↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Security of the Algebraic Eraser Tag Authentication Protocol
  3. Altmetric Badge
    Chapter 2 A Cryptographic Analysis of UMTS/LTE AKA
  4. Altmetric Badge
    Chapter 3 Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
  5. Altmetric Badge
    Chapter 4 Two More Efficient Variants of the J-PAKE Protocol
  6. Altmetric Badge
    Chapter 5 Hash-Based TPM Signatures for the Quantum World
  7. Altmetric Badge
    Chapter 6 Fuzzy Signatures: Relaxing Requirements and a New Construction
  8. Altmetric Badge
    Chapter 7 Foundations of Fully Dynamic Group Signatures
  9. Altmetric Badge
    Chapter 8 A Lattice-Based Group Signature Scheme with Message-Dependent Opening
  10. Altmetric Badge
    Chapter 9 Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
  11. Altmetric Badge
    Chapter 10 Legally Fair Contract Signing Without Keystones
  12. Altmetric Badge
    Chapter 11 Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms
  13. Altmetric Badge
    Chapter 12 Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering
  14. Altmetric Badge
    Chapter 13 More Efficient Constructions for Inner-Product Encryption
  15. Altmetric Badge
    Chapter 14 Attribute Based Encryption with Direct Efficiency Tradeoff
  16. Altmetric Badge
    Chapter 15 Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions
  17. Altmetric Badge
    Chapter 16 Offline Witness Encryption
  18. Altmetric Badge
    Chapter 17 Deterministic Public-Key Encryption Under Continual Leakage
  19. Altmetric Badge
    Chapter 18 Better Preprocessing for Secure Multiparty Computation
  20. Altmetric Badge
    Chapter 19 Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
  21. Altmetric Badge
    Chapter 20 Verifiable Multi-party Computation with Perfectly Private Audit Trail
  22. Altmetric Badge
    Chapter 21 Practical Fault-Tolerant Data Aggregation
  23. Altmetric Badge
    Chapter 22 Accelerating Homomorphic Computations on Rational Numbers
  24. Altmetric Badge
    Chapter 23 New Techniques for Non-interactive Shuffle and Range Arguments
  25. Altmetric Badge
    Chapter 24 Constrained PRFs for Unbounded Inputs with Short Keys
  26. Altmetric Badge
    Chapter 25 Wide Trail Design Strategy for Binary MixColumns
  27. Altmetric Badge
    Chapter 26 Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
  28. Altmetric Badge
    Chapter 27 Square Attack on 7-Round Kiasu-BC
  29. Altmetric Badge
    Chapter 28 On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
  30. Altmetric Badge
    Chapter 29 Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
  31. Altmetric Badge
    Chapter 30 Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing
  32. Altmetric Badge
    Chapter 31 Parallel Implementation of BDD Enumeration for LWE
  33. Altmetric Badge
    Chapter 32 Memory Carving in Embedded Devices: Separate the Wheat from the Chaff
  34. Altmetric Badge
    Chapter 33 CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery
  35. Altmetric Badge
    Chapter 34 TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones
  36. Altmetric Badge
    Chapter 35 Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
Attention for Chapter 9: Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (88th percentile)
  • High Attention Score compared to outputs of the same age and source (96th percentile)

Mentioned by

twitter
5 X users
patent
8 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
117 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
Chapter number 9
Book title
Applied Cryptography and Network Security
Published in
Lecture notes in computer science, June 2016
DOI 10.1007/978-3-319-39555-5_9
Book ISBNs
978-3-31-939554-8, 978-3-31-939555-5
Authors

Rosario Gennaro, Steven Goldfeder, Arvind Narayanan, Gennaro, Rosario, Goldfeder, Steven, Narayanan, Arvind

Editors

Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 117 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 2%
India 1 <1%
Brazil 1 <1%
Unknown 113 97%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 26 22%
Student > Master 17 15%
Researcher 15 13%
Other 7 6%
Student > Bachelor 6 5%
Other 18 15%
Unknown 28 24%
Readers by discipline Count As %
Computer Science 53 45%
Engineering 11 9%
Mathematics 6 5%
Economics, Econometrics and Finance 3 3%
Business, Management and Accounting 2 2%
Other 5 4%
Unknown 37 32%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 16. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 20 March 2024.
All research outputs
#2,301,124
of 25,497,142 outputs
Outputs from Lecture notes in computer science
#389
of 8,164 outputs
Outputs of similar age
#40,028
of 357,569 outputs
Outputs of similar age from Lecture notes in computer science
#12
of 350 outputs
Altmetric has tracked 25,497,142 research outputs across all sources so far. Compared to these this one has done particularly well and is in the 90th percentile: it's in the top 10% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,164 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.2. This one has done particularly well, scoring higher than 95% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 357,569 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 88% of its contemporaries.
We're also able to compare this research output to 350 others from the same source and published within six weeks on either side of this one. This one has done particularly well, scoring higher than 96% of its contemporaries.