↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
  3. Altmetric Badge
    Chapter 2 Generalized Security Analysis of the Random Key Bits Leakage Attack
  4. Altmetric Badge
    Chapter 3 Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher
  5. Altmetric Badge
    Chapter 4 Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward
  6. Altmetric Badge
    Chapter 5 Known-Key Distinguisher on Round-Reduced 3D Block Cipher
  7. Altmetric Badge
    Chapter 6 Identity-Based Signcryption from Identity-Based Cryptography
  8. Altmetric Badge
    Chapter 7 Order-Preserving Encryption for Non-uniformly Distributed Plaintexts
  9. Altmetric Badge
    Chapter 8 Solving a DLP with Auxiliary Input with the ρ -Algorithm
  10. Altmetric Badge
    Chapter 9 A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems
  11. Altmetric Badge
    Chapter 10 A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
  12. Altmetric Badge
    Chapter 11 Rule Indexing for Efficient Intrusion Detection Systems
  13. Altmetric Badge
    Chapter 12 Security Data Extraction from IEC 61850 ACSI Models for Network and System Management
  14. Altmetric Badge
    Chapter 13 Lightweight Middleware-Based ZigBee Security in Building Energy Management System
  15. Altmetric Badge
    Chapter 14 A Map-Layer-Based Access Control Model
  16. Altmetric Badge
    Chapter 15 Application Authentication for Hybrid Services of Broadcasting and Communications Networks
  17. Altmetric Badge
    Chapter 16 Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
  18. Altmetric Badge
    Chapter 17 Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks
  19. Altmetric Badge
    Chapter 18 Mutual Private Set Intersection with Linear Complexity
  20. Altmetric Badge
    Chapter 19 Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs
  21. Altmetric Badge
    Chapter 20 Evaluating the Security and Privacy of Near Field Communication – Case: Public Transportation
  22. Altmetric Badge
    Chapter 21 Exploiting Routing Tree Construction in CTP
Attention for Chapter 1: Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
19 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
Chapter number 1
Book title
Information Security Applications
Published in
Lecture notes in computer science, January 2012
DOI 10.1007/978-3-642-27890-7_1
Book ISBNs
978-3-64-227889-1, 978-3-64-227890-7
Authors

Gautham Sekar, Bart Preneel, Sekar, Gautham, Preneel, Bart

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 19 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 19 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 32%
Student > Master 4 21%
Researcher 2 11%
Lecturer 1 5%
Professor 1 5%
Other 3 16%
Unknown 2 11%
Readers by discipline Count As %
Computer Science 16 84%
Physics and Astronomy 1 5%
Unknown 2 11%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 05 June 2012.
All research outputs
#15,245,883
of 22,668,244 outputs
Outputs from Lecture notes in computer science
#4,644
of 8,123 outputs
Outputs of similar age
#163,149
of 244,068 outputs
Outputs of similar age from Lecture notes in computer science
#268
of 490 outputs
Altmetric has tracked 22,668,244 research outputs across all sources so far. This one is in the 22nd percentile – i.e., 22% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,123 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 27th percentile – i.e., 27% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 244,068 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 21st percentile – i.e., 21% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 490 others from the same source and published within six weeks on either side of this one. This one is in the 22nd percentile – i.e., 22% of its contemporaries scored the same or lower than it.