↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
  3. Altmetric Badge
    Chapter 2 Turn On the Lights: User Behavior in Game Environment Using CPTED
  4. Altmetric Badge
    Chapter 3 QR Code Watermarking for Digital Images
  5. Altmetric Badge
    Chapter 4 FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking
  6. Altmetric Badge
    Chapter 5 DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
  7. Altmetric Badge
    Chapter 6 A Secure and Self-tallying E-voting System Based on Blockchain
  8. Altmetric Badge
    Chapter 7 An Extended CTRT for AES-256
  9. Altmetric Badge
    Chapter 8 A Blind Ring Signature Based on the Short Integer Solution Problem
  10. Altmetric Badge
    Chapter 9 A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
  11. Altmetric Badge
    Chapter 10 Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR
  12. Altmetric Badge
    Chapter 11 Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing
  13. Altmetric Badge
    Chapter 12 Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression
  14. Altmetric Badge
    Chapter 13 Timed-Release Encryption with Master Time Bound Key
  15. Altmetric Badge
    Chapter 14 Secret Sharing on Evolving Multi-level Access Structure
  16. Altmetric Badge
    Chapter 15 Strengthened PAKE Protocols Secure Against Malicious Private Key Generator
  17. Altmetric Badge
    Chapter 16 Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
  18. Altmetric Badge
    Chapter 17 Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)
  19. Altmetric Badge
    Chapter 18 CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network
  20. Altmetric Badge
    Chapter 19 A New Password Cracking Model with Generative Adversarial Networks
  21. Altmetric Badge
    Chapter 20 Is It Possible to Hide My Key into Deep Neural Network?
  22. Altmetric Badge
    Chapter 21 RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices
  23. Altmetric Badge
    Chapter 22 On the Automation of Security Testing for IoT Constrained Scenarios
  24. Altmetric Badge
    Chapter 23 Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
  25. Altmetric Badge
    Chapter 24 Ring-LWE on 8-Bit AVR Embedded Processor
  26. Altmetric Badge
    Chapter 25 Low-Noise LLC Side-Channel Attack with Perf
  27. Altmetric Badge
    Chapter 26 Optimized SIKE Round 2 on 64-bit ARM
  28. Altmetric Badge
    Chapter 27 Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea
  29. Altmetric Badge
    Chapter 28 An SGX-Based Key Management Framework for Data Centric Networking
Attention for Chapter 7: An Extended CTRT for AES-256
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
7 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
An Extended CTRT for AES-256
Chapter number 7
Book title
Information Security Applications
Published by
Springer, Cham, August 2019
DOI 10.1007/978-3-030-39303-8_7
Book ISBNs
978-3-03-039302-1, 978-3-03-039303-8
Authors

SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura, Shin, SeongHan, Yamada, Shota, Hanaoka, Goichiro, Ishida, Yusuke, Kunii, Atsushi, Oketani, Junichi, Kunii, Shimpei, Tomomura, Kiyoshi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 7 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 3 43%
Student > Ph. D. Student 2 29%
Student > Master 1 14%
Unknown 1 14%
Readers by discipline Count As %
Computer Science 5 71%
Physics and Astronomy 1 14%
Unknown 1 14%