↓ Skip to main content

Advances in Cryptology – ASIACRYPT 2015

Overview of attention for book
Cover of 'Advances in Cryptology – ASIACRYPT 2015'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Key-Recovery Attacks on ASASA
  3. Altmetric Badge
    Chapter 2 The Tower Number Field Sieve
  4. Altmetric Badge
    Chapter 3 On the Impact of Known-Key Attacks on Hash Functions
  5. Altmetric Badge
    Chapter 4 Generic Security of NMAC and HMAC with Input Whitening
  6. Altmetric Badge
    Chapter 5 On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
  7. Altmetric Badge
    Chapter 6 Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
  8. Altmetric Badge
    Chapter 7 An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
  9. Altmetric Badge
    Chapter 8 On Black-Box Complexity of Universally Composable Security in the CRS Model
  10. Altmetric Badge
    Chapter 9 Public Verifiability in the Covert Model (Almost) for Free
  11. Altmetric Badge
    Chapter 10 Limits of Extractability Assumptions with Distributional Auxiliary Input
  12. Altmetric Badge
    Chapter 11 Composable and Modular Anonymous Credentials: Definitions and Practical Constructions
  13. Altmetric Badge
    Chapter 12 ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
  14. Altmetric Badge
    Chapter 13 Counting Keys in Parallel After a Side Channel Attack
  15. Altmetric Badge
    Chapter 14 A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks
  16. Altmetric Badge
    Chapter 15 How Secure is AES Under Leakage
  17. Altmetric Badge
    Chapter 16 A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
  18. Altmetric Badge
    Chapter 17 Midori : A Block Cipher for Low Energy
  19. Altmetric Badge
    Chapter 18 Optimally Secure Block Ciphers from Ideal Primitives
  20. Altmetric Badge
    Chapter 19 Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
  21. Altmetric Badge
    Chapter 20 Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
  22. Altmetric Badge
    Chapter 21 Collision Attacks Against CAESAR Candidates
  23. Altmetric Badge
    Chapter 22 Optimized Interpolation Attacks on LowMC
  24. Altmetric Badge
    Chapter 23 Another Tradeoff Attack on Sprout-Like Stream Ciphers
  25. Altmetric Badge
    Chapter 24 Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
  26. Altmetric Badge
    Chapter 25 Analysis of SHA-512/224 and SHA-512/256
  27. Altmetric Badge
    Chapter 26 Tradeoff Cryptanalysis of Memory-Hard Functions
  28. Altmetric Badge
    Chapter 27 Property Preserving Symmetric Encryption Revisited
  29. Altmetric Badge
    Chapter 28 Refinements of the k -tree Algorithm for the Generalized Birthday Problem
  30. Altmetric Badge
    Chapter 29 How to Sequentialize Independent Parallel Attacks?
  31. Altmetric Badge
    Chapter 30 Pure Differential Privacy for Rectangle Queries via Private Partitions
  32. Altmetric Badge
    Chapter 31 Implementing Candidate Graded Encoding Schemes from Ideal Lattices
  33. Altmetric Badge
    Chapter 32 New Circular Security Counterexamples from Decision Linear and Learning with Errors
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
wikipedia
1 Wikipedia page

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Advances in Cryptology – ASIACRYPT 2015
Published by
Springer Berlin Heidelberg, November 2015
DOI 10.1007/978-3-662-48800-3
ISBNs
978-3-66-248799-0, 978-3-66-248800-3
Editors

Iwata, Tetsu, Cheon, Jung Hee

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Italy 1 7%
Unknown 14 93%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 33%
Other 2 13%
Student > Doctoral Student 1 7%
Student > Master 1 7%
Researcher 1 7%
Other 0 0%
Unknown 5 33%
Readers by discipline Count As %
Computer Science 8 53%
Mathematics 1 7%
Philosophy 1 7%
Unknown 5 33%