↓ Skip to main content

Advances in Cryptology - ASIACRYPT 2008

Overview of attention for book
Cover of 'Advances in Cryptology - ASIACRYPT 2008'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 MPC vs. SFE : Unconditional and Computational Security
  3. Altmetric Badge
    Chapter 2 Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
  4. Altmetric Badge
    Chapter 3 Graph Design for Secure Multiparty Computation over Non-Abelian Groups
  5. Altmetric Badge
    Chapter 4 Some Perspectives on Complexity-Based Cryptography
  6. Altmetric Badge
    Chapter 5 A Modular Security Analysis of the TLS Handshake Protocol
  7. Altmetric Badge
    Chapter 6 Ambiguous Optimistic Fair Exchange
  8. Altmetric Badge
    Chapter 7 Compact Proofs of Retrievability
  9. Altmetric Badge
    Chapter 8 On the Security of HB# against a Man-in-the-Middle Attack
  10. Altmetric Badge
    Chapter 9 Hash Functions from Sigma Protocols and Improvements to VSH
  11. Altmetric Badge
    Chapter 10 Slide Attacks on a Class of Hash Functions
  12. Altmetric Badge
    Chapter 11 Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
  13. Altmetric Badge
    Chapter 12 Universally Composable Adaptive Oblivious Transfer
  14. Altmetric Badge
    Chapter 13 A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
  15. Altmetric Badge
    Chapter 14 Towards Robust Computation on Encrypted Data
  16. Altmetric Badge
    Chapter 15 Efficient Protocols for Set Membership and Range Proofs
  17. Altmetric Badge
    Chapter 16 Preimage Attacks on 3, 4, and 5-Pass HAVAL
  18. Altmetric Badge
    Chapter 17 How to Fill Up Merkle-Damgård Hash Functions
  19. Altmetric Badge
    Chapter 18 Limits of Constructive Security Proofs
  20. Altmetric Badge
    Chapter 19 Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
  21. Altmetric Badge
    Chapter 20 Twisted Edwards Curves Revisited
  22. Altmetric Badge
    Chapter 21 On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols
  23. Altmetric Badge
    Chapter 22 Chosen Ciphertext Security with Optimal Ciphertext Overhead
  24. Altmetric Badge
    Chapter 23 Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
  25. Altmetric Badge
    Chapter 24 Advances in Cryptology - ASIACRYPT 2008
  26. Altmetric Badge
    Chapter 25 Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits
  27. Altmetric Badge
    Chapter 26 An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
  28. Altmetric Badge
    Chapter 27 An Improved Impossible Differential Attack on MISTY1
  29. Altmetric Badge
    Chapter 28 Generalized Identity Based and Broadcast Encryption Schemes
  30. Altmetric Badge
    Chapter 29 Speeding Up the Pollard Rho Method on Prime Fields
  31. Altmetric Badge
    Chapter 30 Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
  32. Altmetric Badge
    Chapter 31 OAEP Is Secure under Key-Dependent Messages
  33. Altmetric Badge
    Chapter 32 Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
  34. Altmetric Badge
    Chapter 33 A New Attack on the LEX Stream Cipher
  35. Altmetric Badge
    Chapter 34 Breaking the F-FCSR-H Stream Cipher in Real Time
Attention for Chapter 15: Efficient Protocols for Set Membership and Range Proofs
Altmetric Badge

Mentioned by

twitter
1 X user
patent
2 patents

Readers on

mendeley
105 Mendeley
citeulike
2 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Efficient Protocols for Set Membership and Range Proofs
Chapter number 15
Book title
Advances in Cryptology - ASIACRYPT 2008
Published by
Springer, Berlin, Heidelberg, December 2008
DOI 10.1007/978-3-540-89255-7_15
Book ISBNs
978-3-54-089254-0, 978-3-54-089255-7
Authors

Jan Camenisch, Rafik Chaabouni, abhi shelat, Camenisch, Jan, Chaabouni, Rafik, shelat, abhi

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 105 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 2%
United Kingdom 1 <1%
Spain 1 <1%
Canada 1 <1%
Unknown 100 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 30 29%
Researcher 21 20%
Student > Master 15 14%
Student > Doctoral Student 5 5%
Student > Postgraduate 4 4%
Other 12 11%
Unknown 18 17%
Readers by discipline Count As %
Computer Science 66 63%
Mathematics 5 5%
Engineering 3 3%
Social Sciences 3 3%
Physics and Astronomy 2 2%
Other 3 3%
Unknown 23 22%