↓ Skip to main content

Advances in Information and Computer Security

Overview of attention for book
Cover of 'Advances in Information and Computer Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
  3. Altmetric Badge
    Chapter 2 Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation
  4. Altmetric Badge
    Chapter 3 Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem
  5. Altmetric Badge
    Chapter 4 Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
  6. Altmetric Badge
    Chapter 5 Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries
  7. Altmetric Badge
    Chapter 6 Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
  8. Altmetric Badge
    Chapter 7 (Short Paper) How to Solve DLOG Problem with Auxiliary Input
  9. Altmetric Badge
    Chapter 8 (Short Paper) Parameter Trade-Offs for NFS and ECM
  10. Altmetric Badge
    Chapter 9 Is Java Card Ready for Hash-Based Signatures?
  11. Altmetric Badge
    Chapter 10 Detecting Privacy Information Abuse by Android Apps from API Call Logs
  12. Altmetric Badge
    Chapter 11 Verification of LINE Encryption Version 1.0 Using ProVerif
  13. Altmetric Badge
    Chapter 12 The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing
  14. Altmetric Badge
    Chapter 13 Improvements to Almost Optimum Secret Sharing with Cheating Detection
  15. Altmetric Badge
    Chapter 14 XOR-Based Hierarchical Secret Sharing Scheme
  16. Altmetric Badge
    Chapter 15 Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT
  17. Altmetric Badge
    Chapter 16 Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK
  18. Altmetric Badge
    Chapter 17 Lightweight Recursive MDS Matrices with Generalized Feistel Network
  19. Altmetric Badge
    Chapter 18 How to Prove KDM Security of BHHO
  20. Altmetric Badge
    Chapter 19 From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature
  21. Altmetric Badge
    Chapter 20 Universal Witness Signatures
Attention for Chapter 2: Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation
Chapter number 2
Book title
Advances in Information and Computer Security
Published by
Springer, Cham, September 2018
DOI 10.1007/978-3-319-97916-8_2
Book ISBNs
978-3-31-997915-1, 978-3-31-997916-8
Authors

Terry Shue Chien Lau, Chik How Tan, Lau, Terry Shue Chien, Tan, Chik How

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 11 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 27%
Researcher 3 27%
Student > Master 2 18%
Lecturer 1 9%
Unknown 2 18%
Readers by discipline Count As %
Computer Science 7 64%
Mathematics 1 9%
Physics and Astronomy 1 9%
Unknown 2 18%