↓ Skip to main content

Cryptography and Security: From Theory to Applications

Overview of attention for book
Cover of 'Cryptography and Security: From Theory to Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 The Hidden Side of Jean-Jacques Quisquater
  3. Altmetric Badge
    Chapter 2 On Quisquater’s Multiplication Algorithm
  4. Altmetric Badge
    Chapter 3 A Brief Survey of Research Jointly with Jean-Jacques Quisquater
  5. Altmetric Badge
    Chapter 4 DES Collisions Revisited
  6. Altmetric Badge
    Chapter 5 Line Directed Hypergraphs
  7. Altmetric Badge
    Chapter 6 Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq
  8. Altmetric Badge
    Chapter 7 Self-similarity Attacks on Block Ciphers and Application to KeeLoq
  9. Altmetric Badge
    Chapter 8 Increasing Block Sizes Using Feistel Networks: The Example of the AES
  10. Altmetric Badge
    Chapter 9 Authenticated-Encryption with Padding: A Formal Security Treatment
  11. Altmetric Badge
    Chapter 10 Traceable Signature with Stepping Capabilities
  12. Altmetric Badge
    Chapter 11 Deniable RSA Signature
  13. Altmetric Badge
    Chapter 12 Autotomic Signatures
  14. Altmetric Badge
    Chapter 13 Fully Forward-Secure Group Signatures
  15. Altmetric Badge
    Chapter 14 Public Key Encryption for the Forgetful
  16. Altmetric Badge
    Chapter 15 Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
  17. Altmetric Badge
    Chapter 16 Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
  18. Altmetric Badge
    Chapter 17 EM Probes Characterisation for Security Analysis
  19. Altmetric Badge
    Chapter 18 An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost
  20. Altmetric Badge
    Chapter 19 Masking with Randomized Look Up Tables
  21. Altmetric Badge
    Chapter 20 Efficient Implementation of True Random Number Generator Based on SRAM PUFs
  22. Altmetric Badge
    Chapter 21 Operand Folding Hardware Multipliers
  23. Altmetric Badge
    Chapter 22 SIMPL Systems as a Keyless Cryptographic and Security Primitive
  24. Altmetric Badge
    Chapter 23 Cryptography with Asynchronous Logic Automata
  25. Altmetric Badge
    Chapter 24 A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
  26. Altmetric Badge
    Chapter 25 The Challenges Raised by the Privacy-Preserving Identity Card
  27. Altmetric Badge
    Chapter 26 The Next Smart Card Nightmare
  28. Altmetric Badge
    Chapter 27 Localization Privacy
  29. Altmetric Badge
    Chapter 28 Dynamic Secure Cloud Storage with Provenance
  30. Altmetric Badge
    Chapter 29 Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage
  31. Altmetric Badge
    Chapter 30 A Nagell Algorithm in Any Characteristic
  32. Altmetric Badge
    Chapter 31 How to Read a Signature?
  33. Altmetric Badge
    Chapter 32 Fooling a Liveness-Detecting Capacitive Fingerprint Scanner
  34. Altmetric Badge
    Chapter 33 Physical Simulation of Inarticulate Robots
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
4 X users
patent
2 patents

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
8 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Cryptography and Security: From Theory to Applications
Published by
Cryptography and Security: From Theory to Applications, January 2012
DOI 10.1007/978-3-642-28368-0
ISBNs
978-3-64-228367-3, 978-3-64-228368-0
Editors

David Naccache

X Demographics

X Demographics

The data shown below were collected from the profiles of 4 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 8 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 8 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 50%
Researcher 2 25%
Lecturer 1 13%
Student > Doctoral Student 1 13%
Readers by discipline Count As %
Engineering 4 50%
Computer Science 3 38%
Medicine and Dentistry 1 13%