↓ Skip to main content

Information Security and Cryptology – ICISC 2008

Overview of attention for book
Cover of 'Information Security and Cryptology – ICISC 2008'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
  3. Altmetric Badge
    Chapter 2 Distributed Attribute-Based Encryption
  4. Altmetric Badge
    Chapter 3 Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
  5. Altmetric Badge
    Chapter 4 Simple Algorithms for Computing a Sequence of 2-Isogenies
  6. Altmetric Badge
    Chapter 5 Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
  7. Altmetric Badge
    Chapter 6 Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images
  8. Altmetric Badge
    Chapter 7 The Swiss-Knife RFID Distance Bounding Protocol
  9. Altmetric Badge
    Chapter 8 Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique
  10. Altmetric Badge
    Chapter 9 Anonymous Fingerprinting for Predelivery of Contents
  11. Altmetric Badge
    Chapter 10 Instruction Set Limitation in Support of Software Diversity
  12. Altmetric Badge
    Chapter 11 Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
  13. Altmetric Badge
    Chapter 12 How to Balance Privacy with Authenticity
  14. Altmetric Badge
    Chapter 13 Efficient Vote Validity Check in Homomorphic Electronic Voting
  15. Altmetric Badge
    Chapter 14 Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
  16. Altmetric Badge
    Chapter 15 Novel PUF-Based Error Detection Methods in Finite State Machines
  17. Altmetric Badge
    Chapter 16 Partition vs . Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
  18. Altmetric Badge
    Chapter 17 A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs
  19. Altmetric Badge
    Chapter 18 Extended Models for Message Authentication
  20. Altmetric Badge
    Chapter 19 A Preimage Attack for 52-Step HAS-160
  21. Altmetric Badge
    Chapter 20 Essentially Optimal Universally Composable Oblivious Transfer
  22. Altmetric Badge
    Chapter 21 Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
  23. Altmetric Badge
    Chapter 22 Proving a Shuffle Using Representations of the Symmetric Group
  24. Altmetric Badge
    Chapter 23 On Formal Verification of Arithmetic-Based Cryptographic Primitives
  25. Altmetric Badge
    Chapter 24 A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
  26. Altmetric Badge
    Chapter 25 Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis
  27. Altmetric Badge
    Chapter 26 Higher Order Differential Attacks on Reduced-Round MISTY1
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (66th percentile)
  • Good Attention Score compared to outputs of the same age and source (75th percentile)

Mentioned by

twitter
1 X user
wikipedia
2 Wikipedia pages

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
10 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology – ICISC 2008
Published by
ADS, March 2009
DOI 10.1007/978-3-642-00730-9
ISBNs
978-3-64-200729-3, 978-3-64-200730-9
Editors

Lee, Pil Joong, Cheon, Jung Hee

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 10 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 10 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 20%
Student > Master 2 20%
Researcher 1 10%
Unknown 5 50%
Readers by discipline Count As %
Computer Science 5 50%
Unknown 5 50%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 4. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 09 March 2024.
All research outputs
#6,499,267
of 23,041,514 outputs
Outputs from ADS
#8,108
of 37,451 outputs
Outputs of similar age
#33,516
of 107,642 outputs
Outputs of similar age from ADS
#103
of 431 outputs
Altmetric has tracked 23,041,514 research outputs across all sources so far. This one has received more attention than most of these and is in the 70th percentile.
So far Altmetric has tracked 37,451 research outputs from this source. They receive a mean Attention Score of 4.6. This one has done well, scoring higher than 76% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 107,642 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 66% of its contemporaries.
We're also able to compare this research output to 431 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 75% of its contemporaries.