Chapter 4 Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations
  6. Altmetric Badge
    Chapter 5 Drive-By Key-Extraction Cache Attacks from Portable Code
  7. Altmetric Badge
    Chapter 6 On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
  8. Altmetric Badge
    Chapter 7 Continuously Non-malleable Codes with Split-State Refresh
  9. Altmetric Badge
    Chapter 8 Efficient Unconditionally Secure Signatures Using Universal Hashing
  10. Altmetric Badge
    Chapter 9 Floppy-Sized Group Signatures from Lattices
  11. Altmetric Badge
    Chapter 10 On the Security Notions for Homomorphic Signatures
  12. Altmetric Badge
    Chapter 11 Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
  13. Altmetric Badge
    Chapter 12 Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures
  14. Altmetric Badge
    Chapter 13 Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption
  15. Altmetric Badge
    Chapter 14 Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs
  16. Altmetric Badge
    Chapter 15 Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
  17. Altmetric Badge
    Chapter 16 New Protocols for Secure Equality Test and Comparison
  18. Altmetric Badge
    Chapter 17 Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
  19. Altmetric Badge
    Chapter 18 Best of Both Worlds in Secure Computation, with Low Communication Overhead
  20. Altmetric Badge
    Chapter 19 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
  21. Altmetric Badge
    Chapter 20 M erge MAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
  22. Altmetric Badge
    Chapter 21 K angaroo T welve : Fast Hashing Based on $${\textsc {Keccak}\text {-}p}{}$$ K E C C A K - p
  23. Altmetric Badge
    Chapter 22 Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher
  24. Altmetric Badge
    Chapter 23 Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
  25. Altmetric Badge
    Chapter 24 Differential Cryptanalysis of Round-Reduced Sparx-64/128
  26. Altmetric Badge
    Chapter 25 Can Caesar Beat Galois?
  27. Altmetric Badge
    Chapter 26 Improved Anonymous Broadcast Encryptions
  28. Altmetric Badge
    Chapter 27 Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
  29. Altmetric Badge
    Chapter 28 Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices
  30. Altmetric Badge
    Chapter 29 In-Region Authentication
  31. Altmetric Badge
    Chapter 30 Formal Analysis of Distance Bounding with Secure Hardware
  32. Altmetric Badge
    Chapter 31 KRB-CCN : Lightweight Authentication and Access Control for Private Content-Centric Networks
  33. Altmetric Badge
    Chapter 32 Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric
  34. Altmetric Badge
    Chapter 33 Stateful Multi-client Verifiable Computation
  35. Altmetric Badge
    Chapter 34 V eri C ount : Verifiable Resource Accounting Using Hardware and Software Isolation
  36. Altmetric Badge
    Chapter 35 Message-Locked Encryption with File Update
  37. Altmetric Badge
    Chapter 36 DogFish: Decentralized Optimistic Game-theoretic FIle SHaring
Attention for Chapter 6: On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
22 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Chapter number 6
Book title
Applied Cryptography and Network Security
Published by
Springer, Cham, July 2018
DOI 10.1007/978-3-319-93387-0_6
Book ISBNs
978-3-31-993386-3, 978-3-31-993387-0
Authors

Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff, Alpirez Bock, Estuardo, Brzuska, Chris, Michiels, Wil, Treff, Alexander

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 22 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 22 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 23%
Student > Master 5 23%
Researcher 4 18%
Lecturer 1 5%
Unknown 7 32%
Readers by discipline Count As %
Computer Science 11 50%
Mathematics 2 9%
Physics and Astronomy 1 5%
Engineering 1 5%
Unknown 7 32%