↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography
  3. Altmetric Badge
    Chapter 2 Simple Security Definitions for and Constructions of 0-RTT Key Exchange
  4. Altmetric Badge
    Chapter 3 TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF
  5. Altmetric Badge
    Chapter 4 Secure and Efficient Pairing at 256-Bit Security Level
  6. Altmetric Badge
    Chapter 5 No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices
  7. Altmetric Badge
    Chapter 6 Are You Lying: Validating the Time-Location of Outdoor Images
  8. Altmetric Badge
    Chapter 7 Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks
  9. Altmetric Badge
    Chapter 8 A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords
  10. Altmetric Badge
    Chapter 9 Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security
  11. Altmetric Badge
    Chapter 10 A Novel GPU-Based Implementation of the Cube Attack
  12. Altmetric Badge
    Chapter 11 Related-Key Impossible-Differential Attack on Reduced-Round Skinny
  13. Altmetric Badge
    Chapter 12 Faster Secure Multi-party Computation of AES and DES Using Lookup Tables
  14. Altmetric Badge
    Chapter 13 An Experimental Study of the BDD Approach for the Search LWE Problem
  15. Altmetric Badge
    Chapter 14 Efficiently Obfuscating Re-Encryption Program Under DDH Assumption
  16. Altmetric Badge
    Chapter 15 Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
  17. Altmetric Badge
    Chapter 16 Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols
  18. Altmetric Badge
    Chapter 17 Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)
  19. Altmetric Badge
    Chapter 18 More Efficient Construction of Bounded KDM Secure Encryption
  20. Altmetric Badge
    Chapter 19 Signature Schemes with Randomized Verification
  21. Altmetric Badge
    Chapter 20 Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
  22. Altmetric Badge
    Chapter 21 A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
  23. Altmetric Badge
    Chapter 22 Side-Channel Attacks Meet Secure Network Protocols
  24. Altmetric Badge
    Chapter 23 Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
  25. Altmetric Badge
    Chapter 24 Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
  26. Altmetric Badge
    Chapter 25 Bounds in Various Generalized Settings of the Discrete Logarithm Problem
  27. Altmetric Badge
    Chapter 26 An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis
  28. Altmetric Badge
    Chapter 27 SCRAPE: Scalable Randomness Attested by Public Entities
  29. Altmetric Badge
    Chapter 28 cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
  30. Altmetric Badge
    Chapter 29 Almost Optimal Oblivious Transfer from QA-NIZK
  31. Altmetric Badge
    Chapter 30 OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
  32. Altmetric Badge
    Chapter 31 Accountable Storage
  33. Altmetric Badge
    Chapter 32 Maliciously Secure Multi-Client ORAM
  34. Altmetric Badge
    Chapter 33 Legacy-Compliant Data Authentication for Industrial Control System Traffic
  35. Altmetric Badge
    Chapter 34 Multi-client Oblivious RAM Secure Against Malicious Servers
Attention for Chapter 28: cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (66th percentile)
  • Good Attention Score compared to outputs of the same age and source (77th percentile)

Mentioned by

twitter
5 X users

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
28 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
Chapter number 28
Book title
Applied Cryptography and Network Security
Published in
Lecture notes in computer science, June 2017
DOI 10.1007/978-3-319-61204-1_28
Book ISBNs
978-3-31-961203-4, 978-3-31-961204-1
Authors

David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri De Ruiter, Alan T. Sherman

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 28 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 28 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 29%
Student > Master 7 25%
Researcher 3 11%
Lecturer 2 7%
Professor 1 4%
Other 0 0%
Unknown 7 25%
Readers by discipline Count As %
Computer Science 18 64%
Physics and Astronomy 1 4%
Social Sciences 1 4%
Engineering 1 4%
Unknown 7 25%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 5. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 19 April 2023.
All research outputs
#6,657,319
of 23,578,918 outputs
Outputs from Lecture notes in computer science
#2,105
of 8,153 outputs
Outputs of similar age
#104,736
of 316,318 outputs
Outputs of similar age from Lecture notes in computer science
#34
of 153 outputs
Altmetric has tracked 23,578,918 research outputs across all sources so far. This one has received more attention than most of these and is in the 71st percentile.
So far Altmetric has tracked 8,153 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has gotten more attention than average, scoring higher than 74% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 316,318 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 66% of its contemporaries.
We're also able to compare this research output to 153 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 77% of its contemporaries.