↓ Skip to main content

Information Security and Cryptology - ICISC 2005

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2005'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 National Security, Forensics and Mobile Communications
  3. Altmetric Badge
    Chapter 2 Information Security as Interdisciplinary Science Based on Ethics
  4. Altmetric Badge
    Chapter 3 A Timed-Release Key Management Scheme for Backward Recovery
  5. Altmetric Badge
    Chapter 4 Property-Based Broadcast Encryption for Multi-level Security Policies
  6. Altmetric Badge
    Chapter 5 Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption
  7. Altmetric Badge
    Chapter 6 An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image
  8. Altmetric Badge
    Chapter 7 Trust Management for Resilient Wireless Sensor Networks
  9. Altmetric Badge
    Chapter 8 Improvements to Mitchell’s Remote User Authentication Protocol
  10. Altmetric Badge
    Chapter 9 Efficient Authenticators with Application to Key Exchange
  11. Altmetric Badge
    Chapter 10 Benes and Butterfly Schemes Revisited
  12. Altmetric Badge
    Chapter 11 Relative Doubling Attack Against Montgomery Ladder
  13. Altmetric Badge
    Chapter 12 Improved Collision Attack on MD4 with Probability Almost 1
  14. Altmetric Badge
    Chapter 13 Finding Collision on 45-Step HAS-160
  15. Altmetric Badge
    Chapter 14 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
  16. Altmetric Badge
    Chapter 15 The Dilemma of Covert Channels Searching
  17. Altmetric Badge
    Chapter 16 A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks
  18. Altmetric Badge
    Chapter 17 Foundations of Attack Trees
  19. Altmetric Badge
    Chapter 18 An Algebraic Masking Method to Protect AES Against Power Attacks
  20. Altmetric Badge
    Chapter 19 Characterisations of Extended Resiliency and Extended Immunity of S-Boxes
  21. Altmetric Badge
    Chapter 20 Integral Cryptanalysis of Reduced FOX Block Cipher
  22. Altmetric Badge
    Chapter 21 Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components
  23. Altmetric Badge
    Chapter 22 Cryptanalysis of Sfinks
  24. Altmetric Badge
    Chapter 23 Weaknesses of COSvd (2,128) Stream Cipher
  25. Altmetric Badge
    Chapter 24 Expanding Weak PRF with Small Key Size
  26. Altmetric Badge
    Chapter 25 On Linear Systems of Equations with Distinct Variables and Small Block Size
  27. Altmetric Badge
    Chapter 26 An FPGA Implementation of CCM Mode Using AES
  28. Altmetric Badge
    Chapter 27 New Architecture for Multiplication in GF (2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
  29. Altmetric Badge
    Chapter 28 An Efficient Design of CCMP for Robust Security Network
  30. Altmetric Badge
    Chapter 29 Software-Based Copy Protection for Temporal Media During Dissemination and Playback
  31. Altmetric Badge
    Chapter 30 Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme
  32. Altmetric Badge
    Chapter 31 Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms
  33. Altmetric Badge
    Chapter 32 An Efficient Static Blind Ring Signature Scheme
  34. Altmetric Badge
    Chapter 33 Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
  35. Altmetric Badge
    Chapter 34 Yet Another Forward Secure Signature from Bilinear Pairings
Attention for Chapter 12: Improved Collision Attack on MD4 with Probability Almost 1
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
23 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Improved Collision Attack on MD4 with Probability Almost 1
Chapter number 12
Book title
Information Security and Cryptology - ICISC 2005
Published in
Lecture notes in computer science, December 2005
DOI 10.1007/11734727_12
Book ISBNs
978-3-54-033354-8, 978-3-54-033355-5
Authors

Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta, Naito, Yusuke, Sasaki, Yu, Kunihiro, Noboru, Ohta, Kazuo

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 23 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 23 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 30%
Student > Master 4 17%
Researcher 3 13%
Professor > Associate Professor 2 9%
Professor 2 9%
Other 3 13%
Unknown 2 9%
Readers by discipline Count As %
Computer Science 20 87%
Physics and Astronomy 1 4%
Unknown 2 9%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 24 June 2013.
All research outputs
#15,273,442
of 22,712,476 outputs
Outputs from Lecture notes in computer science
#4,646
of 8,124 outputs
Outputs of similar age
#123,786
of 146,292 outputs
Outputs of similar age from Lecture notes in computer science
#103
of 156 outputs
Altmetric has tracked 22,712,476 research outputs across all sources so far. This one is in the 22nd percentile – i.e., 22% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,124 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 27th percentile – i.e., 27% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 146,292 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 5th percentile – i.e., 5% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 156 others from the same source and published within six weeks on either side of this one. This one is in the 20th percentile – i.e., 20% of its contemporaries scored the same or lower than it.